Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
19,902 result(s) for "Terrorism- Political Science"
Sort by:
The 50 worst terrorist attacks
\"In the last 50 years, terrorists have committed hundreds of horrific acts of violence to further their causes. This accessible, single-volume text covers the most significant terrorist acts across contemporary history worldwide\"-- Provided by publisher.
The Age of Lone Wolf Terrorism
The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. InThe Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination.Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers-whether jihadists, white supremacists, or other antigovernment extremists-and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens.
Combating terrorism in the 21st century : American laws, strategies, and agencies
\"This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counter terrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events\"-- Provided by publisher.
The terrorist's dilemma
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit?The Terrorist's Dilemmais the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environment to push them to organize in particular ways. Shapiro provides a historically informed explanation for why some groups have little hierarchy, while others resemble miniature firms, complete with line charts and written disciplinary codes. Looking at groups in Africa, Asia, Europe, and North America, he highlights how consistent and widespread the terrorist's dilemma--balancing the desire to maintain control with the need for secrecy--has been since the 1880s. Through an analysis of more than a hundred terrorist autobiographies he shows how prevalent bureaucracy has been, and he utilizes a cache of internal documents from al-Qa'ida in Iraq to outline why this deadly group used so much paperwork to handle its people. Tracing the strategic interaction between terrorist leaders and their operatives, Shapiro closes with a series of comparative case studies, indicating that the differences in how groups in the same conflict approach their dilemmas are consistent with an agency theory perspective. The Terrorist's Dilemmademonstrates the management constraints inherent to terrorist groups and sheds light on specific organizational details that can be exploited to more efficiently combat terrorist activity.
Terrorism in Indonesia and the Perceived Oppression of Muslims Worldwide
Various motivations underlying terrorism uncovered by recent scholarship include the radicals' desire for Muslim unity, political interest, yearning to correct social and economic deprivation in the Muslim world, and simply anti-Westernism. This article focuses on the radicals' call for Muslim solidarity and how this tends towards becoming their primary motivation for perpetrating terrorism. It discusses how radical groups and individuals exaggerate the perceived oppression of Muslims worldwide and how this encourages their sympathizers in planning, fundraising and/or executing terrorist attacks. The so-called ummah solidarity discourse is coupled with the prevalence of the dogma that Muslims are targets of Western or foreign oppression. This has legitimized jihadist terrorists' use of violence and facilitated the recruitment of new terrorists. Besides regular crackdowns on terrorists and putting limitations on access to radical websites and other Internet sources, this article contends that the Indonesian security apparatuses and the Ministry of Foreign Affairs must work with the embassies from India, China and Myanmar based in Jakarta to nullify any likelihood of terror attacks on their embassy compounds or their citizens.
17N's philosophy of terror : an analysis of the 17 November revolutionary organization
\"This book uses a cross-disciplinary approach to examine the creation, development, ideology, and practice of the Marxist terrorist group 17N\"-- Provided by publisher.
Wars of Disruption and Resilience
Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resil­ient against a successful attack or recurring campaign. Addressing the con­cerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security. Demchak introduces a strategy of \"security resilience\" against surprise attacks for a cybered world that is divided between modern, digitally vulner­able city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history's few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders. Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.
Black markets and militants : informal networks in the Middle East and Africa
\"The emergence, and proliferation, of Islamist militant organizations, ranging from the Islamic State of Iraq and Syria (ISIS) and Al-Shabbaab in Somalia, to Boko Haram in Nigeria and other parts of West Africa, has once again demonstrated that political Islam is an important global political issue. It has also highlighted a number of challenging, but increasingly crucial analytical questions: How popular a force is militant Islam, and how is it distinguishable from more conservative and moderate forms of Islamic activism? Does the rise of Islamic militancy across many regions of the Muslim world represent a \"clash of civilizations,\" or is its emergence a result of locally embedded, but globally linked, economic and social forces? And, finally, given the considerable diversity of socioeconomic formations within Muslim societies when, and under what conditions, do religious rather than ethnic cleavages serve as the most salient source of political identification?\"-- Provided by publisher.
Terrorism in Indonesia after \Islamic State\
The emergence of the Islamic State (IS) movement in Indonesia in 2014 re-energized violent extremism in Indonesia. As a result of effective counterterrorism policing, however, IS networks have been decimated and the structure of jihadism in Indonesia has shifted from organizations to autonomous networks and cells, increasingly organized via the Internet.Although support for violent extremism in Indonesia remains marginal, cells of IS followers maintain a low-level capacity to conduct lethal attacks against civilian and government targets.