• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 12
  • 11
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Preventing terrorism?

Tellidis, Ioannis January 2008 (has links)
This study examines the debates on nationalism, terrorism and conflict resolution, and intends to identify, on the one hand, the reasons why and the instances in which nationalist discourses usurp the notions of political violence and present it as a legitimate option for opposing a State, and on the other, whether there exist circumstances where conflict resolution techniques and approaches can be useful in isolating terrorist discourses from the nationalist ones, without necessarily criminalising the latter. The study employs a critical and discourse analysis approach to explaining ethno-nationalist and terrorist phenomena, arguing that a contextualisation of the nationalist and terrorist objects of study is necessary in order to comprehensively analyse the relationship between the two, and the instances where the former gives rise to the latter. The purpose of the study is to develop a theoretical framework for the understanding of nationalism and terrorism as interconnected practices, and looks into ways in which conflict resolution can intervene and prevent the infusion of the two. In order to test this framework, the thesis examines the Basque conflict and discusses how the discriminatory practices of the Francoist dictatorship towards the Basques played a catalytic role in their acceptance of violence as a legitimate vehicle of pursuit of the nationalist aim of independence, and how the radicalisation of counter-terrorist practices after the democratic transition further distanced the civil society from both the State and the militant group. The study analyses the role of the Basque civil society, and how it became the primary actor in the transformation of the conflict by rejecting violent practices from both the State and ETA, while at the same time promoting a more civic aspect of the Basque nationalist discourse. This attitude allows the thesis to conclude that, contrary to theories of conflict resolution, the State can combat terrorism most effectively when it allies with civil society in the alteration of perceptions that perpetuate violence, but instead favour a strictly political approach to the pursuit of political objectives, like self-determination.
32

FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?

Meyer, Aric 05 1900 (has links)
Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
33

Failed Integration, Alienation and the Rise of Homegrown Violent Islamist Extremism in Sweden : An institutional framework for analyzing Sweden’s terrorism prevention policy and practice

Eslahchi, Morteza January 2017 (has links)
In this thesis, I try to analyze how Sweden prevents violent Islamist extremism. First, by using alienation and network theories I explain how various socio-economic factors create an alienating environment in which individuals who have inappropriate social network can move towards violent Islamist extremism. Second, by analyzing the policy and practice of preventive work with a focus on activities of the National Coordinator Against Violent Extremism I try to identify achievements and shortcomings in this area, and eventually suggest how preventive work in Sweden can be improved.
34

U.S. Intelligence Reform A Bureaucratic Politics Approach

Schickler, Bonnie M. 01 January 2010 (has links)
This study investigates the current bureaucratic struggles that exist within the U.S. intelligence community as a result of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004. The first part of this research examines the history of intelligence reform in the United States beginning with the National Security Act of 1947. The second part provides an indepth discussion of the 2004 legislation as well as an examination of the main bureaucratic conflicts that have arisen between the Director of National Intelligence (DNI) and the rest of the U.S. intelligence community. This study used the bureaucratic politics model to explain the development of the current disagreements, the reasons behind the DNI‘s struggle for power, and the intelligence community‘s inability to adapt to the reform. This research determined that the current conflicts have occurred as a result of the unclear authorities issued to the DNI by IRTPA and have been further exacerbated by interest-driven intelligence agencies and a well-developed culture that has proven difficult to abandon. This research also provides insight into several alternative approaches that can be used to explain the current U.S. intelligence reform process. Additionally, recommendations were made for reducing the bureaucratic friction that currently exists within the intelligence community and to strengthen the overall authority of the Director of National Intelligence.
35

The threat of cyberterrorism: Contemporary consequences and prescriptions

Stocking, Galen Asher Thomas 01 January 2004 (has links)
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.

Page generated in 0.1108 seconds