• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 69
  • 5
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 110
  • 57
  • 30
  • 26
  • 26
  • 24
  • 23
  • 22
  • 20
  • 20
  • 17
  • 16
  • 16
  • 16
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Srovnávací model světových zpravodajských komunit / Model of Comparison for World Intelligence Communities

Bouchard, Claire January 2018 (has links)
This thesis focuses on whether we can create a categorizational model for foreign intelligence communities and if we can identify factors that will help us predict those foreign intelligence communities' effectiveness in counterterrorism. In order to determine this, the author based one of her main factors on the 1995 Sederberg article that separates counterterrorism models into three main categories: (1) War Model, (2) Criminal Model, and (3) Disease Model. She also relates these models to three of the main geopolitical schools of thought as follows: (1) War Model - Realism, (2) Criminal Model - Liberalism, and (3) Disease Model - Constructivism. The second main factor analyzed here is the centralization of the intelligence community. This clearly affects the consistency of the counterterrorism message being encouraged by the state, as well as the speed with which the Intelligence Community can respond to an emergency situation. The key contributions of this thesis lie in the creation of the comparison model and the subsequent analysis of the six case studies. This model combines and acknowledges theories of counterterrorism effectiveness that have not been previously studied together and is also a useful comparison tool for foreign intelligence agencies without running into many of the same...
42

Israeli Precision Strikes after the Second Intifada: On Target or Missing the Mark?

Hawkins, Andrew January 2015 (has links)
During the Second Intifada, Israel shocked the international community by becoming the first country in the world to publically announce an overt policy of targeted-killing. While utilized by Israel in previous conflicts, the Second Intifada was a turning point in Israeli history due to a series of dramatic changes introduced to its targeting policy which would sharply contrast those which were previously utilized. This diploma thesis analyzed thirty-eight cases of Israeli targeting operations conducted both before and during the Second Intifada to determine if the changes made to its policy during the Second Intifada resulted in more or less successful targeting operations compared to those conducted prior to this time period. The results of this study indicated that, following the introduction of the aforementioned policy changes, Israeli targeting operations during the Second Intifada were less successful than those conducted prior to this time period.
43

STRETCHING THE BOUNDARIES OF COUNTERTERRORISM : A study on the evolution of extraterritoriality withinAmerican counterterrorism

Anjala-Ljungkvist, Kajsa January 2022 (has links)
This thesis sets out to research the phenomenon that is extraterritoriality within Americancounterterrorism, doing as such by analyzing four policy reports from four differentpresidential administrations. The purpose of this thesis is to research the evolution ofextraterritoriality within counterterrorism policy based on the knowledge that there has been achange regarding the matter, significantly following the events of the 11th of Septemberterrorist attacks in 2001. This thesis, however, researches more than merely before and afternine-eleven. By analyzing policy report from Bill Clintons, George W. Bush’s, BarackObamas and Donald Trumps administrations, the study examines the evolution ofextraterritoriality over a larger time period. The two research questions ask what the view ofextraterritoriality within American counterterrorism has been and, in what sense have changesbeen made within American counterterrorism regarding extraterritoriality.Extraterritoriality has challenged a foundational norm within the modern international worldand that is state sovereignty. Extraterritoriality can be described as one actor asserts theirjurisdiction over another actor within a specific territory of another state. In this thesis, theAmerican military base in Cuba called Guantanamo Bay will be frequently referenced to as anexample of a place where extraterritoriality is present, a so-called extraterritorial domain.In order to analyze the empirical material, a qualitative, descriptive textual analysis has beenused and dimensions have been used as an analytical tool in this thesis.The main conclusions drawn are that there has been an evolution of extraterritoriality withinAmerican counterterrorism during the time these four presidents were in office. The evolutionhas not, however, been simply linear and this study shows that extraterritoriality can bevisible in all the different policy reports. The amount of extraterritoriality noticeable andregarding which matters of extraterritoriality is the primary difference.
44

The Question of Homeland Security in Rural America

Gonzalez, Manuel 01 January 2016 (has links)
Following the issuance of the National Preparedness Guidelines in 2009 by the Department of Homeland Security, it remains unknown whether homeland security programs have been consistently implemented in the nation's rural areas. Research findings have been inconsistent and inconclusive on the degree of implementation. Two problems may result from inadequate implementation of these programs: weakened national security from the failure to protect critical infrastructure in remote areas and a threat to public safety in rural towns. The purpose of this qualitative case study was to explore and describe the reasons for possible noncompliance through purposeful interviews with 10 law enforcement officials and emergency managers in selected Midwestern rural towns. The study's theoretical foundation was based on Putnam's theory of social capital, which holds that community cohesion develops in direct relation to the adaptation of social networks that promote mutual cooperation during times of need. The research centered on the question of how rural emergency managers and law enforcement officials justified noncompliance with the National Preparedness Guidelines of 2009. The interviews and materials were transcribed and analyzed with qualitative analytic software using open, axial, and selective coding to identify themes and patterns. The study's key findings disconfirmed conclusions reported in previous studies and confirmed compliance with the Guidelines in the studied rural towns. Implications for positive social change include informing policymakers, emergency managers, law enforcement officials, and researchers. Application of social capital principles in all the nation's remote areas may enhance national security and improve rural public safety.
45

Patterns Within Nine Preattack Phases That Emerged in Israel Suicide Bombing Cases

Richman, Aaron 01 January 2018 (has links)
From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a private security organization in Israel and a maximum variation sampling procedure was used to identify cases. These data were subjected to Straus and Corbin's open and axial coding procedures. Coded data were analyzed using Merriam's cross case analysis procedure. Findings indicated that although the nine preattack phases emerged in both the successful and unsuccessful attacks, they were more consistently present in the successful bombing cases. For the successful attacks, general planning, financing, and operational preparation received the most occurrences. The implications for positive social change are directed at counterterrorist decision makers and operators as focusing on the early planning phases of a terrorist attack will help them to better identify essential opportunities to prevent suicide attacks from occurring.
46

A Duty to Share: The Opportunities and Obstacles of Federal Counterterrorism Intelligence Sharing with Nonfederal Fusion Centers

Gardner, Jeffrey V. 01 January 2017 (has links)
Little is known about how effectively federal agencies share terrorism intelligence with state and local governments through fusion centers. As a result, there is a risk that local governments do not receive critical intelligence that would allow them to collaboratively prevent catastrophic terrorist attacks. Using Dawes' interagency information sharing model, the purpose of this exploratory case study was to evaluate how effectively federal agencies share terrorism intelligence with fusion centers. Data were collected through interviews with 25 senior leaders, federal agents deployed to fusion centers, and intelligence analysts in 5 fusion centers on the East Coast. These data were inductively coded and then subjected to a thematic analysis procedure. Findings indicated that, among these leaders, information sharing was hindered by both technology and inter-organizational relationships between the fusion centers and federal agencies. Participants also noted that obstacles to information sharing regarding classified data has not been sufficiently mitigated. Dawes' interagency information-sharing theory was found to be explanatory regarding intelligence sharing activities. Implications for positive social change include recommendations to the Department of Homeland Security to utilize Dawes' work on information sharing in order to alleviate the tension between federal and local agencies and remove obstacles, particularly related to classified intelligence related to counterterrorism. Doing so can be useful in developing policy recommendations to improve the dynamics between federal and local agencies, thereby allowing critical information to be shared with state and local governments in a proactive manner that may better protect communities.
47

Countering Expansion and Organization of Terrorism in Cyberspace

Ogunlana, Sunday Oludare 01 January 2018 (has links)
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the open-source documents, government threat assessments, legislation, policy papers, and peer-reviewed academic literature and semistructured interviews with fifteen security experts in Nigeria. Yin's recommended analysis process of iterative and repetitive review of materials was applied to the documents analysis, including interviews of key public and private sector individuals to identify key themes on Nigeria's current effort to secure the nation's cyberspace. The key findings were that the new generation of terrorists who are more technological savvy are growing, cybersecurity technologies are effective and quicker tools, and bilateral/multilateral cooperation is essential to combat the expansion of terrorism in cyberspace. The implementation of recommendations from this study will improve the security in cyberspace, thereby contributing to positive social change. The data provided may be useful to stakeholders responsible for national security, counterterrorism, law enforcement on the choice of cybersecurity technologies to confront terrorist expansion, and organization in cyberspace.
48

Účinnost a důsledky protiteroristických strategií v Pákistánu: Kritické posouzení Národního akčního plánu / Effectiveness and consequences of counterterrorism strategies in Pakistan: A critical appraisal of National Action Plan

Wahab, Fazal January 2021 (has links)
This study explores and evaluates the effectiveness of the Counterterrorism (CT) policies of Pakistan, particularly, the National Action Plan (NAP) and military operations in Khyber Pakhtunkhwa and Tribal districts in the Pakistan-Afghanistan borderland. In this study, I argue that there is dearth of literature on the evaluation of effectiveness of CT policies particularly in the case of Pakistan. Using Eric Van Um & Daniela Pisoiu's Model of Effectiveness (2015), with concepts like Output effectiveness, Outcome effectiveness and Impact effectiveness, in this dissertation I argue that NAP and military operations in Tribal districts have been partially effective as it restored the government writ in different parts of the country and resulted in a steep decline in terrorist incidents. However, the plan is not highly effective as the threat of terrorism and extremism still exist. I also argue that the hard or military aspects of the NAP was executed soon after the plan was announced, however, to implement the soft aspects of the plan a lot still needs to be done. Nevertheless, CT polices of Pakistan failed to take into consideration the social and cultural aspects of Tribal districts. Therefore, I also contend that NAP and military operations in the Tribal districts resulted into socio-cultural...
49

Counterterrorism Cooperation Policy between the Federal Republic of Germany and Italy in the 1970s

di Fabio, Laura 31 January 2022 (has links)
In the 1970s, the concept of security was still strongly connected to territoriality and to a locally-based perception of emergency. The national-international nexus, shaped by the bipolarity of the Cold War, inevitably affected the perception of security in terms of what was recognized as existing inside and outside of the national sovereignty sphere. Over this decade, the definition of political opponents, state borders, territory and national sovereignty in Europe underwent a new attribution of meaning. Political armed violence made its first appearance, for example, as Europe had known only street riots and sporadic social conflicts until then. The international dimension taken on by armed political violence by the end of the 1960s challenged governments and security apparatuses to rethink their theoretical and logistical approaches to terrorist emergency on foreign soil.
50

The Use of Force: Hard Offensive Counterterrorism

Thomas, Daniel 30 August 2019 (has links)
No description available.

Page generated in 0.0947 seconds