Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
701 result(s) for "Terrorists Case studies."
Sort by:
Exploring Patterns of Behaviour in Violent Jihadist Terrorists
An examination of the groups/cells and their 38 core individuals involved in the six most serious violent Jihadist terrorist conspiracies and attacks in the UK between 2004 and 2007 to see if they exhibited any specific types of behaviour.
FBI files. The Unabomber
\"[The author] presents the story of the FBI's investigation of the Unabomber and the agent who helped bring him to justice.\"-- Publisher's description.
The Alphabet Bomber
On August 6, 1974, a bomb exploded at Los Angeles International Airport, killing three people and injuring thirty-five others. It was the first time an airport had been bombed anywhere in the world. A few days later, police recovered a cassette tape containing a chilling message: \"This first bomb was marked with the letter A, which stands for Airport,\" said a voice. \"The second bomb will be associated with the letter L, the third with the letter I, etc., until our name has been written on the face of this nation in blood.\" In emThe Alphabet Bomber: A Lone Wolf Terrorist Ahead of His Time/em, internationally renowned terrorism expert Jeffrey D. Simon tells the gripping tale of Muharem Kurbegovic, a bright but emotionally disturbed Yugoslav immigrant who single-handedly brought Los Angeles to a standstill during the summer of 1974. He had conjured up the fictitious group \"Aliens of America,\" but it was soon discovered that he acted alone in a one-man war against government and society. The story of the Alphabet Bomber is about an extraordinary manhunt to find an elusive killer, a dogged prosecutor determined to bring him to justice, a pioneering female judge, and a devious mastermind whose heinous crimes foreshadowed the ominous threats we face today from lone wolf terrorists.
The terrorist's dilemma
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit?The Terrorist's Dilemmais the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environment to push them to organize in particular ways. Shapiro provides a historically informed explanation for why some groups have little hierarchy, while others resemble miniature firms, complete with line charts and written disciplinary codes. Looking at groups in Africa, Asia, Europe, and North America, he highlights how consistent and widespread the terrorist's dilemma--balancing the desire to maintain control with the need for secrecy--has been since the 1880s. Through an analysis of more than a hundred terrorist autobiographies he shows how prevalent bureaucracy has been, and he utilizes a cache of internal documents from al-Qa'ida in Iraq to outline why this deadly group used so much paperwork to handle its people. Tracing the strategic interaction between terrorist leaders and their operatives, Shapiro closes with a series of comparative case studies, indicating that the differences in how groups in the same conflict approach their dilemmas are consistent with an agency theory perspective. The Terrorist's Dilemmademonstrates the management constraints inherent to terrorist groups and sheds light on specific organizational details that can be exploited to more efficiently combat terrorist activity.
Assessing the Extent and Types of Hate Speech in Fringe Communities: A Case Study of Alt-Right Communities on 8chan, 4chan, and Reddit
Recent right-wing extremist terrorists were active in online fringe communities connected to the alt-right movement. Although these are commonly considered as distinctly hateful, racist, and misogynistic, the prevalence of hate speech in these communities has not been comprehensively investigated yet, particularly regarding more implicit and covert forms of hate. This study exploratively investigates the extent, nature, and clusters of different forms of hate speech in political fringe communities on Reddit, 4chan, and 8chan. To do so, a manual quantitative content analysis of user comments (N = 6,000) was combined with an automated topic modeling approach. The findings of the study not only show that hate is prevalent in all three communities (24% of comments contained explicit or implicit hate speech), but also provide insights into common types of hate speech expression, targets, and differences between the studied communities.
How Civil Wars End
Historically, civil wars ended in one-sided victory. With the end of the Cold War, however, the very nature of how civil wars end shifted: wars became two times more likely to terminate in negotiated settlement than in victory. Since the terrorist attacks of September 11, 2001, the proportion of victories has increased, especially for civil wars that include a terrorist group; wars are also ending less frequently. Why would civil war termination vary by time period? The literature on civil wars looks to three basic types of causes: domestic-structural factors, bargaining dynamics, and types of international intervention. Current explanations cannot account for why civil wars would end differently in different time periods because, as Kenneth Waltz might say, they are “reductionist” in nature. Material and ideational factors constitute the international political environment, which varies in different time periods. This environment drives outside actors’ normative strategies of viewing victory, negotiation, or stabilization as the appropriate solution to civil war. These norms, in turn, directly affect how civil wars end. A novel, three-part methodological approach using quantitative analysis, case studies, and original content analysis demonstrates that civil wars tend to end the way external actors think they ought to end.
CYBERHATE ON SOCIAL MEDIA IN THE AFTERMATH OF WOOLWICH: A CASE STUDY IN COMPUTATIONAL CRIMINOLOGY AND BIG DATA
This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen's process of warning, impact, inventory and reaction to delineate a sequence of incidents that come to constitute a series of deviant responses following the attack. This paper adds to contemporary debates in criminology and the study of hate crime in three ways: (1) it provides the first analysis of the escalation, duration, diffusion and de-escalation of cyberhate in social media following a terrorist event; (2) it applies Cohen's work on action, reaction and amplification and the role of the traditional media to the online context and (3) it introduces and provides a case study in 'computational criminology'.