Open Access. Powered by Scholars. Published by Universities.®
Social Control, Law, Crime, and Deviance Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- File Type
Articles 1 - 3 of 3
Full-Text Articles in Social Control, Law, Crime, and Deviance
Breaking The Prison-Jihadism Pipeline: Prison And Religious Extremism In The War On Terror, Gabriel Rubin
Breaking The Prison-Jihadism Pipeline: Prison And Religious Extremism In The War On Terror, Gabriel Rubin
Gabriel Rubin
No abstract provided.
Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis
Predictors Of Fear And Risk Of Terrorism In A Rural State, David May, Joe Herbert, Kelly Cline, Ashley Nellis
David May
This article examines attitudes about terrorism utilizing criminological literature about fear of crime and perceived risk of victimization and data from a statewide survey of 1,617 adults in Kentucky. Measures of both fear of terrorism and perceived risk of terrorism were geography based. The demographic variables had minimal impact on both perceived risk of terrorism and fear of terrorism, although gender was significantly related to both, suggesting a link based on socialization experiences of men and women. Although rural residence had a small but statistically significant relationship to perceived risk, it was not related to fear. The strongest predictor of …
Cyber Terrorism, Allen Gnanam
Cyber Terrorism, Allen Gnanam
Allen Gnanam
This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.