• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 5
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 110
  • 57
  • 30
  • 26
  • 26
  • 24
  • 23
  • 22
  • 20
  • 20
  • 17
  • 16
  • 16
  • 16
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

From Pulling the Trigger to Pushing the Button: Historical Precedents for Targeted Killings and Signature Strikes

Mencini, Damian January 2014 (has links)
Thesis advisor: Charles Gallagher / Thesis advisor: Peter Krause / Drone strikes are sensational events. The United States Government uses remotely piloted aircraft (or drones) equipped with precisions weapons systems to unilaterally hunt and kill its enemies across the globe. The American public, and many around the world, are startled by the pervasiveness of American lethal force. In many ways, drone strikes are unprecedented. The technology, the frequency of use, and the geographic scope are all by-products of the twenty-first century. However, the United States government has a deep history of debating whether to kill individual enemies, and has a history of authorizing operations to do so. Beneath the rhetoric, the arguments, and the opinions that dominate drone policy today there is something missing: the history. This thesis argues that there are historical precedents for targeted killings and signature strikes in American history that predate the September 11 terrorist attacks and examining these past operations can inform modern policy. / Thesis (BA) — Boston College, 2014. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: College Honors Program. / Discipline: History.
12

The Drone and the Dove: Fighting Al-Qa'ida While Negotiating Peace in Yemen

Chauhan, Shashank 27 October 2016 (has links)
International conflicts are becoming more complex. Many involve multiple intra-state parties with multiple and at times opposing interests. With increasing globalization and the resulting growth in connectivity, the United States and other Western nations will likely find themselves increasingly involved in these conflicts. Recent history has shown that the ‘military option’ is not as effective as previously thought in dealing with inter-state conflicts. Thus, studies that explore other options in the management and resolution of these conflicts are critical. This thesis will explore and analyze the option of a systems theory based model as a model for conflict resolution by specifically analyzing the use of such a model in the present conflict in Yemen.
13

How Do Counterterrorism Policies Influence Domestic Terrorism on Military Installations

Monroe, Leona Rena 01 January 2017 (has links)
The Department of Defense (DoD) utilizes risk management to develop antiterrorism practices and policies on military installations. However, there is a gap in understanding the impact these practices have on the culture and relationship among military personnel and their civilians. Using Schneider and Ingram's conceptualization of social construction of target populations, the purpose of this ethnographic qualitative study was to understand the nature of the relationship between antiterrorism programs, culture, and risk management on a single military installation. Using a snowball sampling strategy, data were collected through semi-structured interviews with 12 participants who were either a civilian or military person on base. Using inductive reasoning, the data were then organized using thematic analysis by pre-established codes, although some codes emerged based on participant responses. The key finding emerging from this study focused on the theme that there are differences in how civilian and military personnel are trained in terrorism mitigation. Civilians reported that they had annual training, while the military reported more ongoing training. One consistent finding among both was that if employees saw something they should say something. The results of this study could facilitate positive social change by encouraging DoD leaders to promote collegiality in cross-training the military and civilians, by improving antiterrorism programs that impact all stakeholders. Specifically, civilian leaders and base commanders can work together to create more uniform policies for training that benefit the entire DoD. Such collegiality could strengthen the work culture and relationship among civilians and the military, as they have a joint duty in promoting safety and the reduction of terrorism on the base.
14

Determining Cost-effectiveness and Learning Impact of Government-funded Counterterrorism Training Programs

Jones, Jr, Ira D. 01 January 2017 (has links)
Since September 11, 2001, money and resources have been allocated at unprecedented levels in order to prevent future attacks on the United States. In the interest of preventing a similar type of incident, counterterrorism initiatives were funded using public funds with little or no oversight as to measuring the effectiveness of these programs. The purpose of this quantitative study was to determine if there was a statistically significant difference in the dependent variable - the level of awareness of participants (the ability to identify terrorism threats) who attended counterterrorism training that was solely lecture based and one that combined both lecture and demonstration. Three theoretical frameworks provided the foundation for this study: The organizational knowledge creation theory, adult learning theory and the experiential learning theory. The Solomon four-group design was employed using 412 test subjects who attended the Federal Bureau of Investigation's National Improvised Explosives Familiarization/Chemical Industry Outreach Workshop . The results of a factorial ANOVA revealed no statistically significant difference in posttest scores between the inexpensive lecture and the more expensive lecture and demonstrations methodologies; however, the results from the paired t test with a p < .001 did demonstrate cost-effectiveness with an average increase of 14 points in the level of awareness from pre- to posttest. The positive social change implications stemming from this study include recommendations to identify objective measures for program effectiveness in all government programs in compliance with the Administrative Procedures Act of 1981. If followed such actions would demonstrate good governance and are likely to increase the public's trust.
15

Social Media Effects on Millennials' Counterterrorism Type of Behaviors

Domasneanu-Miulescu, Laura C 01 January 2019 (has links)
Social media is a critical and omnipresent component in Millennials' lives. Using social media can lead to significant social change for societies both online and offline. Social media can be used as a tool to combat domestic and foreign terrorism and to protect our society. Prosocial perceptions and behaviors exhibited on a social media platform can transcend online social culture and produce replicas of those behaviors in the real world. Research in social activism portrayed by Millennials via social media is limited, and research regarding social media use and counterterrorism behaviors of Millennials has not yet been attempted. The current quantitative study assessed social media and its potential use for counterterrorism behaviors by Millennials by establishing if there were correlations between Millennials' social media usage and the existence or potential of using social media for counterterrorism behaviors. Reliability, exploratory factor analyses, as well as linear and hierarchical regression analyses were performed on a sample of 178 participants to establish if social media usage is predictive for counterterrorism behaviors while assessing if any variance is attributed to moderating variables. Positive relationships were found between social media preferences, networking power, and preferences for social responsibilities and counterterrorism behaviors. The survey used a modified instrument to address counterterrorism type behaviors in connection to social media usage, due to the inexistence of such instrument insofar. The results of the study contribute to social change by providing information on how to detect and increase counterterrorism behaviors and attitudes through social learning via social media platforms.
16

Adversarial Decision Making in Counterterrorism Applications

Mazicioglu, Dogucan 01 January 2017 (has links)
Our main objective is to improve decision making in counterterrorism applications by implementing expected utility for prescriptive decision making and prospect theory for descriptive modeling. The areas that we aim to improve are behavioral modeling of adversaries with multi objectives in counterterrorism applications and incorporating risk attitudes of decision makers to risk matrices in assessing risk within an adversarial counterterrorism framework. Traditionally, counterterrorism applications have been approached on a single attribute basis. We utilize a multi-attribute prospect theory approach to more realistically model the attacker’s behavior, while using expected utility theory to prescribe the appropriate actions to the defender. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. Next, we consider the use of risk matrices (a method widely used for assessing risk given a consequence and a probability pairing of a potential threat) in an adversarial framework – modeling an attacker and defender risk matrix using utility theory and linking the matrices with the Luce model. A shortcoming with modeling the attacker and the defender risk matrix using utility theory is utility theory’s failure to account for the decision makers’ deviation from rational behavior as seen in experimental literature. We consider an adversarial risk matrix framework that models the attacker risk matrix using prospect theory to overcome this shortcoming, while using expected utility theory to prescribe actions to the defender.
17

Protiteroristická politika Evropské unie: realita nebo fikce? / EU Counterterrorism policy: reality or fiction?

Čiháková, Barbara January 2012 (has links)
The aim of this thesis is to find out, whether the European Union is capable to propose and implement coherent, comprehensive, interoperable and robust counterterrorism measures in all the territories of member states. After the attacks in the USA and subsequently in Europe, the European politicians have started to discuss cooperation related to the fight against terrorism much more intensely. The question is, whether the newly adopted measures are effective and supported enough to have bigger impact on the global terrorism than those adopted at the national level.
18

Legal Uncertainty in EU’s Quest to Combat Terrorism – A Critical Examination of the Terrorism Directive’s Prohibition of Receiving Training for Terrorism and Travelling for the Purpose of Terrorism. / Rättsosäkerhet i EU:s Kamp mot Terrorism – En Kritisk Studie av Terrorismdirektivets Förbud mot Mottagande av Utbildning för Terrorismsyften och Resor för Terrorismsyften.

Harkkila, Anna January 2020 (has links)
No description available.
19

Themyth of 'soft power counterterrorism': A comparative historical framework evaluating deradicalization and countering violent extremism programs in the West

Murphy, Emily January 2017 (has links)
Thesis advisor: Jonathan Laurence / In the decade following the September 11, 2001 attacks on the United States, global focus has shifted towards analyzing how to combat terrorism. "Countering Violent Extremism" policies, or CVE, emerged as a means to combat the growing threat of extremist attacks against Western and Western-backed governments around the world. CVE promotes the use of deradicalization and integration techniques to develop trust in communities considered "at-risk" of becoming radicalized and executing extremist attacks. Problematically, CVE policies have been adopted and adored without having been scrutinized. I consider three historical cases of policies very similar to CVE, in France, Great Britain, and the United States, and analyze how CVE may distract from a concerning trend towards immigration, law enforcement, and military action instead of meaningful engagement. / Thesis (BA) — Boston College, 2017. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: Departmental Honors. / Discipline: Politicaql Science.
20

Does Sweden’s counterterrorism strategy correspond with the EU?

Ljungberg, Malin January 2019 (has links)
In this thesis, the norms used in Sweden’s counterterrorism strategy will be compared to the norms that are used in the European Union’s counterterrorism strategy. Sweden has been criticized by scholars and parties of the parliament for not implementing laws that are strict enough so that Sweden can sentence those who have travelled and joined terrorist groups like ISIS. The EU sets out strategies and directives as guidelines that its member states should adopt. The aim of this research is to see if Sweden’s is regressive in relation to the EU, or if Sweden’s way of handling counterterrorism is in line with the directives and strategies that EU set out for its member states. To be able to study this, content analysis is used to analyze material from Sweden and the EU that focus on how the work of counterterrorism should be done. With the use of norm theory, the central norms in the material is recognized, and the norms which Sweden uses is compared with the ones used within the EU. The comparison shows that there are differences in how the norms are used. Sweden has adopted norms from the EU and changed them to fit in the Swedish context which repeatedly refers to the importance of the norm’s compatibility with human rights.

Page generated in 0.0906 seconds