• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 58
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 98
  • 65
  • 14
  • 13
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Why Female Suicide Bombers? A Closer Look at the Liberation Tigers of Tamil Eelam and Chechen Separatists

Campbell, Latisha T 01 January 2014 (has links)
The central hypothesis of this study is that terrorist organizations choose to use females as suicide bombers not only as tactical innovation but also to “signal” or send a message to various audiences. In order to meet the research objectives of this study, two terrorist organizations—the Liberation Tigers of Tamil Eelam and the Chechen Separatists or those individuals associated with the Chechen Resistance—are examined in detail from their inception through 2013 using a structured focused comparison methodology. Evidence is found to support both of the studies’ main hypotheses. First, female suicide bombers are used by terrorist organizations because they are a 1) tactical advantage, and 2) to “signal” or send a message to various audiences. Their “entertainment” or shock value maximizes the psychological punch intended for delivery to a variety of audiences. These two reasons are not mutually exclusive but are colored by contextual considerations unique to each case. While deliberation was given to a variety of socio-political factors unique to each organization—such as popular support for suicide attacks perpetrated by females, indication of rival terrorist organizations, counterterrorism and political events that may have affected the terrorist organizations’ preference for females—insight into the operational characteristics surrounding individual suicide attacks was central in highlighting patterns in the organizational use of female suicide bombers. Those patterns are consistent across both cases and suggest that when females’ use is explained by the tactical innovation model, they are used overwhelmingly in suicide attacks where getting closer to intended targets—usually defined as security and political targets—matter. In contrast, suicide attacks explained by the signaling model are characterized by their novelty usually representing a deviation from terrorist organizations’ operational norms—deemed operational suicide attack anomalies in this study—characterized many times as “only” suicide attacks, “firsts [of that kind of],” or the most spectacular suicide attacks carried out by the organization.
82

Assessing perceived credibility of web sites in a terrorism context the PFLP, Tamil Tigers, Hamas, and Hezbollah /

Spinks, Brandon Todd. Sahliyeh, Emile F., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2009. / Title from title page display. Includes bibliographical references.
83

Identity, society, and history in modern Korean plays three aspects of three modern Korean plays; Moonlight play, Material man, and Terrorists /

Park, Choon-Keun. January 2006 (has links)
Thesis (M.A.)--Miami University, Dept. of Theatre, 2006. / Title from first page of PDF document. Includes bibliographical references (p. 146-148).
84

The criminal behavior and motivations behind McVeigh's decision to bomb the Murrah Federal Building

Fetter, Mark Lawson 01 January 2002 (has links)
No description available.
85

An Analysis of Established Terrorist Identity in Political and Military Wings of Turkish Hizbullah

Cinoglu, Huseyin 08 1900 (has links)
The influence of the role identity expectations of Turkish Hizbullah's leadership on actual members' terrorist identities was documented in this dissertation. This study explored the leadership's identity expectations from members through content analyses of four books written by major figures of Hizbullah. Those books were selected following comments of the literature and expert suggestions. Eleven identity features stood out. These content analyses also revealed that leadership had different expectations from political wing members and military wing members. The following six identity features were listed as expected more from military wing members: belief in jihad and resistance, desire for martyrdom, embracing the hierarchical structure, depersonalization, hatred against enemies of God, and aloneness. Whilst cemaat (religious congregation), being religiously educated, patience (gradualism), dedication to a Muslim brotherhood, and being politically active were listed as expected identity attributes of political wing members. Qualitative analyses investigated these identity features using the available literature and 144 handwritten reports of actual Hizbullah members. To confirm the findings of content and qualitative analyses, quantitative analyses were conducted on the relatively representative sample (144 reports). The results of cross-tabulation and logistic regression demonstrated that two (out of 6) military wing and two (out of 5) political wing identity expectations were not manifested on actual members' Hizbullah identities.
86

Leadership in times of terrorism threat : An Analysis of George W. Bush’s and Barack Obama’s leadership qualities concerning counterterrorism

Stier, Luisa January 2020 (has links)
While the US-presidency comprises the most powerful office of leadership in the world and has also been investigated at various angles in personal, biographical approaches as well as comparative studies, this research paper specifically lays focus and compares the two presidencies of President Bush and President Obama in regard of their leadership qualities and counter-terrorism strategies. Because counterterrorism seems to be a good example of how presidents perform crises-management and because the subject by itself is critical in the perspective of human rights and security concerns, the research paper has chosen to focus on President Bush and President Obama who are known to have chosen different routes and strategies in countering terrorism. However, when comparing the two presidents’ leadership qualities regarding their counter-terrorism strategies, this paper concludes that on this matter the strategies of the two presidents were not quite so different as expected and a possible path of continuity runs through this realm of US-foreign affairs and presidents’ leadership decisions.
87

Profil psychologique clinique et organisationnel du terroriste: recherche empirique et étiologique qualitative et quantitative sur les paramètres critiques de personnalité de 90 terroristes appartenant à 10 organisations terroristes au Moyen-Orient et sur le degré d'homogénéité organisationnelle en termes des caractéristiques psychologiques des individus qui les composent

Gottschalk, Michel Y.J.J. January 1996 (has links)
Doctorat en sciences psychologiques / info:eu-repo/semantics/nonPublished
88

A Conceptual Map for Understanding the Terrorist Recruitment Process: Observation and Analysis of Turkish Hezbollah Terrorist Organizations.

Teymur, Samih 08 1900 (has links)
Terrorism is a historical problem; however, it becomes one of the biggest problems in 21st century. September 11 and the following Madrid, Istanbul and London attacks showed that it is the most significant problem threatening world peace and security. Governments have started to deal with terrorism by improving security measurements and making new investments to stop terrorism. Most of the governments' and scholars' focus is on immediate threats and causes of terrorism, instead of looking at long-term solutions such as root causes and underlying reasons of terrorism, and the recruitment style of terrorist organizations If terrorist recruitment does not stop, then it is safe to say terrorist activities cannot be stopped. This study focused on the recruitment process by observing two different terrorist organizations, DHKP/C and Turkish Hezbollah. The researcher brings 13 years of field experience and first-person data gathered from inside the terrorist organizations. The research questions of this study were: (i) How can an individual be prevented from joining or carrying out terrorist activities?; (ii) What factors are correlated with joining a terrorist organization?; (iii) What are the recruitment processes of the DHKP/C, PKK, and Turkish Hezbollah?; (iv) Is there any common process of being a member of these three terrorist organizations?; and (v) What are the similarities and differences these terrorist organizations? As a result of this analysis, a terrorist recruitment process map was created. With the help of this map, social organizations such as family and schools may be able to identify ways to prevent individuals from joining terrorist organizations. Also, this map will also be helpful for government organizations such as counterterrorism and intelligence to achieve the same goal.
89

Terrorism base potential in the tri-border area of Latin America /

Halaburda, Pablo January 2006 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2006. / Thesis Advisor(s): Kalev Sepp. "December 2006." AD-A462 564. Includes bibliographical references (p.83-89). Also available via the World Wide Web.
90

Hide and Seek in a Social Network

Abrahamsson, Olle January 2017 (has links)
In this thesis a known heuristic for decreasing a node's centrality scores while maintaining influence, called ROAM, is compared to a modified version specifically designed to decrease eigenvector centrality. The performances of these heuristics are also tested against the Shapley values of a cooperative game played over the considered network, where the game is such that influential nodes receive higher Shapley values. The modified heuristic performed at least as good as the original ROAM, and in some instances even better (especially when the terrorist network behind the World Trade Center attacks was considered). Both heuristics increased the influence score for a given targeted node when applied consecutively on the WTC network, and consequently the Shapley values increased as well. Therefore the Shapley value of the game considered in this thesis seems to be well suited for discovering individuals that are assumed to actively trying to evade social network analysis.

Page generated in 0.0535 seconds