Showing Results for
- Academic Journals (1,623)
Search Results
- 1,623
Academic Journals
- 1,623
- 1From:Canadian Public Administration (Vol. 63, Issue 1) Peer-ReviewedLiterature on Canada-United States (US) counter-terrorism (CT) cooperation from the early 2000s presumed that Canadian CT policy was driven by US security imperatives and fear, leaving little room for Canada to develop...
- 2From:American DiplomacyNorth Africa regained, in the last year, a new visibility in American eyes with the ever-increasing threats of violence by Al Qaeda in the Islamic Maghreb (AQIM) that carried out attacks such as the storming, in 2012,...
- 3From:First Things: A Monthly Journal of Religion and Public Life (Issue 246)The Islamic State, also known as ISIS, represents the latest expression of insanity in the Muslim world. Asked to comment on the apparent success of this militant group, a U.S. intelligence official said, "This is not a...
- 4From:Journal of Defense Resources Management (Vol. 2, Issue 2) Peer-ReviewedThis article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali...
- 5From:European Social PolicyPeer-ReviewedIt is impossible to extend the freeze of funds of presumed terrorists in the EU to social security and assistance benefits paid by member states to their spouses on the grounds that this aid may also be used for the...
- 6From:Journal of Risk Finance (Vol. 9, Issue 3) Peer-ReviewedAbstract Purpose--The purpose of this editorial is to consider whether or not the classical "Lanchester equations" of military combat are useful for modeling the financial risks associated with contemporary terrorist...
- 7From:Strategic Review for Southern Africa (Vol. 29, Issue 2) Peer-ReviewedABSTRACT As a systematic terrorist tactic, suicide attacks are a relatively new phenomenon. The article surveys the dimensions of this phenomenon, influencing factors, and counter-measures. After an overview of the...
- 8From:The Chronicle of Higher Education (Vol. 61, Issue 29)Byline: Aisha Labi In February, the news that "Jihadi John," a de facto spokesman for the so-called Islamic State, had grown up in a middle-class family in England and graduated from a London university was a...
- 9From:Global Governance (Vol. 13, Issue 3) Peer-ReviewedThe emergence of post-September 11 military operations in the context of the global fight against terrorism in general and the Iraq war in particular has overshadowed humanitarian interventions conducted by multilateral...
- 10From:Islamophobia Studies Journal (Vol. 4, Issue 1) Peer-ReviewedThe securitization phenomenon is based on a racialized logic that predates 9/11 and has roots in the discourse of Orientalism, the practices of European colonialism and, in the more recent times of the 20th century, the...
- 11From:AEI Paper & StudiesExecutive Summary Iran is emerging as a significant cyberthreat to the US and its allies. The size and sophistication of the nation's hacking capabilities have grown markedly over the last few years, and Iran has...
- 12From:Strategic Finance (Vol. 98, Issue 7) Peer-ReviewedOnce again in 2016, experience seemed to verify that there are only two kinds of companies-those that know they've been hacked and those that have been hacked but just don't know it. Now on the apron of a new year,...
- 13From:Canadian Journal of Sociology (Vol. 38, Issue 4) Peer-ReviewedThis article explores the biometric documentation of civilians by coalition forces in the battle zones of the "war on terror." With the growth of population-centric operations, harvesting body data is a key dimension of...
- 14From:International journal of communication (Online)Peer-ReviewedThis article examines the interface of rhetorical theories of credibility and the domestic counterterrorism communications of government and nongovernment actors in Canada and the United States. We track evolving...
- 15From:Special Warfare (Vol. 24, Issue 4)The United States Army Special Operations Command, or USASOC, is pursuing a new capability for the ground mobility of its forces called the Ground Mobility Vehicle, Version 1.1, or GMV v1.1. The U.S. Army Special...
- 16From:Contemporary Arab Affairs (Vol. 12, Issue 1) Peer-ReviewedIn Tunisia, the notion and understanding of security, while no longer focused on regime security, remains a top-down, state-security understanding, rather than a societal one. Further, while the 2014 democratic...
- 17From:The Futurist (Vol. 43, Issue 3) Peer-ReviewedFollowing a number of deadly attacks in 2003, Saudi Arabia has begun to incorporate so-called "soft" measures into its counter-terrorism efforts, including such tactics as providing psychiatric counseling to imprisoned...
- 18From:Information Management Journal (Vol. 44, Issue 1) Peer-ReviewedIn early October, the Senate Judiciary Committee passed a bill to extend the USA PATRIOT Act. The PATRIOT Act, originally enacted to combat terrorism, gives government officials the ability to conduct various types of...
- 19From:Parameters (Vol. 46, Issue 4) Peer-ReviewedThe international threat of dealing with terrorism raises interesting questions and is a controversial topic. This controversy is reflected in the revised second edition of Debating Terrorism and Counterterrorism:...
- 20From:Georgetown Journal of International Affairs (Vol. 16) Peer-ReviewedThe range of counter-terrorism tools employed by states and other actors is large and diverse. Military, legal, and political instruments are all widely used--often underpinned by competing conceptions of what...