Current Search: terrorism (x)
Pages
-
-
Title
-
THE EFFECTS OF SUICIDE TERRORISM IN AFGHANISTAN AND IRAQ ON US POLICY AND MILITARY STRATEGY.
-
Creator
-
Whalen, Michelle, Sadri, Houman, University of Central Florida
-
Abstract / Description
-
The international political landscape of the 21st century is strewn with terrorist groups that choose to act violently in order for their political messages to be heard. Around the world groups have been formed to defend their ideologies and fulfill their political agendas through acts of terrorism. The Baader-Meinhof Gang [also known as the Red Army Faction], the Weather Underground, the Liberation Tigers of Tamil Eelam, Hezbollah, the Revolutionary Armed Forces of Colombia, HAMAS, and the...
Show moreThe international political landscape of the 21st century is strewn with terrorist groups that choose to act violently in order for their political messages to be heard. Around the world groups have been formed to defend their ideologies and fulfill their political agendas through acts of terrorism. The Baader-Meinhof Gang [also known as the Red Army Faction], the Weather Underground, the Liberation Tigers of Tamil Eelam, Hezbollah, the Revolutionary Armed Forces of Colombia, HAMAS, and the Irish Republican Army have existed for many decades. They represent only a small handful of terrorist groups that have kidnapped, targeted public institutions with bombs, and employed suicide terrorism. More often than not innocent civilians become involved in the carnage of an act of terrorism when they are caught off guard as unassuming bystanders. On September 11th, 2001 both the American public and US government officials bore the weight of that horrific day. Since 9-11, Americans were robbed of their sense of safety, and the American dream of tranquility was shattered. A general unease spread from the wreckage of the World Trade Centers, and with the passing of time a keen sense of awareness about terrorism took its place. The events of 9/11 have made US citizens fully cognizant that there are many actors actively plotting the destruction of the US. Now, eight years later, Americans live with the daily realization that such a heinous act could happen again, in some other unimaginable form. For the US government, the past eight years have been marked with as many successes as failures. The consequences of the inability of the US intelligence community to foresee the international plot unfolding, within and outside of the homeland, resulted in a major reorganization within the US government. The US Department of Homeland Security (DHS) was established on November 25, 2002, and was created solely to address US vulnerabilities highlighted by the actions of nineteen al-Qaeda suicide terrorists. The DHS' main responsibility is to improve communication and information sharing among various intelligence-gathering agencies, so another attempt to plan an attack like 9/11 on US soil would be foiled before it materialized. The US government would no longer be noncommittal in the face of terrorism, as it had before 9/11. Clear messages to terrorists were sent on October 7th, 2001, through the US invasion of Afghanistan, and subsequently on March 20th, 2003 through the US invasion of Iraq. Thus, the US' stance on the War on Terrorism was effectively and clearly communicated to al-Qaeda and throughout the rest of the world. The US might once have been labeled a paper tiger, but hitting the US at the core of their financial and military symbols struck a nerve. The terrorist attacks of 2001 taught the US government a vital lesson, but the military campaigns of Afghanistan and Iraq would demonstrate that the US had even more to learn about the newest military tactics and techniques employed by the enemy, and how these tactics impacted on US military operations, strategies, and policies.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002921, ucf:47996
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002921
-
-
Title
-
Maritime Pirates and Foreign Terrorist Organizations: Complicit Against the United States and NATO?.
-
Creator
-
Lusk, William, Morales, Waltraud, Knuckey, Jonathan, Vasquez, Joseph, University of Central Florida
-
Abstract / Description
-
Maritime piracy, a phenomenon which has plagued free maritime trade for thousands of years, has entered a new age of sophistication and global reverberation. These acts of illegal criminal activity in the late twentieth and early twenty-first centuries yield a significant profit margin for the perpetrators while creating considerable cost for ransom payments, security measures, capital, and human life. The classification of maritime pirates, as either criminals hoping to gain financial income...
Show moreMaritime piracy, a phenomenon which has plagued free maritime trade for thousands of years, has entered a new age of sophistication and global reverberation. These acts of illegal criminal activity in the late twentieth and early twenty-first centuries yield a significant profit margin for the perpetrators while creating considerable cost for ransom payments, security measures, capital, and human life. The classification of maritime pirates, as either criminals hoping to gain financial income or terrorists hoping to usher in political change, is warranted and compelling. If maritime pirates conduct their operations to institute political change, it is possible that flags of the United States and its allies can be more susceptible to pirate attacks than others. The author argues that although the definitional separation of (")maritime piracy(") and (")terrorism(") is becoming increasingly blurred in the twenty-first century, pirates will attack ships based on convenience and opportunity rather than based on the flags of vessels. Testing of this theory will be based on quantitative data produced by the International Maritime Bureau to test pirates' ideologies as a variable. To test if deprivation is a variable to consider, the author will also compare Indonesian economic performance with the frequency of attempted pirate attacks off its waters.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004573, ucf:49201
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004573
-
-
Title
-
Incumbent Violence and Insurgent Tactics: The Effects of Incumbent Violence on Popular Support for Guerrilla Warfare and Terrorism.
-
Creator
-
Williams, Jonathan, Dolan, Thomas, Wilson, Bruce, Mirilovic, Nikola, University of Central Florida
-
Abstract / Description
-
Insurgency has two main strategies, guerrilla warfare and terrorism, which should be treated as linked, but distinct, strategies. This thesis examines the role of incumbent violence in leading insurgents to select one, or both, of these strategies. It argues that incumbent violence can create support for insurgency by causing fear and a desire for revenge and reshaping the social structures of a community. It also argues that incumbent violence increases popular support for terrorism in...
Show moreInsurgency has two main strategies, guerrilla warfare and terrorism, which should be treated as linked, but distinct, strategies. This thesis examines the role of incumbent violence in leading insurgents to select one, or both, of these strategies. It argues that incumbent violence can create support for insurgency by causing fear and a desire for revenge and reshaping the social structures of a community. It also argues that incumbent violence increases popular support for terrorism in particular by creating outbidding incentives and desires to respond in kind to civilian deaths and as a way of punishing norm violations against attacking civilians on the part of the incumbent. The paper tests this theory with a qualitative case study of the conflict in Northern Ireland during the 1970s and a quantitative analysis of insurgent violence in the Kirkuk, Diyala, Babylon, and Salah al Din provinces during the 2003-2009 Iraq conflict.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004959, ucf:49598
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004959
-
-
Title
-
CENTRAL ASIAN SECURITY: WITH A FOCUS ON KAZAKHSTAN.
-
Creator
-
Bragg, Marcus, Sadri, Houman, University of Central Florida
-
Abstract / Description
-
This work focuses on the influence of terror, extremism, trafficking and corruption on the regional security of Central Asia, with a particular emphasis on Kazakhstan. Kazakhstan is regarded as the most stable and financially developed state in Central Asia, yet domestic and regional stability are threatened by the rise in extremism, narcotics trafficking, institutional corruption and acts of terrorism. The challenges of trafficking and extremism within the region originated from outside of...
Show moreThis work focuses on the influence of terror, extremism, trafficking and corruption on the regional security of Central Asia, with a particular emphasis on Kazakhstan. Kazakhstan is regarded as the most stable and financially developed state in Central Asia, yet domestic and regional stability are threatened by the rise in extremism, narcotics trafficking, institutional corruption and acts of terrorism. The challenges of trafficking and extremism within the region originated from outside of Central Asia. Foreign organizations and ideologies are significant actors in progression of regional instability. Government response to these challenges can perpetuate or stymie the aforementioned threats to regional security. Repressive regimes inadvertently contribute to the propaganda of the non-state foes. A prominent solution is the international program referred to as border management. This program aims to support border security while also promoting economic growth and ensuring the protection of human rights. Improved borders promotes regional security, economic growth can potentially undermine the growth of corruption and human rights protection can undermine a large part of extremist propaganda.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFH0004604, ucf:45267
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004604
-
-
Title
-
BREACH OF ALLEGIANCE: THE HISTORY OF TREASON CHARGES IN THE U.S., AND ITS REBIRTH IN THE AGE OF TERRORISM.
-
Creator
-
Lewis, David, Beckman, James, University of Central Florida
-
Abstract / Description
-
The purpose of this thesis is to provide a legal history and analysis of how the treason clause has been utilized since the U.S. Constitution was ratified in 1789. Further, the United States and the United Kingdom share not only a historical parallel of the meaning and use of the charge of treason, but also an abandonment of using the charge today. This thesis will provide an in-depth legal history of treason charges in the United States, along with its close parallels in historical evolution...
Show moreThe purpose of this thesis is to provide a legal history and analysis of how the treason clause has been utilized since the U.S. Constitution was ratified in 1789. Further, the United States and the United Kingdom share not only a historical parallel of the meaning and use of the charge of treason, but also an abandonment of using the charge today. This thesis will provide an in-depth legal history of treason charges in the United States, along with its close parallels in historical evolution and usage to that of the United Kingdom. Focusing prominently on treason throughout United States history, this project will analyze several of the famous treason trials in the nineteenth century, namely the federal prosecution of Aaron Burr in 1807, and the Commonwealth of Virginia's prosecution of John Brown for treason against a state government in 1859. This thesis will also examine the last person prosecuted for treason in the United States: Tomoya Kawakita in 1952. In addition, as a contribution to the "legal history" genre, this paper will summarize the last use of the treason offense in Great Britain in 1946, for which Nazi propaganda broadcaster William Joyce was tried and executed. The core of this thesis will be an analysis of treason law in the United States and also the United Kingdom, with a particular emphasis on why this charge was abandoned by both countries after the early 1950s, and why it should be re-instituted in the twenty-first century. The premise of this thesis will demonstrate a prominent factor in the 1950s leading to the discontinuation of the usage of the treason clause was the negative cultural impact of the era of McCarthyism, and the political misusage of the treason label for his political purposes. The thesis will close with a new approach to the charge of treason, with the recommendation that the utilization of this offense become a viable tool against the War on Terrorism in modern day, by establishing how various terrorists could have been adjudicated for treason, and how similarly situated defendants should be tried in the future.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFH0004499, ucf:45069
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004499
-
-
Title
-
Appropriate Adjective: Executive Authority and the Classification of Enemy Combatants.
-
Creator
-
Davis, Taraleigh, Merriam, Eric, Bledsoe, Robert, Edwards, Barry, University of Central Florida
-
Abstract / Description
-
Is the term enemy combatant an established legal category of persons under international law? Has the President exceeded his constitutional authority in classifying United States citizens who are suspected terrorists as enemy combatants? In 2018 a U.S. citizen was released after being held for 13 months as an enemy combatant. He was detained without being charged with a crime and without the ability to challenge the legality of his detention. This thesis serves two purposes. First, it will...
Show moreIs the term enemy combatant an established legal category of persons under international law? Has the President exceeded his constitutional authority in classifying United States citizens who are suspected terrorists as enemy combatants? In 2018 a U.S. citizen was released after being held for 13 months as an enemy combatant. He was detained without being charged with a crime and without the ability to challenge the legality of his detention. This thesis serves two purposes. First, it will seek to trace the history of the term enemy combatant and highlight the evolution of its use by the executive branch. This thesis then examines whether the executive has exceeded his constitutional authority to classify a United States citizen as an enemy combatant. While most of the literature focuses on the treatment and detention of enemy combatants, existing scholarship largely overlooks the issue of authority to classify enemy combatants. This thesis will argue that the executive is overstepping the boundaries of its presidential power when the executive branch creates the criteria (a legislative function) for enemy combatants and applies the criteria in the classification of enemy combatants (a judicial function). This qualitative study will use normative legal research focusing on the principles of the law in classifying a suspected terrorist as an enemy combatant as well as the legal history of the term. The analysis of the legal history of the term enemy combatant will be completed by content analysis using Nvivo 12 software of various government documents as well as case studies of enemy combatant cases.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007448, ucf:52703
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007448
-
-
Title
-
Managing Effective Collaboration among Law Enforcement, Intelligence Services, and Military Forces in Fight against Terrorism and Organized Crime.
-
Creator
-
Demirhan, Cihan, Kapucu, Naim, Hu, Qian, Feldheim, Mary Ann, Rivera, Fernando, University of Central Florida
-
Abstract / Description
-
The fight against terrorism and organized crime require strong collaboration between public security organizations. Public security networks include several agencies that are not bound to each other with strong hierarchical ties. Because of a lack of the strong hierarchical structure, managing public networks is not similar to managing a single government agency. This study aims to examine the factors influencing network effectiveness in the public security sector. The main research questions...
Show moreThe fight against terrorism and organized crime require strong collaboration between public security organizations. Public security networks include several agencies that are not bound to each other with strong hierarchical ties. Because of a lack of the strong hierarchical structure, managing public networks is not similar to managing a single government agency. This study aims to examine the factors influencing network effectiveness in the public security sector. The main research questions of the study are: Which factors are important for effectiveness in public security networks? What is the role of inter-organizational trust among partner agencies? Which kind of leadership style will achieve the highest performance in public security networks? What is the relative importance of goal convergence and organizational culture in network effectiveness? How does the relationship between inter-organizational trust, leadership style, goal convergence and organizational culture impact network effectiveness? In order to find these relations, a self-reported survey was sent to 2,095 current and previous Turkish public security network managers. The study found that inter-organizational trust and goal convergence have a positive relationship with network effectiveness. Although facilitator leadership is found to be the most common leadership style in Turkish public security networks, it is found as inappropriate to achieve higher network effectiveness. According to the results, the co-producer network leadership is the most convenient leadership style in terms of network effectiveness. While the results of the descriptive statistics confirm that six specific features of organizational culture in public security sector have negative influence on network effectiveness, the hypothesis testing with the covariance structure model only support the negative impact of competition among partner organization. This study contributes to the literature on network effectiveness with particular proposals for the public security managers and practitioners.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFE0005479, ucf:50350
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005479
-
-
Title
-
SAUDI ARABIA AND EXPANSIONIST WAHHABISM.
-
Creator
-
Baroni, Samiah, Handberg, Roger, University of Central Florida
-
Abstract / Description
-
This thesis examines the development of Wahhabism as an ideology into a rapidly expanding, transportable, contemporary Islamic political system. Serving as the territorial foundation, individuals maintain allegiance to Makkah, the center of the Islamic world, through symbolic Islamic prayer. Along with a central, globally financed economic distributive mechanism, and Wahhabi social and educational institutions emerging from the traditional mosque, Wahhabism serves the demand for an Islamic...
Show moreThis thesis examines the development of Wahhabism as an ideology into a rapidly expanding, transportable, contemporary Islamic political system. Serving as the territorial foundation, individuals maintain allegiance to Makkah, the center of the Islamic world, through symbolic Islamic prayer. Along with a central, globally financed economic distributive mechanism, and Wahhabi social and educational institutions emerging from the traditional mosque, Wahhabism serves the demand for an Islamic political system in a late capitalist world. Wahhabism is fluid within contemporary dynamic political systems and rapidly changing international relations. Wahhabism continues to expand at a global level, at times, providing a foundation for new forms of contemporary terrorism.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001005, ucf:46838
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001005
-
-
Title
-
PHILIPPINE ECONOMIC AND POLITICAL DEVELOPMENT AND PHILIPPINE MUSLIM UNREST.
-
Creator
-
de Leon, Justin, Sadri, Houman, University of Central Florida
-
Abstract / Description
-
Muslim culture and society has been a part of the Philippine islands in spite of nearly ninety-five percent of the population being Christian (a majority Catholic), yet did not become a separatist movement until the 1970's. Since then, the two main separatist groups the Moro National Liberation Front (MNLF) and the Moro Islamic Liberation Front (MILF) have been battling the Philippine government. The parties entered truces in 1996 and 2001, yet there has been a cycle of violence continues...
Show moreMuslim culture and society has been a part of the Philippine islands in spite of nearly ninety-five percent of the population being Christian (a majority Catholic), yet did not become a separatist movement until the 1970's. Since then, the two main separatist groups the Moro National Liberation Front (MNLF) and the Moro Islamic Liberation Front (MILF) have been battling the Philippine government. The parties entered truces in 1996 and 2001, yet there has been a cycle of violence continues. The Abu Sayyaf Group (ASG), linked to Al Qaeda, emerged in 1990 and has launched many attacks on the Christian Philippine majority. The prolonged Muslim unrest in the ARMM has left thousands dead and hundreds of thousands displaced. The main objective of this research paper is to examine Philippine economic and political development and its impact on Philippine Muslim unrest. This paper presents a critical analysis of the economic and political development and Philippine Muslim unrest by examining six major features of the Philippines; they are: The historical evolution, economic development, political development, socio-cultural setting, geographic setting, and the quality of life of the Filipino people. This research also examines Fareed Zakaria's illiberal democracies theory, liberal institutionalism, and the Marxist theory of class revolution and primarily relies on research conducted at the University of the Philippines and from Philippine and Asian scholars. By taking a holistic comprehensive approach and by using international relations theory, this research fills two gaps in the literature about Philippine Muslim unrest. The research concludes with a look at future challenges, both short term and long term that face the country, as well as, possible future scenarios. The findings of this research are that the economic and political development and the historical evolution, though major contributory factors, are not the sole reason for the prolonged Philippine Muslim unrest. The most pervasive causal factor to Muslim unrest was the socio-cultural setting. Because of the all-pervasive nature of culture; at first glance, the socio-cultural setting was not a major apparent cause. At almost all times examined throughout this research, certain cultural tendencies guided decisions and altered the course of events more so than any other single variable. Corruption, crony capitalism, patrimonialism, and irrational institutions all stem from the tendencies of Philippine culture must be addressed to find lasting peace in the country. A move toward rational legal institutions and liberal constitutionalism, will lead the way to the creation of a liberal democracy and break the cycle of violence occurring in the Philippines.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002378, ucf:47812
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002378
-
-
Title
-
Physiological Reactions to Uncanny Stimuli: Substantiation of Self-Assessment and Individual Perception in User Enjoyment and Comfort.
-
Creator
-
Ballion, Tatiana, Sims, Valerie, Chin, Matthew, Jones, Donald, University of Central Florida
-
Abstract / Description
-
There is abundant anecdotal evidence substantiating Mori's initial observation of the "uncanny valley", a point at which human response to non-human entities drops sharply with respect to comfort (Mori, 1970), and the construct itself has a long-standing history in both Robotics and Psychology. Currently, many fields such as design, training, entertainment, and education make use of heuristic approaches to accommodate the anticipated needs of the user/consumer/audience in certain important...
Show moreThere is abundant anecdotal evidence substantiating Mori's initial observation of the "uncanny valley", a point at which human response to non-human entities drops sharply with respect to comfort (Mori, 1970), and the construct itself has a long-standing history in both Robotics and Psychology. Currently, many fields such as design, training, entertainment, and education make use of heuristic approaches to accommodate the anticipated needs of the user/consumer/audience in certain important aspects. This is due to the lack of empirical substantiation or, in some cases, the impossibility of rigorous quantification; one such area is with respect to the user's experience of uncanniness, a feeling of "eeriness" or "wrongness" when interacting with artefacts or environments. Uncanniness, however, continues to be defined and measured in a largely subjective way, and often after the fact; an experience or product's uncanny features are pointed out after the item has been markedly avoided or complained about by the general public. These studies are among the first seeking to determine a constellation of personality traits and physiological responses that incline the user to have a more frequent or profound (")uncanny" reaction when presented with stimuli meeting the criteria for a level of "eeriness". In study 1, 395 adults were asked to categorize 200 images as uncanny, neutral, pleasant, or other. In Study 2, physiological and eye-tracking data was collected from twenty two adults as they viewed uncanny, neutral and pleasant images culled from study 1. This research identifies components of the uncanny valley related to subjective assessment, personality factors (using the HEXACO and Anthropomorphic Tendencies Scale), and biophysical measures, and found that traits unique to Emotionality on the HEXACO inventory, compounded with a form of anthropomorphism demonstrates a level of relationship to the subjective experience of uncanny stimuli. There is evidence that HEXACO type and forms of anthropomorphic perception mediates the biophysical expression and the subjective perception of the stimuli. In keeping with psychological hypotheses, stimuli to which the participants had greatest response centered on death, the threat of death, or mismatched/absent facial features.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004354, ucf:49454
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004354
Pages