Query Result Set
Skip Navigation Links
   ActiveUsers:381Hits:19927243Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
STUDIES IN CONFLICT AND TERRORISM VOL: 41 NO 1-3 (13) answer(s).
 
SrlItem
1
ID:   158218


Attention getters : diaspora support for ethno–political organizations in the Middle East / Ayres, R William; Asal, Victor   Journal Article
Asal, Victor Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why do some ethno-political organizations get support from their diaspora while others do not? There is little analysis that examines why some organizations (both violent and nonviolent) get support. Using data on 112 organizations in the Middle East we examine how factors like the power of the organization, ideology, political behavior, and government treatment might impact the likelihood of an organization getting support from its diaspora. We argue that contentious political behavior should have the largest impact on such support. We find that those that do the best job of getting attention through visible action get the most support.
        Export Export
2
ID:   158225


Automatic Gait Recognition and its Potential Role in Counterterrorism / Condell, Joan   Journal Article
Condell, Joan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Closed-circuit television footage can be used to assemble an often-complex picture of an incident and aid in the identification of suspects after a crime or terrorist attack has occurred. For example, such footage allowed the police to not only identify the 7/7 London bombers but also to piece together the details of the bombers' movements prior to the attack. In the case of the London bombers little attempt was made to disguise their identities but where such identities are concealed it is possible to identify suspects based on other unique biometric characteristics such as the style of walk, referred to as gait. Gait feature–based individual identification has received increased attention from biometrics researchers. In this article, we propose a novel gait biometric methodology that could contribute to the counterterrorism effort and the identification of individuals involved in crime.
        Export Export
3
ID:   158219


Belgian and Dutch young men and women who joined ISIS : ethnographic research among the families they left behind / San, Marion van   Journal Article
San, Marion Van Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Since the end of 2012 a sizeable number of Belgian and Dutch young men and women have joined the armed conflict in Syria. According to recent estimates, there are 632 Belgian and 260 Dutch foreign fighters in Syria. Very little is known about the families these men and women come from. The research on which this article is based comprised ethnographic research among 26 families with at least one member who has left for Syria to join the armed struggle. In addition, former teachers of these youngsters were asked to reflect on their students' actions. The central question of this article is whether or not the families of youngsters who left for Syria played a supporting role in the departure decision and, therefore, the process of radicalization of the young men and women. To answer this question the families' perception of the armed struggle is described. Also discussed are signals of radicalization present prior to the youngsters' departure and actions taken by the families to prevent departure or alternatively facilitate their trip.
Key Words Belgian  Ethnographic Research  Dutch  ISIS  Young Men and Women 
        Export Export
4
ID:   158224


Enemy within? the connection between insider threat and terrorism / Beattie, Rona; BaMaung, David   Journal Article
Beattie, Rona Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract While the threat from terrorism has gained widespread acknowledgment over the last decade, the infiltration of organizations by “terrorist” insiders has not, and the potential dangers these individuals present has not been fully explored. There is a need to understand the wider aspects of insider threats, including motivations and attack methodologies, and to be able to demonstrate the potential devastation that could be caused. Organizations can attempt to mitigate the potential for insider infiltration by both terrorist and other hostile actors, and if such individuals were within an organization, there are procedures and strategies that can be employed to prevent exploitation of existing organizational vulnerabilities and detection of insiders. This article provides an informed and new approach to the connection between insider threat and terrorism.
Key Words Terrorism  Insider Threat  Enemy Within 
        Export Export
5
ID:   158226


Foreign fighters and transnational jihad in Syria / Mishali-Ram, Meirav   Journal Article
Mishali-Ram, Meirav Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Foreign fighters arrive in Syria from across the Muslim world, yet the configuration of their countries of origin remains a puzzle. Examining alternative explanations for joining transnational jihad, the article draws insights from the cases of Tunisia and Saudi Arabia, two major countries of foreign fighters' origin, compared with Egypt, from where limited figures of volunteers have joined the Syrian war. The article shows that the sources of volunteering fighters may be well understood in combined terms of religious sentiments and national politics. Foreign fighters come largely from Muslim countries where restrained state–Islamists relations channel Islamic grievances to transnational arenas.
Key Words Syria  Foreign fighters  Transnational Jihad 
        Export Export
6
ID:   158223


Individual behavior as a defense in the “war on cyberterror”: a system dynamics approach / Tsaples, Georgios; Armenia, Stefano   Journal Article
Tsaples, Georgios Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The problem of cyberterrorism, despite its contested nature, is an important area of research. Scholars agree that the most dangerous targets for such attacks are critical infrastructure and organizations that are vital to society due to their interconnectedness to the modern world and their increasing reliance on the cyber domain for their operations. Thus, their security and protection against cyberterrorism is of elevated importance. Given the lack of documented cases of cyberterrorism, the purpose of this article is to simulate the threat of a terrorist act on a critical infrastructure, using a computer virus and to investigate how the individual behavior of employees affects security.
        Export Export
7
ID:   158227


Jihadi-Salafism in Jordan and the Syrian conflict: divisions overcome unity / Wagemakers, Joas   Journal Article
Wagemakers, Joas Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Over the last decade, a rift has emerged among Jihadi-salafis in Jordan between the “Zarqawiyyun”—who see Abu Mus‘ab al-Zarqawi as their model and concentrate on combat—and the “Maqdisiyyun”—who want more scholarly guidance, emphasize the establishment of an Islamic State and follow Abu Muhammad al-Maqdisi. The conflict in Syria, however, offered options for both: a jihad against a reviled regime and the possibility to set up an Islamic state. It thus had the potential to unite the “Zarqawiyyun” and the “Maqdisiyyun.” This article analyzes why this did not happen.
Key Words Jordan  Syrian Conflict  Jihadi-Salafism 
        Export Export
8
ID:   158222


Logic of constitutional engineering: institutional design and counterterrorism from aristotle to arend Lijphart / Qvortrup, Matt   Journal Article
Qvortrup, Matt Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Originally conceived by Aristotle and Thomas Hobbes, comparative constitutional engineering in its modern form is a relatively new field of political science. It is based on the premise that political behavior and policy outcomes can be affected and shaped by institutional design such as, above all, electoral systems. The article provides an overview of the empirical literature underlying this branch of institutional counterterrorism. The article presents the logic of constitutional engineering from its classical origins and especially through the work of Arend Lijphart. It is suggested that Lijphart provides a new paradigm in the sense employed by Thomas Kuhn. The article provides original research in support of this showing that the presence of consensus institutions has better explanatory value than most social factors.
        Export Export
9
ID:   158217


Natural resource production and the risk of conflict recurrence / Roy, Vita   Journal Article
Roy, Vita Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Do different types of natural resources have varying impacts on the risk of conflict recurrence? Using a classification of high-value natural resources according to their lootability and obstructability, this article develops a framework bridging research on natural resources and conflict recurrence. I find evidence for the destabilizing character of easily lootable resources that is coherent across different conflict data. Non-lootable resources show little robust effects at first sight; but when introducing a measure of obstructability, the analysis uncovers varying effects of obstructable and non-obstructable resources that interact with the mode of conflict termination. Overall, the results underline the importance of attending to the lootability and obstructability dimension of natural resources when researching post-conflict risks in resource endowed states.
        Export Export
10
ID:   158221


Out with the old and … in with the old? a critical review of the financial war on terrorism on the islamic state of iraq and lev / Ryder, Nicholas   Journal Article
Ryder, Nicholas Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The aim of this article is to critically consider the effectiveness of the “Financial War on Terrorism” on the funding streams of the Islamic State of Iraq and Levant (ISIL). The article begins by identifying that the origins of the “Financial War on Terrorism” can be found in the international efforts to tackle money laundering. It then moves on to consider if the “Financial War on Terrorism” is able to tackle the funding streams of ISIL. The article concludes that the “Financial War on Terrorism” is no longer fit for the purpose to tackle the funding streams of ISIL.
        Export Export
11
ID:   158228


Political economy of the provos: inside the finances of the provisional ira—a revision / Woodford, Isabel; Smith, M L R   Journal Article
Smith, M L R Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Few academically rigorous accounts exist of the financial activities that sustained the rise of the Provisional Irish Republican Army (PIRA) during the Northern Ireland Troubles. Through a sustained methodology this study seeks to challenge some popular preconceptions and address omissions in the limited historical record. The article explores the organization's evolving financial sophistication by analyzing PIRA's acquisition of capital rather than its arms dealings. Using a new quantitative evaluation, this investigation confronts the prevailing understanding that Irish-American funds were of unrivaled significance to PIRA. It points to an array of domestic fund-raisers that collectively provided the overwhelming bulk of revenue. The study reveals also how PIRA developed an extensive reliance on criminal gangs for its expertise in illegal fund-raising, suggesting that moneymaking schemes were perceived as a necessary but unpopular by-product of the greater political objective. Finally, this article briefly explores how the British authorities sought to interdict PIRA's funding. While the general perception is that little was done to counteract PIRA's financing initiatives in the early phases of its violent campaign, this study, nevertheless, reveals that a subtle counterfinance initiative did take place in Belfast across the 1970s. Overall, the analysis enables a more rounded comprehension of the group's financial resilience.
Key Words Political Economy  Finances  Provisional IRA  Provos 
        Export Export
12
ID:   158229


Settling on violence: expansion of Israeli outposts in the west bank in response to terrorism / Sinmazdemir, Tolga; Getmansky, Anna   Journal Article
Getmansky, Anna Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How does terrorism affect land control in intrastate conflicts? This article explores this question in the case of the Israeli–Palestinian conflict during the Second Intifada (2000–2005), and shows that Palestinian attacks led to an expansion of Israeli outposts in the disputed territories of the West Bank. Following suicide attacks, there is an increase in outposts in home districts of the perpetrators. The number of outposts also increases following deadly attacks against Israelis in West Bank districts where these attacks take place. These results suggest that Israeli settlers use outpost expansion as retaliation against Palestinian communities they perceive to be involved in violence, and this shifts territorial control against Palestinians.
        Export Export
13
ID:   158220


Terrorism where terror is not: Australian and New Zealand terrorism compared / Battersby, John   Journal Article
Battersby, John Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Despite many commonalities in national security priorities, Australia and New Zealand approach the threat of terrorism quite differently. Both had twentieth-century manifestations of domestic terrorism which were generally downplayed. The emergence of jihadist-inspired threats globally have affected Australia much more than New Zealand, and Australian counterterrorism strategy has developed significantly since 9/11. New Zealand has watched global events so far untouched by any jihadist threat, and has implemented few effective counterterrorism measures. The reasons for the differing experience, it is contended here, are the varying historical perceptions of threat, and consequent differing approaches each country has taken to mitigate perceived threat.
Key Words Terrorism  New Zealand  Australian  Terrorism Compared 
        Export Export