Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (19)
- Public Affairs, Public Policy and Public Administration (12)
- International Relations (11)
- Arts and Humanities (6)
- Defense and Security Studies (6)
-
- International and Area Studies (6)
- Criminology and Criminal Justice (5)
- Legal Studies (5)
- Peace and Conflict Studies (5)
- Sociology (5)
- American Politics (4)
- Communication (4)
- Economics (4)
- Law (4)
- Public Policy (4)
- Criminology (3)
- Other International and Area Studies (3)
- Other Political Science (3)
- Asian Studies (2)
- Communication Technology and New Media (2)
- History (2)
- National Security Law (2)
- Policy Design, Analysis, and Evaluation (2)
- Psychology (2)
- Race, Ethnicity and Post-Colonial Studies (2)
- Terrorism Studies (2)
- African American Studies (1)
- Bioethics and Medical Ethics (1)
- Civic and Community Engagement (1)
- Institution
-
- Selected Works (5)
- SelectedWorks (4)
- Wright State University (3)
- City University of New York (CUNY) (2)
- University of Arkansas, Fayetteville (2)
-
- University of Central Florida (2)
- University of Nevada, Las Vegas (2)
- Chapman University (1)
- Claremont Colleges (1)
- College of the Holy Cross (1)
- East Tennessee State University (1)
- Georgia State University (1)
- Gettysburg College (1)
- Illinois State University (1)
- Linfield University (1)
- Merrimack College (1)
- Montclair State University (1)
- Nova Southeastern University (1)
- Pepperdine University (1)
- Philadelphia College of Osteopathic Medicine (1)
- Regis University (1)
- Trinity College (1)
- University at Albany, State University of New York (1)
- University of Connecticut (1)
- University of New Haven (1)
- University of South Carolina (1)
- University of Tennessee, Knoxville (1)
- Walden University (1)
- Publication
-
- Browse all Theses and Dissertations (3)
- Qisheng Pan (3)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Theses and Dissertations (2)
- Graduate Theses and Dissertations (2)
-
- CMC Senior Theses (1)
- Cas Mudde (1)
- Communication Faculty Publications (1)
- Criminal Justice Faculty Publications (1)
- Criminology Faculty Publications (1)
- Department of Conflict Resolution Studies Theses and Dissertations (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Doctoral Dissertations (1)
- Dylan Kissane (1)
- ENGIN I ERDEM Dr. (1)
- Economics Department Working Papers (1)
- Faculty Publications (1)
- Graduate Research - Criminal Justice (1)
- Graduate Research Symposium (GCUA) (2010 - 2017) (1)
- Honors College Theses (1)
- Honors Scholar Theses (1)
- Joshua P Monroe (1)
- Legacy Theses & Dissertations (2009 - 2024) (1)
- PCOM Psychology Dissertations (1)
- Pepperdine Policy Review (1)
- Regis University Student Publications (comprehensive collection) (1)
- Samuel W Bettwy (1)
- Senior Theses and Projects (1)
- Student Publications (1)
- Student Scholar Symposium Abstracts and Posters (1)
- Publication Type
- File Type
Articles 1 - 30 of 41
Full-Text Articles in Social and Behavioral Sciences
Essays On Battle Clusters In Internal Armed Conflicts And Insurgencies: Concept, Causes And Consequences, Chifeng Liu
Essays On Battle Clusters In Internal Armed Conflicts And Insurgencies: Concept, Causes And Consequences, Chifeng Liu
Theses and Dissertations
With the purpose to re-conceptualize the intensity of internal armed conflicts, I argue that the characteristics such as location, scale and duration of “major battlefields,” i.e. the spatio-temporal clusters of combat events are important in the evaluation of impact of modern civil wars and insurgencies. I start with elaborating and constructing a new concept of conflict magnitude with battle clusters using up-to-date geo-referenced data and spatial statistic methods. In the second article, I first explain the location and duration of major battlefields. The findings indicate that an area with multiple non-state armed groups (NSAGs) is more likely to become main …
Factors That Shape U.S. Public Opinion On Foreign Policy, Julianne O'Connor
Factors That Shape U.S. Public Opinion On Foreign Policy, Julianne O'Connor
Student Scholar Symposium Abstracts and Posters
Measuring public opinion is an undertaking requiring precise methods and a clear vision, and even then results can be inconclusive. Yet, understanding how and why a democratic public thinks the way it does, and to what extent those thoughts influence policymakers, is essential to a democracy. This paper will use data from the American National Election Survey to discuss the relationship between level of support for the war on terror and level of perceived effectiveness. Values, political sophistication, knowledge, and self-efficacy can each be used to predict the level of support an individual has for the war on terror, and …
The Day Of The Cyber Wolf, Ryan K. Buch
The Day Of The Cyber Wolf, Ryan K. Buch
Regis University Student Publications (comprehensive collection)
Terrorism has become a concern for public safety and security and can take on many appearances. However, in recent years the dilemma that presents the most substantial endangerment to public security comes from the threat of leaderless terrorists, also known as "lone wolves." Due to the rapid advancement in technology over the past few decades, societies, specifically the United States, have become dependent upon it economically and socially. Terrorist organizations, as well as the lone wolf terrorist, understand that their enemies rely on technology in order to function and have recently redirected their efforts towards cyberspace. As a result, cyber-terrorism …
Jiahd In The Global Village: Al-Qaeda's Digital Radicalization And Recruitment Campaign, Katie Cannata
Jiahd In The Global Village: Al-Qaeda's Digital Radicalization And Recruitment Campaign, Katie Cannata
Honors College Theses
Following America’s “War on Terror,” al-Qaeda and its affiliates became highly decentralized in terms of organizational and media operations. Though mass media outlets continue to play a significant role in drawing attention to al-Qaeda’s transnational campaign, Salafi Jihadists have recently begun to rely on new media for purposes of legitimization and promotion. The Internet serves as a suitable platform for these groups’ media objectives since it is inherently anonymous and absent of censorship. Most importantly, the Internet facilitates al-Qaeda in reaching a global audience, which is made evident by the growing amount of Salafi Jihadist media that is translated or …
Post-9/11 Illegal Immigrant Detention And Deportation: Terrorism And The Criminalization Of Immigration, Stefany N. Laun
Post-9/11 Illegal Immigrant Detention And Deportation: Terrorism And The Criminalization Of Immigration, Stefany N. Laun
Student Publications
This paper analyzes the changes in immigration policy since the terrorist attacks of September 11, 2001 in terms of how immigrants are viewed in the United States. The goal is to address the recent criminalization of immigration in that the perceptions of terrorists and immigrants have become relatively synonymous since 2001. Although deportations have decreased, immigrant detention has increased significantly. Detention centers pose threats to the basic human rights of the immigrants residing in them, as well as perpetuate the culture of fear enveloping recent immigrants, whether they are legally or illegally in the country, and native United States citizens …
The Social Evolution Of Terror And Genocide Across Time And Geographic Space: Perspectives From Evolutionary Game Theory, Charles Anderton
The Social Evolution Of Terror And Genocide Across Time And Geographic Space: Perspectives From Evolutionary Game Theory, Charles Anderton
Economics Department Working Papers
This article uses evolutionary game theory to reveal the interpersonal and geographic characteristics of a society that make it vulnerable to a conquest from within by terrorist organizations and genocide architects. Under conditions identified in the space-less version of the model, entrepreneurs of violence can create the social metamorphosis of a peaceful people group into one that supports or does not resist violence against an out-group. The model is extended into geographic space by analyzing interactions among peaceful and aggressive phenotypes in Moore and von Neumann neighborhoods. The model also reveals policy interventions in which the social evolution of aggression …
The Expansion Of Executive Powers In Response To The Threat Of Bioterrorism Against Individuals And Agribusiness, Samuel W. Bettwy
The Expansion Of Executive Powers In Response To The Threat Of Bioterrorism Against Individuals And Agribusiness, Samuel W. Bettwy
Samuel W Bettwy
This paper examines and compares, in historical context, the expansion of governmental authority in response to threats of bioterrorism, one of which is aimed directly at people, the other of which is aimed directly at agribusiness. The examination reveals that there is a historical, natural tendency of the executive branch to expand its powers and that the legislative and judicial branches tend to defer to the executive branch during emergencies. The comparison reveals that, although there is such a natural attempt by the executive branch to expand its powers, such expansion has yielded more to concerns over individual rights and …
Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham
Time-Space Analysis Of Terrorist Planning Cycles, Michael Stephen Gerald Eastham
Graduate Theses and Dissertations
Terrorism is among the largest threats to national and international security in today's global community. Acts of terrorism have resulted economic and societal impacts throughout the world. Improvements in technology have increased the capacity of terrorists to maximize the impact of their actions. The increasing influence and prevalence of terrorist activity has demanded research focused on the prevention of terrorist acts. A known method of terrorism prevention is uncovering a plot during its planning and preparation phase. Terrorist planning can be evaluated based on how actors move through space and time prior to the execution of their attack. General patterns …
The Costs Of A Terrorist Attack On Terminal Island At The Twin Ports Of Los Angeles And Long Beach, Peter Gordon, James Moore, Harry Richardson, Qisheng Pan
The Costs Of A Terrorist Attack On Terminal Island At The Twin Ports Of Los Angeles And Long Beach, Peter Gordon, James Moore, Harry Richardson, Qisheng Pan
Qisheng Pan
This study is part of a research program to apply the Southern California Planning Model (SCPM) and similar economic impact models to estimate the economic losses from hypothetical but plausible terrorist attacks on various key infrastructure installations and other important sites.
This chapter we explore another dimension of potential terrorist attacks on the region's ports.
The Economic Impact Of A Terrorist Attack On The Twin Ports Of Los Angeles- Long Beach, Peter Gordon, James Moore, Harry Richardson, Qisheng Pan
The Economic Impact Of A Terrorist Attack On The Twin Ports Of Los Angeles- Long Beach, Peter Gordon, James Moore, Harry Richardson, Qisheng Pan
Qisheng Pan
The Los Angeles metropolitan region is a prime target for a terrorist attack. There are many specific targets: The Los Angeles International Airport (LAX), downtown high-rises, its theme parks, its freeways, and its ports, among many others. We have developed a spatially disaggregated economic impact model that can evaluate all of these and any other plausible attacks. In this paper, we estimate the economic impacts of an attack on the Los Angeles- Long Beach Twin Ports.
Tourism And Terrorism: The National And Interregional Economic Impacts Of Attacks On Major U.S. Theme Parks, Peter Gordon, Harry Richardson, James Moore, Ji Young Park, Sooung Kim, Qisheng Pan
Tourism And Terrorism: The National And Interregional Economic Impacts Of Attacks On Major U.S. Theme Parks, Peter Gordon, Harry Richardson, James Moore, Ji Young Park, Sooung Kim, Qisheng Pan
Qisheng Pan
This paper is one of a series of studies by our group on the economic impact of a variety of terrorist attacks in the United States. These studies use either or both of two economic impact models, SCPM (the Southern California Planning Model) and NIEMO (the National Interstate Economic Model). This research uses only the latter model and traces the interregional economic effects of attacks on major theme parks (13, including two clusters) located in a modest number of States (eight). The theme parks are identified by State but not by metropolitan area to mask specific identity. It is important …
International Norm Echoing In Rebel Groups: The Cases Of The Kosovo Liberation Army And The Liberation Tigers Of Tamil Eelam, Jennifer A. Mueller
International Norm Echoing In Rebel Groups: The Cases Of The Kosovo Liberation Army And The Liberation Tigers Of Tamil Eelam, Jennifer A. Mueller
Dissertations, Theses, and Capstone Projects
This research demonstrates that rebel groups use international norms in their discourse and echo patterns in the discourse of states and that they do so to promote their own legitimacy at key turning points in their conflicts. Which international norms rebel groups use most frequently is partially determined by the congruence of those norms with their local norms and beliefs and the degree to which a group's internal structure has become more hierarchical and specialized. Two rebel groups are examined in this study over the course of their conflicts: the Kosovo Liberation Army (KLA) and the Liberation Tigers of Tamil …
Ecology Of Terrorism: Cross-National Comparison Of Terrorist Attacks, Katharine A. Boyd
Ecology Of Terrorism: Cross-National Comparison Of Terrorist Attacks, Katharine A. Boyd
Dissertations, Theses, and Capstone Projects
The term terrorism is used to describe a large range of behaviors conducted by a wide variety of groups. Terrorist groups differ in ideology, size, financial support, group longevity, and the number of alliances with other terrorist groups. Relatedly, terrorist groups conduct different number of attacks with varying intents to cause fatalities using diverse forms of violence. This study uses ecological theory to contextualize terrorist violence as a product of terrorist group traits in relation to the environmental context. It is hypothesized that terrorist violence is associated with group traits in relation to the varying political, social, and religious contexts …
Opium Trade And Conflict In Afghanistan, Vivek Kumar Srivastava Dr.
Opium Trade And Conflict In Afghanistan, Vivek Kumar Srivastava Dr.
Vivek Kumar Srivastava Dr.
This paper explores the role of opium cultivation in Afghanistan and the world.
The Specter Of Intolerance: Understanding Religious Violence In Pakistan, Syeda Haider
The Specter Of Intolerance: Understanding Religious Violence In Pakistan, Syeda Haider
Honors Scholar Theses
The role of religion in Pakistani political and civil life has had a defining role in the political development of the nation. The country is now a breeding ground for religious extremism, with militant groups conducting brutal attacks against the Shia, Ahmedi, Christian and Hindu communities of Pakistan. There have been few explanations attempting to describe the problem of religious violence domestically, within Pakistan’s borders towards Pakistani citizens. This essay examines how, despite Pakistan’s initial conception as a secular state, the country has become haunted by intense religious violence. It links the lack of consensus around national identity with the …
Challenging The State: Evaluating The Effects Of Uneven Distribution Of Public Goods, Economic Globalization And Political Openness On Domestic Terrorism, Sambuddha Ghatak
Challenging The State: Evaluating The Effects Of Uneven Distribution Of Public Goods, Economic Globalization And Political Openness On Domestic Terrorism, Sambuddha Ghatak
Doctoral Dissertations
The end of Cold-War ushered in an era of global economic integration and political openness in terms of emerging democracies; the world celebrated the triumph of free market capitalism as the East European ex-communist countries and Third World countries of Asia and Africa placed market forces at the center of their policy. There seems to have been a breakthrough for the idea of the Manchester School, in terms of using economics as a means of international peace. On the other hand, however, the world is not at peace. The collapse of the “Soviet Empire” was followed by the emergence, or …
21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring
21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring
Graduate Theses and Dissertations
This study examines differences between users and nonusers of information communication technologies (ICTs) within the pre-incident planning processes for domestic terrorist movements operating within the United States. In addition, this study is the first quantitative exploration of the prevalence, types, and purposes of ICT use within terrorist movements, specifically environmental, far-right, and Islamic extremist movements. Using "officially designated" federal terrorism investigations from the American Terrorism Study (ATS), we analyzed extracted evidence of ICT usage among individuals (n =331) engaged in the pre-incident planning processes as members of terrorist movements between 1995-2011. While we find significant differences in terrorist ICT use …
18th Century Anarchism And Its Effect On Modern Day Domestic Terrorism, Mary A. Scott
18th Century Anarchism And Its Effect On Modern Day Domestic Terrorism, Mary A. Scott
Undergraduate Honors Theses
Anarchism is a political and socioeconomic force that has driven violent methods of social and political change for centuries. Relating Anarchism to these violent acts demonstrates a deep-seeded link to terrorism. Anarchism is one of the main forces behind modern day terrorism due to its long history alongside the ever evolving term terrorism. By connecting these two concepts, domestic terror groups can be better analyzed and understood, and future attacks from within the United States may be prevented.
The September 12, 2012 Rose Garden Address: President Barack Obama’S “9/11” Moment, Michael Eisenstadt
The September 12, 2012 Rose Garden Address: President Barack Obama’S “9/11” Moment, Michael Eisenstadt
Graduate Research Symposium (GCUA) (2010 - 2017)
Albert Einstein once said memory is deceiving given it is colored by the events of today. The old adage “history repeats itself” fails to illustrate the powerful capacity for memory to sustain and revise historical events. Presidents often inject memories of the past into public address to define troubling situations in ways that broad, national audiences can make sense of them. Barack Obama’s Rose Garden Address rejuvenates and exploits the public memory of September 11 in three ways: by (1) situating the attack on the U.S. Consulate in Benghazi as an extension of its timeline; (2) reaffirming the identity of …
Terrorism: Libya’S Role In The Instability Of The Region, Cara Rabe-Hemp, Cayla Comens
Terrorism: Libya’S Role In The Instability Of The Region, Cara Rabe-Hemp, Cayla Comens
Graduate Research - Criminal Justice
When media focuses its attention on the subject of terrorism, the country of Libya is not typically at the forefront of the discussion. However, Libya has a deep hand in terrorism dating back to when Colonel Muammar Qaddafi took control of the country in 1969. During the years that Qaddafi was in control, he financially backed terrorist organizations, who repeatedly aimed their sights on the United States and their allies. Even after the fall of Qaddafi’s regime, terrorism is still a part of the governmental strategy in the country. The attack in Benghazi against an American compound, which resulted in …
Vanguards No Longer: Challenges To Al Qaeda Leadership Of The Jihadist Community, Byron J. Doerfer
Vanguards No Longer: Challenges To Al Qaeda Leadership Of The Jihadist Community, Byron J. Doerfer
Senior Theses and Projects
2014 marks the first time that al Qaeda’s supremacy in the Jihadist community has been challenged. al Qaeda’s former franchise in Iraq, now called the “Islamic State,” has declared the organization responsible for 9/11 “Tyrants” and “Apostates.” The Islamic State has begun openly attacking al Qaeda’s official franchise in Syria, Jabhat al Nusra. These events are a consequence of the strategy of franchising that al Qaeda undertook following 9/11. The root of the issue between al Qaeda and its former Iraqi franchise is over a difference over the importance placed on popular support as a key ingredient in achieving the …
11 Eylül Terör Eylemleri Ve Küresel Düzen, Engin Erdem
11 Eylül Terör Eylemleri Ve Küresel Düzen, Engin Erdem
ENGIN I ERDEM Dr.
No abstract provided.
Terrorism, International., Jibey Asthappan
Terrorism, International., Jibey Asthappan
Criminal Justice Faculty Publications
International terrorism is a relatively new phenomenon considering the age of terrorism. Terrorism has been used for over 2,000 years, but international terrorism as we know it today was made possible by technological advances. This entry begins by reviewing pivotal historical events that led to terrorism's use, as well as the underlying reasons for terrorism today. The article then discusses the influence of political stability and culture on international terrorism. Finally, a brief discussion of counter-terrorism strategies highlights the means by which terrorism is prevented.
Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia
Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article examines the creation and implementation of pretrial Special Administrative Measures [SAMs], a version of pretrial solitary confinement now used most often to confine terror suspects in the federal criminal justice system. Through an in-depth archival study, this article brings attention to the importance of 20th-century criminal justice trends to the 21st-century response to the threat of terrorism, including an increasingly preventive focus and decreasing judicial checks on executive action. The findings suggest that practices believed to be excessive responses to the threat of terrorism are in fact a natural outgrowth of late modern criminal justice.
Deadly Premonition: Does Terrorist-Leader Psychology Influence Violence Lethality?, Clayton Besaw
Deadly Premonition: Does Terrorist-Leader Psychology Influence Violence Lethality?, Clayton Besaw
Electronic Theses and Dissertations
This thesis seeks to address a theoretical and empirical gap within terrorism studies, and more specially the study of terrorist-group lethality. This research updates a model of terrorist-group lethality by including terrorist-leader psychology as an individual-level variable in predicting terrorist-group lethality. Terrorist-leader statements were analyzed by using two novel coding schemes called Operational Code and Leadership Trait Analysis to create quantified measurements of leader cognitive beliefs and personality traits. The empirical portion of this study utilizes pooled cross-sectional time-series data within the framework of fixed effects and multi-level estimation models. The results find that terrorist-leader psychology, and more specifically Instrumental …
Managing Effective Collaboration Among Law Enforcement, Intelligence Services, And Military Forces In Fight Against Terrorism And Organized Crime, Cihan Demirhan
Electronic Theses and Dissertations
The fight against terrorism and organized crime require strong collaboration between public security organizations. Public security networks include several agencies that are not bound to each other with strong hierarchical ties. Because of a lack of the strong hierarchical structure, managing public networks is not similar to managing a single government agency. This study aims to examine the factors influencing network effectiveness in the public security sector. The main research questions of the study are: Which factors are important for effectiveness in public security networks? What is the role of inter-organizational trust among partner agencies? Which kind of leadership style …
Disrupting Islamophobia: Teaching The Social Construction Of Terrorism In The Mass Media, Krista Mcqueeney
Disrupting Islamophobia: Teaching The Social Construction Of Terrorism In The Mass Media, Krista Mcqueeney
Criminology Faculty Publications
This article presents a critical media literacy technique for teaching about the social construction of terrorism. In a post-9/11 context where the human rights of Arabs and Muslims in the United States and overseas are threatened by drone attacks, profiling, detentions, and hate crimes, educators must not shy away from this issue. I use visual media to engage students with three questions: (1) How do everyday Americans define “terrorism” and perceive “terrorists”? (2) Where do these images come from? (3) What are the consequences for domestic and foreign policy? Using students’ own socialization as a starting point, I challenge them …
Performance, Politics, And The War On Terror: "Whatever It Takes", Lindsey Mantoan
Performance, Politics, And The War On Terror: "Whatever It Takes", Lindsey Mantoan
Faculty Publications
Lindsey Mantoan reviews Performance, Politics, and the War on Terror: "Whatever It Takes" (by Sara Brady) for TDR: The Drama Review.
Review: The Bush Leadership, The Power Of Ideas, And The War On Terror, Dylan Kissane
Review: The Bush Leadership, The Power Of Ideas, And The War On Terror, Dylan Kissane
Dylan Kissane
No abstract provided.
Ebola And Bioterrorism, Joshua P. Monroe
Ebola And Bioterrorism, Joshua P. Monroe
Joshua P Monroe
This paper will be a comparison of the United States government’s reaction to the recent outbreak of Ebola and will compare this response with the potential response by the United States government toward an act of biological or chemical warfare. The paper will analyze these responses from a cultural, political, legal, and policy standpoint