Query Result Set
Skip Navigation Links
   ActiveUsers:1667Hits:18408374Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
TERRORISTS (82) answer(s).
 
12345Next
SrlItem
1
ID:   119129


Addressing nuclear terrorism: an interdisciplinary approach / Yeon Jung Ji   Journal Article
Yeon Jung Ji Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
2
ID:   067863


Amateur soldiers, global wars: insurgency and modern conflict / Fowler, Michael C 2005  Book
Fowler, Michael C Book
0 Rating(s) & 0 Review(s)
Publication Westport, Praeger Security International, 2005.
Description xiii, 183p.
Standard Number 0275981363
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
050811355.0218/FOW 050811MainOn ShelfGeneral 
3
ID:   064694


Aptitude for destruction: organizational learning in five terrorist groups and its implications for combating terrorism / Jackson, Brian A; Baker, John C; Cragin, Kim; Parachini, John 2005  Book
Cragin, Kim Book
0 Rating(s) & 0 Review(s)
Publication Santa Monica, Rand Corporation, 2005.
Description xix, 84p.
Standard Number 0833037676
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
049899303.625/JAC 049899MainOn ShelfGeneral 
049900303.625/JAC 049900MainOn ShelfGeneral 
4
ID:   122621


Between the lines: the arms trade treaty imperils Indian interests / Suman, Mrinal   Journal Article
Suman, Mrinal Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
5
ID:   092999


Bolstering the state: a different perspective on the war on the jihadi movement / Mendelsohn, Barak   Journal Article
Mendelsohn, Barak Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Looking beyond the military component of the global war on terrorism this article identifies a multilateral and multidimensional effort to revamp the state-based order. This effort is guided by four principles: (i) states are the primary actors in the confrontation with the jihadi movement, and state sovereignty must be respected in the various cooperative counterterrorism efforts; (ii) as members in the international society, states hold obligations to the collective not to allow terrorists to use their territories to harm other states; (iii) because numerous states are weak, a special effort must be made to bolster states' capacities so that they will be able to realize their obligations to the society of states; and (iv) the enormous demands of capacity building necessitate particular emphasis on interstate cooperation, including the provision of assistance for weak states and sharing of best practices. The article then presents two spheres of action in the war on terrorism, indicative of this general design: the regime to suppress the financing of terrorism and states' efforts to reinforce control over their borders. It concludes by arguing that the implications of the efforts to reinforce the state-based order require that we pay it much closer attention.
        Export Export
6
ID:   074620


Bomb in the backyard / Zimmerman, Peter D; Lewis, Jeffrey G   Journal Article
Zimmerman, Peter D Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Key Words Nuclear Bomb  Osama Bin Laden  Terrorists 
        Export Export
7
ID:   084693


Boundary-creating processes and the social construction of thre / Tsoukala, Anastassia   Journal Article
Tsoukala, Anastassia Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Key Words Social Problem  Terrorists  Threat  Football Hooligans 
        Export Export
8
ID:   067183


Coalitions between terrorist organizations: revolutionaries, nationalists and islamists / Karmon, Ely R 2005  Book
Karmon, Ely Book
0 Rating(s) & 0 Review(s)
Publication Leiden, Martinus Nijhoff Publishers, 2005.
Description xiii, 425p.
Standard Number 9004143580
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
050500303.625/KAR 050500MainOn ShelfGeneral 
9
ID:   102520


Comments on professor Etzioni's terrorists: a distinct species / Anderson, Kenneth   Journal Article
Anderson, Kenneth Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Terrorism  Warfare  United States  Transnational Terrorism  Terrorists  Criminal Law 
Etzioni 
        Export Export
10
ID:   089740


Communication technologies and non-state actors / Singh, Gunjan   Journal Article
Singh, Gunjan Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract The revolution in communication technology could be said to have happened with the advent of the Internet and Mobile phones. Over the last three to four decades the mobile telephone technology has shown exponential growth. Today, this mode of communication has been used almost in every facet of life. It has significant amount of utility for the armed forces too. Moreover, this technology has become very handy for various non-state actors. In the recent past there are varous incidents where few terrorist groups have used this technology to their advantage. This article attempts to analyze how terrorists groups are cleverly using modern means of communication to their advantage with major emphasis on mobile phones.
        Export Export
11
ID:   128790


Confronting Africa`s sobels / Feldman, Robert L; Arrous, Michel Ben   Journal Article
Feldman, Robert L Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013-14.
Summary/Abstract While the phenomenon described in this article may appear to be an African problem, the Western world`s increasing involvement in fighting terrorists make it one that America`s military forces might encounter. Unfortunately, it could add a significant layer of complexity to US operation as American troops attempt to differentiate allies from enemies. In Africa, sometimes they are one and the same.
Key Words Africa  Terrorists  America 
        Export Export
12
ID:   129883


Containing maoist insurgency: an organisational approach / Raghavan, S V; Balasubramaniyan, V   Journal Article
Raghavan, S V Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
13
ID:   079848


Cult of the insurgent': its tactical and strategic implications / Hoffman, Bruce   Journal Article
Hoffman, Bruce Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract More important than the potential geographical spread of a specific weapon, tactic or expertise is the emulation or inspiration of the 'culture' surrounding a terrorist or insurgent movement. This article argues that a 'cult of the insurgent' has arisen as a result of the aura of success surrounding both the Iraqi insurgents in their ongoing confrontation with the United States military and Hezbollah in its confrontation in the northern summer of 2006 with Israel. Further, this 'cult of the insurgent' will prove the most critical factor in inspiring, motivating and animating the spread of lethal and destructive expertise among other terrorist and insurgent groups worldwide. In the future, therefore, our adversaries will likely conclude that the best and most cost-effective means to confront either a superpower or the superior, conventional military forces of an established nation-state is through a campaign reliant on terrorist and insurgent tactics involving stand-off attacks utilising IEDS (improvised explosive devices) and portable missiles and mortars1
Key Words Insurgency  Iraq  Terrorists 
        Export Export
14
ID:   026739


Death merchant: rise and Fall of Edurin P. Wilson / Goulden, Joseph C; Raffio, Alexander W 1984  Book
Goulden, Joseph C Book
0 Rating(s) & 0 Review(s)
Publication London, Sidgwick & Jackson, 1984.
Description 455p.
Standard Number 0283992131
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
032414355.3432092/GOU 032414MainOn ShelfGeneral 
15
ID:   072121


Decision to begin talks with terrorists: lessons for policymakers / Byman, Daniel   Journal Article
Byman, Daniel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract Governments have many means to begin a dialogue with terrorist groups. The offer of talks may lead terrorists' constituents to reduce their support for violence, and moderates within a group itself may also turn away from violence. Despite these potential benefits, even the consideration of entering discussions carries many risks. Talks with U.S. officials do indeed reward the use of terrorism, tangibly demonstrating that groups can kill innocents and yet become legitimate interlocutors-a reward that is costly both in terms of reducing the prevalence of this tactic worldwide and because it inevitably angers local allies fighting the groups. Moreover, talks often fail in a variety of ways, giving the terrorists a breathing space to rearm and organize and leaving the government looking foolish. Because talks often fail, policymakers should carefully explore whether the conditions are right for any hope of success before they begin a dialogue.
Key Words Terrorists  Talks  Policymakers 
        Export Export
16
ID:   123198


Deepening chaos in Sinai / Byman, Daniel; Elgindy, Khaled   Journal Article
Byman, Daniel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract THE GROWING instability in Egypt's Sinai Peninsula represents one of the most dangerous, and most anticipated, crises in the Middle East. Even before the 2011 Egyptian revolution, the security vacuum in the Sinai allowed criminals and terrorists, including those with an ideology akin to Al Qaeda's, to expand their operations. In the chaos after the revolution, these problems have worsened. Meanwhile, various Palestinian groups use the Sinai as a launching pad for attacks against Israel.
Key Words Palestine  Israel  Middle East  Egypt  Hamas  Al Qaeda 
Terrorists  Criminals  Gaza  Egyptian Revolution - 2011  Sinai  Sinai Peninsula 
Mohamed Morsi 
        Export Export
17
ID:   094511


Detecting and disrupting illicit nuclear trade after A.Q. Khan / Albright, David; Brannan, Paul; Stricker, Andrea Scheel   Journal Article
Albright, David Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
18
ID:   140349


Do terrorists win? rebels' use of terrorism and civil war outcomes / Fortna, Virginia Page   Article
Fortna, Virginia Page Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How effective is terrorism? This question has generated lively scholarly debate and is of obvious importance to policy-makers. However, most existing studies of terrorism are not well equipped to answer this question because they lack an appropriate comparison. This article compares the outcomes of civil wars to assess whether rebel groups that use terrorism fare better than those who eschew this tactic. I evaluate the advantages and disadvantages of terrorism relative to other tactics used in civil war. Because terrorism is not a tactic employed at random, I first briefly explore empirically which groups use terrorism. Controlling for factors that may affect both the use of terrorism and war outcomes, I find that although civil wars involving terrorism last longer than other wars, terrorist rebel groups are generally less likely to achieve their larger political objectives than are nonterrorist groups. Terrorism may be less ineffective against democracies, but even in this context, terrorists do not win.
Key Words Terrorism  Terrorists  Rebels  Civil War Outcomes  Use of Terrorism 
        Export Export
19
ID:   052568


Dynamic terrorist threat: an assessment of group motivations and capabilities in a changing world / Cragin, Kim; Daly, Sara A. 2004  Book
Cragin, Kim Book
0 Rating(s) & 0 Review(s)
Publication Santa Monica, Rand Corporation, 2004.
Description xx, 106p.
Standard Number 0833034944
        Export Export
Copies: C:1/I:0,R:1,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
048296303.625/CRA 048296MainOn ShelfReference books 
20
ID:   126320


E-bandits in global activism: WikiLeaks, anonymous, and the politics of no one / Wong, Wendy H; Brown, Peter A   Journal Article
Wong, Wendy H Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract In recent years, WikiLeaks and Anonymous have made headlines distributing confidential information, defacing websites, and generating protest around political issues. Although many have dismissed these actors as terrorists, criminals, and troublemakers, we argue that such actors are emblematic of a new kind of political actor: extraordinary bandits (e-bandits) that engage in the politics of no one via anonymizing Internet technologies. Building on Hobsbawm's idea of the social bandit, we show how these actors fundamentally change the terms of global activism. First, as political actors, e-bandits are akin to Robin Hood, resisting the powers that be who threaten the desire to keep the Internet free, not through lobbying legislators, but by "taking" what has been deemed off limits. Second, e-banditry forces us to think about how technology changes "ordinary" transnational activism. Iconic images of street protests and massive marches often underlie the way we as scholars think about social movements and citizen action; they are ordinary ways we expect non-state actors to behave when they demand political change. E-bandits force us to understand political protest as virtual missives and actions, activity that leaves no physical traces but that has real-world consequences, as when home phone numbers and addresses of public officials are released. Finally, e-banditry is relatively open in terms of who participates, which contributes to the growing sense that activism has outgrown organizations as the way by which individuals connect. We illustrate our theory with the actions of two e-bandits, Anonymous and WikiLeaks.
        Export Export
12345Next