Open Access. Powered by Scholars. Published by Universities.®

Communication Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Communication

The International Perception Of The Irish Republican Army And Chechen Insurgency, Henry Forteith May 2022

The International Perception Of The Irish Republican Army And Chechen Insurgency, Henry Forteith

International and Global Studies Undergraduate Honors Theses

This purpose of this project is to examine how the labels used to describe the Irish Republican Army and Chechen insurgency changed after certain acts of violence. This paper begins by describing the history of imperial subjugation of Ireland and Chechnya, as well as examining the similarities between the actions and motivations of the IRA and Chechen insurgency. Then, to study the change in language to describe these groups, two searches were conducted into the New York Times and International Newsstream databases. The first search examined articles about the IRA and Chechen insurgency published between 1998 and 2009, while the …


Extreme Far-Right Murder-Suicide Attacks In The U.S. And Germany: A Comparative Storyline Analysis, Hayden Lucas May 2021

Extreme Far-Right Murder-Suicide Attacks In The U.S. And Germany: A Comparative Storyline Analysis, Hayden Lucas

Graduate Theses and Dissertations

Despite increasing empirical research on suicide terrorism since the 9/11 terrorist attacks, prior studies have focused primarily on radical Islamic terrorism in non-Western contexts. As a result, less is known about how murder-suicide attacks committed by other ideological movements unfold, particularly the extreme far-right in North America and Europe. Researchers have begun to theorize the social and psychological processes believed to play a role in the radicalization of suicide terrorists. However, the observable, situational processes shaping radicalized individuals when planning, preparing for, and executing suicide terrorism remain underexplored. Therefore, the purpose of this study is to identify intervention points by …


Far-Right Extremism In America: A Geospatial Analysis Of Incident Distribution, Meredith Leann Lerma Jul 2020

Far-Right Extremism In America: A Geospatial Analysis Of Incident Distribution, Meredith Leann Lerma

Graduate Theses and Dissertations

There has been little empirical research on the spatial relationship of violent far-right extremism. Previous studies have only focused on portions of far-right violent incidents, such as homicides, or amalgamated all far-right extremist activity, including legal incidents. This study uses data from the Extremist Crime Database (ECDB) and Southern Poverty Law Center (SPLC) in a temporal frame of 2000 to 2018 to test the relationship of violent incidents against geographic and social factors. The goal is to explore the relationships between macro-level factors and violent far-right extremist incident. The research determines that the presence of hate groups, higher immigrant populations, …


21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring May 2014

21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring

Graduate Theses and Dissertations

This study examines differences between users and nonusers of information communication technologies (ICTs) within the pre-incident planning processes for domestic terrorist movements operating within the United States. In addition, this study is the first quantitative exploration of the prevalence, types, and purposes of ICT use within terrorist movements, specifically environmental, far-right, and Islamic extremist movements. Using "officially designated" federal terrorism investigations from the American Terrorism Study (ATS), we analyzed extracted evidence of ICT usage among individuals (n =331) engaged in the pre-incident planning processes as members of terrorist movements between 1995-2011. While we find significant differences in terrorist ICT use …