Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Other Political Science

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani Jan 2018

A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani

Honors Undergraduate Theses

During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment strategies through the perspectives …


Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv Jun 2016

Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv

Dissertations, Theses, and Capstone Projects

Leadership decapitation -- the practice of removing a leader from a position of authority through targeted killing (i.e. assassination) or arrest -- has long been a feature of counter-terrorism and counter-insurgency strategies the world over. Still, how effective is the practice of leadership decapitation in actually bringing a halt to, or even impeding, terrorist activity? Can removing top leaders of terrorist enclaves from power disrupt their groups to the point of organizational degradation or dissolution? And lastly, because no two terrorist groups are the same; when a terrorist group experiences leadership loss, how can the group be expected to react? …