Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Terrorism

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 145

Full-Text Articles in Other Political Science

Victims Of Terrorism At The Intersection Of Race And Gender, Charlotte Lang, Candice Ortbals Apr 2021

Victims Of Terrorism At The Intersection Of Race And Gender, Charlotte Lang, Candice Ortbals

Seaver College Research And Scholarly Achievement Symposium

El-Nawawy and El-Masry (2017) argue that media “devalue black lives” and “race, then, cannot be ignored as a factor” when considering the media and political treatment of terrorism’s victims (2017, 1810). Furthermore, media give less coverage to victims of terrorism in attacks occurring in countries outside the Global North (Nevalsky 2015). In this paper, we theorize race and terrorism along with gender. We discuss the ways that scholarship, media, and political actors give (or do not give) attention to victims of terrorism. We show through a historical analysis of Rapoport’s waves of terrorism and an analysis of recent cases of …


Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills Mar 2020

The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills

Honors Theses

As foreign fighters, who had previously traveled to the Middle East to conduct operations under the flag of ISIL (Islamic State of Iraq and the Levant), return to the Philippines and other countries in Southeast Asia, they are bringing their ideologies and knowledge of terrorist operations with them. In addition to tracking the growing trend of terrorist attacks being conducted in the Philippines in the name of ISIL, it is crucial to determine how these returning fighters are gathering the funds and resources necessary to carry out these attacks and establish new terrorist cells. This question of how returning terrorists …


Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor May 2019

Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor

MSU Graduate Theses

The geostrategic environment since the end of the Cold War has drastically changed the way United States (U.S.) policymakers develop strategies to combat a wide range of hostile threats facing the country, especially in the field of the deterrence of weapons of mass destruction (WMDs). Iran is such an actor, who poses one of the greater proliferation threats in the world and continues to commit hostile actions in the Middle East. In this post-Cold War environment, it is imperative that the United States develop a tailored deterrence strategy to meet this challenge. Past deterrence strategies popular during the bipolar era …


Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor Aug 2018

Counterterrorist Profiling, The Self, And The Problem Of Open And Quiet Skies, Ibpp Editor

International Bulletin of Political Psychology

Psychological profiling supporting counterterrorism may be based on an invalid presumption.


A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani Jan 2018

A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani

Honors Undergraduate Theses

During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment strategies through the perspectives …


Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi May 2017

Proliferating A Culture Of Fear: Islam In A Post 9/11 America, Setareh Motamedi

Political Science Student Papers and Posters

The threat of terrorism perceived by the American public has been shaped by a series of traumatic events over the past decade. In the years following the attacks of September 11, 2001, fear of terrorism has extended beyond the threat of terrorist groups. Much of the American public considers not only terrorist groups like al-Qaeda, but the entire religion of Islam to be a security threat. In much of this security discourse, ideas of hatred, violence, and terror have become associated with Islam. This study explores that association, and aims to identify what motivates existing stereotypes. Drawing on research from …


The Longevity Of Religious Terrorist Organizations, William John Hughes Jan 2017

The Longevity Of Religious Terrorist Organizations, William John Hughes

Senior Projects Spring 2017

Senior Project submitted to The Division of Social Studies of Bard College.


Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo Jan 2017

Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo

Theses and Dissertations

The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals are characterized by their lack of formal affiliation with terror organizations, making them difficult to intercept with traditional intelligence techniques. The radicalization of individuals on the internet poses a considerable threat to law enforcement and national security officials. This new medium of radicalization, however, also …


Does Isis Satisfy The Criteria Of An Apocalyptic Islamic Cult? An Evidence-Based Historical Qualitative Meta-Analysis, Diane Maye Zorri, Bruce Barron Jan 2017

Does Isis Satisfy The Criteria Of An Apocalyptic Islamic Cult? An Evidence-Based Historical Qualitative Meta-Analysis, Diane Maye Zorri, Bruce Barron

Publications

The U.S. has been battling ISIS and its forerunners for over two decades; however, ISIS continues to endure and expand. While described as a death cult by some political leaders and other key stakeholders, this assertion received little consideration in the scholarly literature. The purpose of this study was to ascertain whether ISIS satisfied the criteria of an apocalyptic Islamic cult through the application of a historical qualitative research design and meta-analysis. Based on the results, the null hypothesis that ISIS does not satisfy the criteria of an apocalyptic Islamic cult was rejected, and the hypothesis that ISIS satisfies the …


A Theoretical Analysis Of Isis Indoctrination And Recruitment, Trevor Hawkins Dec 2016

A Theoretical Analysis Of Isis Indoctrination And Recruitment, Trevor Hawkins

Capstone Projects and Master's Theses

This paper is an attempt to use various theories in the social sciences as a tool to understand the mechanisms employed in ISIS indoctrination and recruitment tactics. There is a discussion of theories that have been developed in the field of influence psychology, rationalizing the context of indoctrination within this area of study. There is a discussion of proposedly relevant materials in philosophy, specifically simulacrum and linguistic deconstruction. These components are extrapolated to interpret a first person account of ISIS indoctrination, the first-ever ISIS recruitment film, and a Radical-Islamist periodical Inspire Magazine. Using a form of propaganda film analysis, and …


Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv Jun 2016

Headhunting: Evaluating The Disruptive Capacity Of Leadership Decapitation On Terrorist Organizations, Ted Clemens Iv

Dissertations, Theses, and Capstone Projects

Leadership decapitation -- the practice of removing a leader from a position of authority through targeted killing (i.e. assassination) or arrest -- has long been a feature of counter-terrorism and counter-insurgency strategies the world over. Still, how effective is the practice of leadership decapitation in actually bringing a halt to, or even impeding, terrorist activity? Can removing top leaders of terrorist enclaves from power disrupt their groups to the point of organizational degradation or dissolution? And lastly, because no two terrorist groups are the same; when a terrorist group experiences leadership loss, how can the group be expected to react? …


Support For Suicide Terrorism In Egypt, Matthew J. Pastoria Jan 2016

Support For Suicide Terrorism In Egypt, Matthew J. Pastoria

Williams Honors College, Honors Research Projects

Evaluating the factors that affect support for suicide terrorism in Egypt based upon the PEW Research Center's Global Attitudes Project data from 2014.


The Psychology Of Terrorism And Radicalization, Gina K. Dejacimo Jan 2015

The Psychology Of Terrorism And Radicalization, Gina K. Dejacimo

Williams Honors College, Honors Research Projects

Terrorism and radicalized political groups are an ever-growing subsection of the American and international news cycles. Mainstream media outlets tend to focus on the atrocious actions of terrorists, leaving the American public without a true understanding of what encourages someone to become a violent, radicalized extremist. This paper intends to investigate possible psychological factors that can predict a person’s likelihood to become radicalized and participate in a salafi jihadi terrorist campaign. If such psychological conditions exist, perhaps they are the key to preventing radicalization in the first place, and in turn, the key to preventing any terrorist activity. What other …


The Specter Of Intolerance: Understanding Religious Violence In Pakistan, Syeda Haider May 2014

The Specter Of Intolerance: Understanding Religious Violence In Pakistan, Syeda Haider

Honors Scholar Theses

The role of religion in Pakistani political and civil life has had a defining role in the political development of the nation. The country is now a breeding ground for religious extremism, with militant groups conducting brutal attacks against the Shia, Ahmedi, Christian and Hindu communities of Pakistan. There have been few explanations attempting to describe the problem of religious violence domestically, within Pakistan’s borders towards Pakistani citizens. This essay examines how, despite Pakistan’s initial conception as a secular state, the country has become haunted by intense religious violence. It links the lack of consensus around national identity with the …


Terrorism: Libya’S Role In The Instability Of The Region, Cara Rabe-Hemp, Cayla Comens Apr 2014

Terrorism: Libya’S Role In The Instability Of The Region, Cara Rabe-Hemp, Cayla Comens

Graduate Research - Criminal Justice

When media focuses its attention on the subject of terrorism, the country of Libya is not typically at the forefront of the discussion. However, Libya has a deep hand in terrorism dating back to when Colonel Muammar Qaddafi took control of the country in 1969. During the years that Qaddafi was in control, he financially backed terrorist organizations, who repeatedly aimed their sights on the United States and their allies. Even after the fall of Qaddafi’s regime, terrorism is still a part of the governmental strategy in the country. The attack in Benghazi against an American compound, which resulted in …


Vanguards No Longer: Challenges To Al Qaeda Leadership Of The Jihadist Community, Byron J. Doerfer Apr 2014

Vanguards No Longer: Challenges To Al Qaeda Leadership Of The Jihadist Community, Byron J. Doerfer

Senior Theses and Projects

2014 marks the first time that al Qaeda’s supremacy in the Jihadist community has been challenged. al Qaeda’s former franchise in Iraq, now called the “Islamic State,” has declared the organization responsible for 9/11 “Tyrants” and “Apostates.” The Islamic State has begun openly attacking al Qaeda’s official franchise in Syria, Jabhat al Nusra. These events are a consequence of the strategy of franchising that al Qaeda undertook following 9/11. The root of the issue between al Qaeda and its former Iraqi franchise is over a difference over the importance placed on popular support as a key ingredient in achieving the …


An Analysis Of The Effectiveness Of The Director Of National Intelligence (Dni) In Uniting The Intelligence Community, Bethany G. Pico Apr 2013

An Analysis Of The Effectiveness Of The Director Of National Intelligence (Dni) In Uniting The Intelligence Community, Bethany G. Pico

Senior Honors Theses

September 11, 2001 marks the date of the largest attack on American soil since the Japanese attack on Pearl Harbor during World War II. This event not only changed the lives of individuals who suffered intense loss but changed the course of American history in several ways. This paper focuses specifically on the changes in the intelligence community since the attacks. The attacks that 9/11 presented flaws in the system created demonstrating weakness as a direct result of the immense destruction that occurred. The thesis of this paper is to analyze, assess, and draw conclusions on the effectiveness of the …


Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor Jul 2012

Do "Suicide Bombers" Really Commit Suicide?, Ibpp Editor

International Bulletin of Political Psychology

By Israel Oron (Ostre), Ph.D., Psychologist, National Program for Suicide Prevention, Ministry of Health, Israel, and The Department for Psychology, Health and Ethics/ University of Haifa, Israel.

[Dr. Oron (Ostre) was formerly Psychologist, Behavior Section/The Department of Criminal Investigations & Intelligence, Israel Police HQ].

This article applies a psychological approach to explore and to explain the behavior of Palestinian terrorists who blow themselves up in the light of their own words. It is shown that terrorists have no suicidal intent; hence, their behavior is not an act of suicide. Psychological analysis point to a behavioral reaction to stress situations that …


Cyber Warfare: Explaining The Absence Of Physical Force Responses By States, Conor Mcfarland May 2011

Cyber Warfare: Explaining The Absence Of Physical Force Responses By States, Conor Mcfarland

Undergraduate Theses and Capstone Projects

This essay examines the unwillingness of nation-states to use physical force in response to cyber warfare. Specifically, the paper claims that uncertainties regarding international law, state sovereignty, definitions of the use of force, and the problem of attribution in cyberspace contribute to a state’s decision to forego responding to cyber-attacks by using physical force attacks in other domains (i.e., land, air, sea, and space). These concepts are considered within the framework of Neorealist theory and in reference to the literature on cyber warfare. The 2007 series of cyber-attacks on Estonia are utilized as a case study to further examine the …


The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor Jan 2011

The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the relevance of blame in the context of terrorism.


The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor Nov 2010

The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor

International Bulletin of Political Psychology

The author gives a psychological perspective on the security of aviation cargo shipments.


The Strange Fruit Of 9/11, Ibpp Editor Sep 2010

The Strange Fruit Of 9/11, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the 9/11/2001 terrorist attacks and the larger psychological narrative and context of the attacks. Stoicism is considered as a viable response.


American Graffiti: Musings On The Ground Zero Mosque, Ibpp Editor Sep 2010

American Graffiti: Musings On The Ground Zero Mosque, Ibpp Editor

International Bulletin of Political Psychology

The author discusses reactions and parallels to a mosque proposed near the site of the 9/11 attacks on the World Trade Center in public discourse.


Counterterrorism Intelligence Analysis: Language As Threat, Vulnerability, And Risk, Ibpp Editor Jul 2010

Counterterrorism Intelligence Analysis: Language As Threat, Vulnerability, And Risk, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the role of language in describing possible membership in or connection to al Qaeda.


An Update On Suicide Terrorism, Ibpp Editor Jun 2010

An Update On Suicide Terrorism, Ibpp Editor

International Bulletin of Political Psychology

The author considers the potential moral and ethical merits of suicide and suicide terrorism from a historical and philosophical perspective.


Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor May 2010

Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor

International Bulletin of Political Psychology

The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.


The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor May 2010

The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor

International Bulletin of Political Psychology

The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.


Terrorism And The Law: Show Trials And Why The Show Must Go On, Ibpp Editor Apr 2010

Terrorism And The Law: Show Trials And Why The Show Must Go On, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the nature and meaning of terrorism trials during the United States’ war on terror.


The Psychology Of Female Suicide Terrorism: Context And A Partial, Annotated Bibliography, Ibpp Editor Apr 2010

The Psychology Of Female Suicide Terrorism: Context And A Partial, Annotated Bibliography, Ibpp Editor

International Bulletin of Political Psychology

The author examines the phenomena of female suicide in the context of terrorism, and the reasons women suicide, examining selected sources on the topic.