Open Access. Powered by Scholars. Published by Universities.®

Social Control, Law, Crime, and Deviance Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social Control, Law, Crime, and Deviance

Breaking The Prison-Jihadism Pipeline: Prison And Religious Extremism In The War On Terror, Gabriel Rubin Mar 2019

Breaking The Prison-Jihadism Pipeline: Prison And Religious Extremism In The War On Terror, Gabriel Rubin

Gabriel Rubin

No abstract provided.


Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis Nov 2011

Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis

David May

This article examines attitudes about terrorism utilizing criminological literature about fear of crime and perceived risk of victimization and data from a statewide survey of 1,617 adults in Kentucky. Measures of both fear of terrorism and perceived risk of terrorism were geography based. The demographic variables had minimal impact on both perceived risk of terrorism and fear of terrorism, although gender was significantly related to both, suggesting a link based on socialization experiences of men and women. Although rural residence had a small but statistically significant relationship to perceived risk, it was not related to fear. The strongest predictor of …


Cyber Terrorism, Allen Gnanam Jan 2009

Cyber Terrorism, Allen Gnanam

Allen Gnanam

This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.