• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 3
  • 3
  • Tagged with
  • 20
  • 20
  • 14
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Group Marginalization Promotes Hostile Affect, Cognitions, and Behaviors

Betts, Kevin Robert January 2012 (has links)
The present research investigates relationships between group marginalization and hostility. In particular, I focus on the experiences of small, contained groups that are intentionally rejected by multiple out-group others. An integrative framework is proposed that attempts to explain how group processes influence (a) coping with threatened psychological needs following marginalization, (b) affective states, (c) cognitions regarding the marginalization and its source, and ultimately (d) hostile behavior. Study 1 describes a unique paradigm that effectively manipulates interpersonal rejection. Study 2 then implements this paradigm to empirically test relationships between the components of the integrative framework and examine differences among included and rejected individuals and groups. Results reveal partial support for the framework, particularly in regard to the impact of group marginalization on psychological needs and hostile affect, cognitions, and behaviors. Implications for natural groups such as terrorist cells, school cliques, and gangs are considered.
2

The rise and the fall of terrorist organizations in post-dictatorial Greece: the role and the lessons for the intelligence services

Fakitsas, Miltiadis 06 1900 (has links)
Approved for public release, distribution is unlimited / The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002. The two most notorious terrorist organizations during this period were the "November 17" group and another group called, the "Revolutionary People's Struggle." In 1975, these organizations began a violent campaign against the United States, NATO personnel, Turkish diplomats, and member of the Greek political and business elite. The government's failure to curtail these groups resulted from the erroneous belief that these terrorists were not a direct threat to Greek's democracy. Fortunately, in June of 2002, with numerous arrests, Greek authorities made substantial progress and apprehended the leaders of the "November 17." This thesis examines the nature and the effects of terrorism by focusing on the ideology and activities of these two specific terrorist groups. This thesis also identifies and analyzes the origins of these organizations, reveals how the terrorist situation was created, and examines the causes that led to the inception of these terrorist organizations. Additionally, this thesis interprets the role of the intelligence services in Greece before and after the demise of the Greek military dictatorship in 1974. It also explores how the intelligent community under the watchful eye of Greece's political leadership helped dislodge these terrorist organizations and helped protect and consolidate the fledging democracy. / Major, Hellenic Air Force
3

Private military contractors gains in containing Boko Haram in Nigeria

Mkandla, Thando Ian January 2017 (has links)
Submitted in partial fulfilment of the requirements for the degree of Master of Arts of International Relations in the Faculty of Humanities Department of International Relations, Johannesburg 2017 / The growing role of Private Military Companies (P.M.C) has led to a magnitude of security concerns internationally. Due to their past reputation, P.M.Cs have been demonised by the international community in the form of scholars as well as journalists, as their personnel have been misunderstood for mercenaries (De Nevers 2009). It is therefore important to clarify the difference between contractors and mercenaries. However due to the growth of different actors and security threats, Private Military Companies have emerged as an effective alternative solution in engaging non-traditional threats in the international arena, a role states have increasingly failed in. Private Military Companies have become more successful in applying counterinsurgency tactics due to their structural setup, skills and expertise as well as technological advancement and understanding of warfare. This has led to an increase in reliance from states including the United States, Angola, and more recently Nigeria. Through the examination of the Nigerian case study, the thesis paper aims to understand how the P.M.C (S.T.T.E.P) was able to apply its COIN tactics effectively in combating Boko Haram. It is important to examine the Nigerian case study as P.M.C success could possibly be used to combat the proliferation of terrorist manoeuvres such as Al-Shabaab. The Nigerian case is also important as it displays how S.T.T.E.P working together with the N.D.F could strengthen their COIN campaign against Boko Haram. / XL2018
4

Zánik a dezintegrace nacionalistických teroristických skupin / Demise and Disintegration of Nationalist Terrorist Groups

Štekl, Jakub January 2020 (has links)
The thesis is focused on the process of demise and disintegration of nationalist terrorist groups. The case studies of terrorism in Northern Ireland and Basque region in Spain demonstrate and analyze the development of local terrorist organizations from the beginning to the cessation of violent actions. An emphasis is put especially on the end of armed campaign and transformation of nationalist activities within a legal framework. In the case of Northern Ireland, the focus is put on the activities of the Provisional Irish Republican Army (PIRA) from the beginning of the Troubles to the Belfast Agreement in 1998. The research in this thesis includes the influence of affiliated political parties - Sinn Féin in this case - on the process of negotiations and the continuation of Northern Irish nationalism after the end of armed campaign. The Basque case is devoted to the development of Basque nationalism since the beginning of the 20th century, the creation and development of Euskadi Ta Askatasuna (ETA) and its terrorist campaign within both the Francoist regime and Spanish democracy. An emphasis is put on the development of the organization until its official dissolution in 2018, activities of the political parties of the Nationalist Left affiliated to ETA and the attitude of Spanish authorities to...
5

The Use of Minors in Material Support of Terrorist Organizations

Feliciano, Teresa Maria 01 January 2016 (has links)
Adult criminals' use of minors to commit crimes associated with the support of terrorist organizations is a significant problem in the United States. Despite strict laws prohibiting adult offenders from exploiting youth, these individuals aggressively pursue minors to commit crimes associated with the support of terrorist organizations. This quasi-experimental, cross-sectional study used resource dependency theory to explore the likelihood that adult criminal offenders in the U.S. will use minors for crimes that are associated with the support of terrorist organizations, based on crime typology, country of origin, and location of crime. Data were collected from a crime database maintained by the United States Sentencing Commission for 2012. Logistic regression was conducted to assess if crime typology, country of origin, and location of crime predicted the use of minors for crime by adult offenders in support of terrorist organizations. Results of the analysis were significant: Ï?2(7, N=485) = 180.18, p < .001, suggesting that crime typology, country of origin, and location of crime were significant predictors of the use of minors in crimes that are associated with the support of terrorist organizations. Drug trafficking and robbery crimes, and crimes committed in the Southern regions of the U.S. were most likely to involve minors when compared to other types of crimes and regions of the U.S., respectively. Positive social change implications stemming from this study include a recommendation to Congress to increase federal funding for law enforcement agencies and social programs, thereby improving the lives of minors that otherwise may become victims of adult criminal offenders who seek to use them to commit crimes in support of terrorist organizations.
6

Stayin' Alive: A Mixed-Methods Study of the Inconsistent Effects of Leadership Decapitation on Terrorist Organizations

Mitakides, Katherine W. 01 December 2017 (has links)
No description available.
7

Why Female Suicide Bombers? A Closer Look at the Liberation Tigers of Tamil Eelam and Chechen Separatists

Campbell, Latisha T 01 January 2014 (has links)
The central hypothesis of this study is that terrorist organizations choose to use females as suicide bombers not only as tactical innovation but also to “signal” or send a message to various audiences. In order to meet the research objectives of this study, two terrorist organizations—the Liberation Tigers of Tamil Eelam and the Chechen Separatists or those individuals associated with the Chechen Resistance—are examined in detail from their inception through 2013 using a structured focused comparison methodology. Evidence is found to support both of the studies’ main hypotheses. First, female suicide bombers are used by terrorist organizations because they are a 1) tactical advantage, and 2) to “signal” or send a message to various audiences. Their “entertainment” or shock value maximizes the psychological punch intended for delivery to a variety of audiences. These two reasons are not mutually exclusive but are colored by contextual considerations unique to each case. While deliberation was given to a variety of socio-political factors unique to each organization—such as popular support for suicide attacks perpetrated by females, indication of rival terrorist organizations, counterterrorism and political events that may have affected the terrorist organizations’ preference for females—insight into the operational characteristics surrounding individual suicide attacks was central in highlighting patterns in the organizational use of female suicide bombers. Those patterns are consistent across both cases and suggest that when females’ use is explained by the tactical innovation model, they are used overwhelmingly in suicide attacks where getting closer to intended targets—usually defined as security and political targets—matter. In contrast, suicide attacks explained by the signaling model are characterized by their novelty usually representing a deviation from terrorist organizations’ operational norms—deemed operational suicide attack anomalies in this study—characterized many times as “only” suicide attacks, “firsts [of that kind of],” or the most spectacular suicide attacks carried out by the organization.
8

Teroristický útok za použití vybraných CBRN agens a činnost složek integrovaného záchranného systému ve vybraném městě / A terrorist attack with use of chosen CBRN agent and activity of the integrated rescue system in the chosen city.

KOTYZA, Michal January 2016 (has links)
The thesis is focused on the issue of terrorist attacks using chosen CBRN agents. It primarily deals with the readiness of the basic compounds of the integrated rescue system (IZS) in South Bohemian region on these situations. This thesis is focused on the assessment of the readiness of the compounds of the IZS against terrorist CBRN agents abuse. The first part of the thesis marginally deals with the philosophy of terrorism and the chosen terrorist organizations, which are substantially identified in the modern history of mankind. Terrorist organizations are divided according to continents from East to West. In the thesis there are not included terrorist organizations of Africa and South America. The next part of the thesis deals with selected CBRN agents, which I chose on the basis of their effectivity and the relative availability for terrorist organizations and also it is focused on the basic effects on the human organism. In the last part the principle of dispersion of single agents is included. In the research part of the thesis I deal with readiness of the basic compounds of the IZS in the South Bohemia region on terrorist attack using CBRN agents. For the realization of the research I chose the method of questionnaire research. I created a different questionnaire for each of the basic compounds of IZS with specifically selected questions, relating to the area of their competence in the incident with CBRN agents. The questions were drawn up according to competences set in Katalogový soubor typových činností při společném zásahu složek IZS. For their evaluation, I set a percentage limit for the each compound, to correspond with their scale of work and responsibilities made on the place of incident with the appearance of CBRN agents. Another factor of the classification was focused on the level of individual protection against CBRN agents at Hasičský záchranný sbor Jihočeského kraje, Policie České republiky v Jihočeském kraji a Zdravotnická záchranná služba Jihočeského kraje. On the basis of these criteria I have decided to answer the research question. In the next part of the chapter of discussion I have focused on the results of the questionnaires when I took every basic compound of the IZS, which has been investigated, and chose three of the most problematic questions from every questionnaire and I tried to explain the cause of nonsuccess with warranty of correct answer. In the relation on unsatisfactory negative result of the research, I have made a SWOT analyze of basic compounds of IZS, focused on readiness against CBRN agents. With the SWOT analyze, I have specified the strategy for next improvements. The last part of the chapter is devoted to solution of this problem, where I made a scenario of the common exercises for all compounds of IZS. The topic of exercises is focused on terrorist attack with using of the CBRN agents in Dopravně obchodním centru Mercury v Českých Budějovicích. The basic specification of the exercise is synchronized attack with dispersion of nerve gas sarin, placed on the bus station and improvised explosive device used in combination with the ionizating radiation source. At the end of the thesis I have focused on recapitulation of the results and made some recomended methods for improvement of actual status.
9

An Analysis of Established Terrorist Identity in Political and Military Wings of Turkish Hizbullah

Cinoglu, Huseyin 08 1900 (has links)
The influence of the role identity expectations of Turkish Hizbullah's leadership on actual members' terrorist identities was documented in this dissertation. This study explored the leadership's identity expectations from members through content analyses of four books written by major figures of Hizbullah. Those books were selected following comments of the literature and expert suggestions. Eleven identity features stood out. These content analyses also revealed that leadership had different expectations from political wing members and military wing members. The following six identity features were listed as expected more from military wing members: belief in jihad and resistance, desire for martyrdom, embracing the hierarchical structure, depersonalization, hatred against enemies of God, and aloneness. Whilst cemaat (religious congregation), being religiously educated, patience (gradualism), dedication to a Muslim brotherhood, and being politically active were listed as expected identity attributes of political wing members. Qualitative analyses investigated these identity features using the available literature and 144 handwritten reports of actual Hizbullah members. To confirm the findings of content and qualitative analyses, quantitative analyses were conducted on the relatively representative sample (144 reports). The results of cross-tabulation and logistic regression demonstrated that two (out of 6) military wing and two (out of 5) political wing identity expectations were not manifested on actual members' Hizbullah identities.
10

THE EFFECT OF BELIEF IN BECOMING A MEMBER OF A TERRORIST ORGANIZATON AND THE IMPACT OF THAT BELIEF ON THE LEVEL OF VIOLENCE EXERTED BY THE TERRORIST ORGANIZATION MEMBERS IN TURKEY

Yilmaz, Bulent 23 August 2013 (has links)
No description available.

Page generated in 0.1561 seconds