CINXE.COM

Terrorism Research Papers - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Terrorism Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="aJ3pSqFX22u_OKuhHAh5qwsiSpZTcUeFZwRnh85pYVQtel0VTvMN-yHDvZ-oJVPTAiyy4b685a5Mbzd7hav2Kw" /> <link href="/Documents/in/Terrorism?after=50%2C28822733" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-2b6f90dbd75f5941bc38f4ad716615f3ac449e7398313bb3bc225fba451cd9fa.css" /> <meta name="description" content="View Terrorism Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '0b084d6c6ceae1a6387d72de14e4c4adb2734a0a'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":14008,"monthly_visitors":"108 million","monthly_visitor_count":108476212,"monthly_visitor_count_in_millions":108,"user_count":283796739,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1740596565000); window.Aedu.timeDifference = new Date().getTime() - 1740596565000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-1eb081e01ca8bc0c1b1d866df79d9eb4dd2c484e4beecf76e79a7806c72fee08.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-3d6a0fc1a24347dfb16a9ce3dfdd96bbf39cc6e1d390f2e12e20fc6249a397ed.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-e3dc02fc8ca7230d51ed9d586e67606aa86cc41d5d96aec8224b0cfff74915da.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Terrorism" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Terrorism</h1><div class="u-tcGrayDark">111,071&nbsp;Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in&nbsp;<b>Terrorism</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Terrorism">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Terrorism/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Terrorism/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Terrorism/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Terrorism">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_46880330" data-work_id="46880330" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/46880330/New_Portrayals_of_the_Arab_World_in_TV_Series">New Portrayals of the Arab World in TV Series</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This work reflects on how the representation of the Arab world has evolved in three fictional works that have emerged in the second decade of the 21st century: Homeland (Showtime Networks, 2011-2020), Tyrant (FX Network-Fox, 2014-2016),... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_46880330" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This work reflects on how the representation of the Arab world has evolved in three fictional works that have emerged in the second decade of the 21st century: Homeland (Showtime Networks, 2011-2020), Tyrant (FX Network-Fox, 2014-2016), and Jack Ryan (Amazon Prime Video, 2018-). The goal is to determine whether the main socio-political milestones that occurred during this period (the Arab Spring, Syrian Civil War, appearance of ISIS, etc.) have transformed the already classic theories of authors such as Edward Said, Jack Shaheen, or Evelyn Alsultany, among others. A viewing and analysis of the first season of each show demonstrates that the panorama has not improved in terms of discourse, topics, and stereotypes. It is clear, therefore, that the lens of 9/11 is still very present in the Hollywood mindset regarding Arabs, Muslims, and Islam.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/46880330" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="dc4b6c544a4afd15554119b68440f026" rel="nofollow" data-download="{&quot;attachment_id&quot;:66271198,&quot;asset_id&quot;:46880330,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/66271198/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33406271" href="https://usj-es.academia.edu/AlfonsoCorral">Alfonso Corral</a><script data-card-contents-for-user="33406271" type="text/json">{"id":33406271,"first_name":"Alfonso","last_name":"Corral","domain_name":"usj-es","page_name":"AlfonsoCorral","display_name":"Alfonso Corral","profile_url":"https://usj-es.academia.edu/AlfonsoCorral?f_ri=1660","photo":"https://0.academia-photos.com/33406271/40243420/33025908/s65_alfonso.corral.jpg"}</script></span></span></li><li class="js-paper-rank-work_46880330 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="46880330"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 46880330, container: ".js-paper-rank-work_46880330", }); });</script></li><li class="js-percentile-work_46880330 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 46880330; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_46880330"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_46880330 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="46880330"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 46880330; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=46880330]").text(description); $(".js-view-count-work_46880330").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_46880330").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="46880330"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">15</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>,&nbsp;<script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2015" rel="nofollow" href="https://www.academia.edu/Documents/in/Middle_East_Studies">Middle East Studies</a>,&nbsp;<script data-card-contents-for-ri="2015" type="text/json">{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="13958" rel="nofollow" href="https://www.academia.edu/Documents/in/Media">Media</a><script data-card-contents-for-ri="13958" type="text/json">{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=46880330]'), work: {"id":46880330,"title":"New Portrayals of the Arab World in TV Series","created_at":"2021-04-15T00:34:59.354-07:00","url":"https://www.academia.edu/46880330/New_Portrayals_of_the_Arab_World_in_TV_Series?f_ri=1660","dom_id":"work_46880330","summary":"This work reflects on how the representation of the Arab world has evolved in three fictional works that have emerged in the second decade of the 21st century: Homeland (Showtime Networks, 2011-2020), Tyrant (FX Network-Fox, 2014-2016), and Jack Ryan (Amazon Prime Video, 2018-). The goal is to determine whether the main socio-political milestones that occurred during this period (the Arab Spring, Syrian Civil War, appearance of ISIS, etc.) have transformed the already classic theories of authors such as Edward Said, Jack Shaheen, or Evelyn Alsultany, among others. A viewing and analysis of the first season of each show demonstrates that the panorama has not improved in terms of discourse, topics, and stereotypes. It is clear, therefore, that the lens of 9/11 is still very present in the Hollywood mindset regarding Arabs, Muslims, and Islam.","downloadable_attachments":[{"id":66271198,"asset_id":46880330,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33406271,"first_name":"Alfonso","last_name":"Corral","domain_name":"usj-es","page_name":"AlfonsoCorral","display_name":"Alfonso Corral","profile_url":"https://usj-es.academia.edu/AlfonsoCorral?f_ri=1660","photo":"https://0.academia-photos.com/33406271/40243420/33025908/s65_alfonso.corral.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=1660","nofollow":true},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=1660","nofollow":true},{"id":17501,"name":"Islamophobia","url":"https://www.academia.edu/Documents/in/Islamophobia?f_ri=1660"},{"id":32005,"name":"Edward Said","url":"https://www.academia.edu/Documents/in/Edward_Said?f_ri=1660"},{"id":43520,"name":"Middle East","url":"https://www.academia.edu/Documents/in/Middle_East?f_ri=1660"},{"id":49550,"name":"Arab world","url":"https://www.academia.edu/Documents/in/Arab_world?f_ri=1660"},{"id":51334,"name":"Orientalism","url":"https://www.academia.edu/Documents/in/Orientalism?f_ri=1660"},{"id":169938,"name":"Arab Spring (Arab Revolts)","url":"https://www.academia.edu/Documents/in/Arab_Spring_Arab_Revolts_?f_ri=1660"},{"id":274431,"name":"TV Series","url":"https://www.academia.edu/Documents/in/TV_Series?f_ri=1660"},{"id":403712,"name":"Islamic State","url":"https://www.academia.edu/Documents/in/Islamic_State?f_ri=1660"},{"id":464017,"name":"Homeland","url":"https://www.academia.edu/Documents/in/Homeland?f_ri=1660"},{"id":663701,"name":"Representations of Race and Ethnicity In the Media","url":"https://www.academia.edu/Documents/in/Representations_of_Race_and_Ethnicity_In_the_Media?f_ri=1660"},{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8344756" data-work_id="8344756" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8344756/Lokaler_Konflikt_im_globalen_Jihad_Kontextualisierung_innerstaatlicher_und_internationaler_Konflikte_in_die_Ideologie_des_transnationalen_Jihad">Lokaler Konflikt im globalen Jihad. Kontextualisierung innerstaatlicher und internationaler Konflikte in die Ideologie des transnationalen Jihad</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8344756" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3f2b715e72e9946f02aff2914bca8342" rel="nofollow" data-download="{&quot;attachment_id&quot;:34747655,&quot;asset_id&quot;:8344756,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34747655/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="945123" href="https://uni-osnabrueck.academia.edu/MateniaSirseloudi">Matenia L I C K F E T T Sirseloudi</a><script data-card-contents-for-user="945123" type="text/json">{"id":945123,"first_name":"Matenia","last_name":"Sirseloudi","domain_name":"uni-osnabrueck","page_name":"MateniaSirseloudi","display_name":"Matenia L I C K F E T T Sirseloudi","profile_url":"https://uni-osnabrueck.academia.edu/MateniaSirseloudi?f_ri=1660","photo":"https://0.academia-photos.com/945123/2723896/3172415/s65_matenia.sirseloudi.jpg"}</script></span></span></li><li class="js-paper-rank-work_8344756 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8344756"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8344756, container: ".js-paper-rank-work_8344756", }); });</script></li><li class="js-percentile-work_8344756 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8344756; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8344756"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8344756 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8344756"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8344756; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8344756]").text(description); $(".js-view-count-work_8344756").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8344756").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8344756"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1720" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1720" type="text/json">{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="125423" rel="nofollow" href="https://www.academia.edu/Documents/in/Jihadism">Jihadism</a><script data-card-contents-for-ri="125423" type="text/json">{"id":125423,"name":"Jihadism","url":"https://www.academia.edu/Documents/in/Jihadism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8344756]'), work: {"id":8344756,"title":"Lokaler Konflikt im globalen Jihad. Kontextualisierung innerstaatlicher und internationaler Konflikte in die Ideologie des transnationalen Jihad","created_at":"2014-09-15T22:01:31.986-07:00","url":"https://www.academia.edu/8344756/Lokaler_Konflikt_im_globalen_Jihad_Kontextualisierung_innerstaatlicher_und_internationaler_Konflikte_in_die_Ideologie_des_transnationalen_Jihad?f_ri=1660","dom_id":"work_8344756","summary":null,"downloadable_attachments":[{"id":34747655,"asset_id":8344756,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":945123,"first_name":"Matenia","last_name":"Sirseloudi","domain_name":"uni-osnabrueck","page_name":"MateniaSirseloudi","display_name":"Matenia L I C K F E T T Sirseloudi","profile_url":"https://uni-osnabrueck.academia.edu/MateniaSirseloudi?f_ri=1660","photo":"https://0.academia-photos.com/945123/2723896/3172415/s65_matenia.sirseloudi.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":125423,"name":"Jihadism","url":"https://www.academia.edu/Documents/in/Jihadism?f_ri=1660","nofollow":true},{"id":355294,"name":"Jihadism, Dschihadismus, Jihadism Online","url":"https://www.academia.edu/Documents/in/Jihadism_Dschihadismus_Jihadism_Online?f_ri=1660"},{"id":469642,"name":"Jihadism and Radical Islamism","url":"https://www.academia.edu/Documents/in/Jihadism_and_Radical_Islamism?f_ri=1660"},{"id":579957,"name":"Friedens Und Konfliktforschung","url":"https://www.academia.edu/Documents/in/Friedens_Und_Konfliktforschung?f_ri=1660"},{"id":701413,"name":"Krieg","url":"https://www.academia.edu/Documents/in/Krieg?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_6184106" data-work_id="6184106" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/6184106/Terrorists_Victims_and_Society">Terrorists, Victims and Society</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The focus of this book is ultimately to present a clear and succinct view of what psychological research has revealed about terrorists and terrorism. The results are often disturbing, sometimes surprising and frequently disheartening.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_6184106" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The focus of this book is ultimately to present a clear and succinct view of what psychological research has revealed about terrorists and terrorism. The results are often disturbing, sometimes surprising and frequently disheartening. Perhaps most worrying of all, is the extent to which this current level and range of knowledge has repeatedly been ignored and overlooked by those tasked with the responsibility of controlling terrorism. This book aims to provide a clear, intelligent and well-informed account of what psychology has learned in the past thirty years about issues relating to terrorism. It also aims to demonstrate just how one branch of social science can provide a powerful tool for insight and guidance on one of the most challenging problems facing the modern world.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/6184106" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ccd73b50b313d206bce5e5ffc64b985e" rel="nofollow" data-download="{&quot;attachment_id&quot;:33065959,&quot;asset_id&quot;:6184106,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33065959/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7413156" href="https://royalholloway.academia.edu/AndrewSilke">Andrew Silke</a><script data-card-contents-for-user="7413156" type="text/json">{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1660","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}</script></span></span></li><li class="js-paper-rank-work_6184106 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="6184106"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 6184106, container: ".js-paper-rank-work_6184106", }); });</script></li><li class="js-percentile-work_6184106 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 6184106; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_6184106"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_6184106 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="6184106"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 6184106; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=6184106]").text(description); $(".js-view-count-work_6184106").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_6184106").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="6184106"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">19</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="221" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="259" rel="nofollow" href="https://www.academia.edu/Documents/in/Forensic_Psychology">Forensic Psychology</a>,&nbsp;<script data-card-contents-for-ri="259" type="text/json">{"id":259,"name":"Forensic Psychology","url":"https://www.academia.edu/Documents/in/Forensic_Psychology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a><script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=6184106]'), work: {"id":6184106,"title":"Terrorists, Victims and Society","created_at":"2014-02-23T20:09:43.929-08:00","url":"https://www.academia.edu/6184106/Terrorists_Victims_and_Society?f_ri=1660","dom_id":"work_6184106","summary":"The focus of this book is ultimately to present a clear and succinct view of what psychological research has revealed about terrorists and terrorism. The results are often disturbing, sometimes surprising and frequently disheartening. Perhaps most worrying of all, is the extent to which this current level and range of knowledge has repeatedly been ignored and overlooked by those tasked with the responsibility of controlling terrorism. This book aims to provide a clear, intelligent and well-informed account of what psychology has learned in the past thirty years about issues relating to terrorism. It also aims to demonstrate just how one branch of social science can provide a powerful tool for insight and guidance on one of the most challenging problems facing the modern world. ","downloadable_attachments":[{"id":33065959,"asset_id":6184106,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1660","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1660","nofollow":true},{"id":259,"name":"Forensic Psychology","url":"https://www.academia.edu/Documents/in/Forensic_Psychology?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":6372,"name":"Victimology","url":"https://www.academia.edu/Documents/in/Victimology?f_ri=1660"},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660"},{"id":22342,"name":"Terrorism and Psychology","url":"https://www.academia.edu/Documents/in/Terrorism_and_Psychology?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":29195,"name":"Use of Force \u0026 Counter-terrorism","url":"https://www.academia.edu/Documents/in/Use_of_Force_and_Counter-terrorism?f_ri=1660"},{"id":73939,"name":"Hostage Negotiations","url":"https://www.academia.edu/Documents/in/Hostage_Negotiations?f_ri=1660"},{"id":91202,"name":"Terrorism and media","url":"https://www.academia.edu/Documents/in/Terrorism_and_media?f_ri=1660"},{"id":133865,"name":"Victims","url":"https://www.academia.edu/Documents/in/Victims?f_ri=1660"},{"id":198834,"name":"Military Psychology, Terrorism and Counter Terrorism","url":"https://www.academia.edu/Documents/in/Military_Psychology_Terrorism_and_Counter_Terrorism?f_ri=1660"},{"id":561713,"name":"Terrorist Radicalization","url":"https://www.academia.edu/Documents/in/Terrorist_Radicalization?f_ri=1660"},{"id":645628,"name":"Psychology of Terrorism","url":"https://www.academia.edu/Documents/in/Psychology_of_Terrorism?f_ri=1660"},{"id":965590,"name":"Mindset of a Terrorist","url":"https://www.academia.edu/Documents/in/Mindset_of_a_Terrorist?f_ri=1660"},{"id":999736,"name":"Terrorism and PTSD","url":"https://www.academia.edu/Documents/in/Terrorism_and_PTSD?f_ri=1660"},{"id":1110680,"name":"Disengagement from Terrorism","url":"https://www.academia.edu/Documents/in/Disengagement_from_Terrorism?f_ri=1660"},{"id":1238662,"name":"Victims of Terrorism","url":"https://www.academia.edu/Documents/in/Victims_of_Terrorism?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_32268881" data-work_id="32268881" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/32268881/Sources_and_Patterns_of_Terrorism_in_Islamic_Law">Sources and Patterns of Terrorism in Islamic Law</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">This article looks at the doctrinal sources of violence in Islamic Law and proposes vectors for a response.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/32268881" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ee33c12bbd3ef49ee46ea65f28d05896" rel="nofollow" data-download="{&quot;attachment_id&quot;:52487561,&quot;asset_id&quot;:32268881,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/52487561/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="30580397" href="https://independent.academia.edu/WilliamGawthrop">William Gawthrop, Ph. D</a><script data-card-contents-for-user="30580397" type="text/json">{"id":30580397,"first_name":"William","last_name":"Gawthrop, Ph. D","domain_name":"independent","page_name":"WilliamGawthrop","display_name":"William Gawthrop, Ph. D","profile_url":"https://independent.academia.edu/WilliamGawthrop?f_ri=1660","photo":"https://0.academia-photos.com/30580397/164432271/154244807/s65_william.gawthrop_ph._d.jpeg"}</script></span></span></li><li class="js-paper-rank-work_32268881 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="32268881"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 32268881, container: ".js-paper-rank-work_32268881", }); });</script></li><li class="js-percentile-work_32268881 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 32268881; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_32268881"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_32268881 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="32268881"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 32268881; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=32268881]").text(description); $(".js-view-count-work_32268881").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_32268881").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="32268881"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5780" rel="nofollow" href="https://www.academia.edu/Documents/in/Ideology">Ideology</a>,&nbsp;<script data-card-contents-for-ri="5780" type="text/json">{"id":5780,"name":"Ideology","url":"https://www.academia.edu/Documents/in/Ideology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="65592" rel="nofollow" href="https://www.academia.edu/Documents/in/Counterterrorism">Counterterrorism</a>,&nbsp;<script data-card-contents-for-ri="65592" type="text/json">{"id":65592,"name":"Counterterrorism","url":"https://www.academia.edu/Documents/in/Counterterrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="196514" rel="nofollow" href="https://www.academia.edu/Documents/in/Center_of_Gravity">Center of Gravity</a><script data-card-contents-for-ri="196514" type="text/json">{"id":196514,"name":"Center of Gravity","url":"https://www.academia.edu/Documents/in/Center_of_Gravity?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=32268881]'), work: {"id":32268881,"title":"Sources and Patterns of Terrorism in Islamic Law","created_at":"2017-04-05T04:03:26.208-07:00","url":"https://www.academia.edu/32268881/Sources_and_Patterns_of_Terrorism_in_Islamic_Law?f_ri=1660","dom_id":"work_32268881","summary":"This article looks at the doctrinal sources of violence in Islamic Law and proposes vectors for a response.","downloadable_attachments":[{"id":52487561,"asset_id":32268881,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":30580397,"first_name":"William","last_name":"Gawthrop, Ph. D","domain_name":"independent","page_name":"WilliamGawthrop","display_name":"William Gawthrop, Ph. D","profile_url":"https://independent.academia.edu/WilliamGawthrop?f_ri=1660","photo":"https://0.academia-photos.com/30580397/164432271/154244807/s65_william.gawthrop_ph._d.jpeg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5780,"name":"Ideology","url":"https://www.academia.edu/Documents/in/Ideology?f_ri=1660","nofollow":true},{"id":65592,"name":"Counterterrorism","url":"https://www.academia.edu/Documents/in/Counterterrorism?f_ri=1660","nofollow":true},{"id":196514,"name":"Center of Gravity","url":"https://www.academia.edu/Documents/in/Center_of_Gravity?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8620943" data-work_id="8620943" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8620943/The_New_Chechen_Jihad_Militant_Wahhabism_as_a_Radical_Movement_and_a_Source_of_Suicide_Terrorism_in_Post_War_Chechen_Society">The New Chechen Jihad: Militant Wahhabism as a Radical Movement and a Source of Suicide Terrorism in Post-War Chechen Society</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The first act of Chechen suicide terrorism occurred on June 7, 2000 and was carried out by two young women. This inaugurated the migration of suicide terrorism from other conflict zones, into the Chechen conflict. How suicide terrorism as... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8620943" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The first act of Chechen suicide terrorism occurred on June 7, 2000 and was carried out by two young women. This inaugurated the migration of suicide terrorism from other conflict zones, into the Chechen conflict. How suicide terrorism as a tactic made it’s way into Chechnya is the topic of this paper, which provides an analysis of the events concerning the importation of militant ideologies and radical terrorist movements taking place since the Chechen declaration of independence as well as an empirical and theoretical analysis of Chechen suicide terrorism based on psycho-social interviews that were collected in Chechnya over a two-year time period from March 2003 to March 2005. We report data about suicide terrorism and the radicalization process from thirty-two interviews with family members and close associates of thirty-four Chechen suicide terrorists inquiring about the terrorists’ backgrounds, experiences, religious, and psychological reasons leading up to their suicidal acts.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8620943" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="af327f13e12257dc82d49825d232b082" rel="nofollow" data-download="{&quot;attachment_id&quot;:36376324,&quot;asset_id&quot;:8620943,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36376324/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="17882988" href="https://microbiology-georgetown.academia.edu/AnneSpeckhard">Anne Speckhard</a><script data-card-contents-for-user="17882988" type="text/json">{"id":17882988,"first_name":"Anne","last_name":"Speckhard","domain_name":"microbiology-georgetown","page_name":"AnneSpeckhard","display_name":"Anne Speckhard","profile_url":"https://microbiology-georgetown.academia.edu/AnneSpeckhard?f_ri=1660","photo":"https://0.academia-photos.com/17882988/12726169/20498828/s65_anne.speckhard.jpg"}</script></span></span></li><li class="js-paper-rank-work_8620943 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8620943"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8620943, container: ".js-paper-rank-work_8620943", }); });</script></li><li class="js-percentile-work_8620943 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8620943; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8620943"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8620943 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8620943"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8620943; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8620943]").text(description); $(".js-view-count-work_8620943").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8620943").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8620943"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="10342" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence">Political Violence</a>,&nbsp;<script data-card-contents-for-ri="10342" type="text/json">{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="76752" rel="nofollow" href="https://www.academia.edu/Documents/in/Suicide_Terrorism">Suicide Terrorism</a><script data-card-contents-for-ri="76752" type="text/json">{"id":76752,"name":"Suicide Terrorism","url":"https://www.academia.edu/Documents/in/Suicide_Terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8620943]'), work: {"id":8620943,"title":"The New Chechen Jihad: Militant Wahhabism as a Radical Movement and a Source of Suicide Terrorism in Post-War Chechen Society","created_at":"2014-10-03T09:57:36.219-07:00","url":"https://www.academia.edu/8620943/The_New_Chechen_Jihad_Militant_Wahhabism_as_a_Radical_Movement_and_a_Source_of_Suicide_Terrorism_in_Post_War_Chechen_Society?f_ri=1660","dom_id":"work_8620943","summary":"The first act of Chechen suicide terrorism occurred on June 7, 2000 and was carried out by two young women. This inaugurated the migration of suicide terrorism from other conflict zones, into the Chechen conflict. How suicide terrorism as a tactic made it’s way into Chechnya is the topic of this paper, which provides an analysis of the events concerning the importation of militant ideologies and radical terrorist movements taking place since the Chechen declaration of independence as well as an empirical and theoretical analysis of Chechen suicide terrorism based on psycho-social interviews that were collected in Chechnya over a two-year time period from March 2003 to March 2005. We report data about suicide terrorism and the radicalization process from thirty-two interviews with family members and close associates of thirty-four Chechen suicide terrorists inquiring about the terrorists’ backgrounds, experiences, religious, and psychological reasons leading up to their suicidal acts.","downloadable_attachments":[{"id":36376324,"asset_id":8620943,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":17882988,"first_name":"Anne","last_name":"Speckhard","domain_name":"microbiology-georgetown","page_name":"AnneSpeckhard","display_name":"Anne Speckhard","profile_url":"https://microbiology-georgetown.academia.edu/AnneSpeckhard?f_ri=1660","photo":"https://0.academia-photos.com/17882988/12726169/20498828/s65_anne.speckhard.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660","nofollow":true},{"id":76752,"name":"Suicide Terrorism","url":"https://www.academia.edu/Documents/in/Suicide_Terrorism?f_ri=1660","nofollow":true},{"id":306292,"name":"Russia's war with Chechnya","url":"https://www.academia.edu/Documents/in/Russias_war_with_Chechnya?f_ri=1660"},{"id":349382,"name":"Chechnya","url":"https://www.academia.edu/Documents/in/Chechnya?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14914373 coauthored" data-work_id="14914373" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14914373/Impact_of_Counter_Terrorism_on_Communities_Netherlands_Background_Report">Impact of Counter-Terrorism on Communities: Netherlands Background Report</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This country report sets the context for research on the impact of counter-terrorism legislation and policies on racial, ethnic and religious minority communities in the Netherlands. Despite the fact that over the last decade various... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14914373" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This country report sets the context for research on the impact of counter-terrorism legislation and policies on racial, ethnic and religious minority communities in the Netherlands. Despite the fact that over the last decade various security measures have been assessed, there are few studies on their context-specific effect. This report discusses the Dutch population and community situation, the counter-terrorism legal framework, its policy and policing background as well as security and political perspectives. It concludes that, in the years since 9/11, the Madrid and London terror attacks, and the murder of filmmaker and Islam-critic Theo van Gogh, fear of terrorism has decreased. Furthermore, the general public appears more concerned about the effect that security measures have on their civil rights and liberties. Public security and crime-prevention remain high on the political agenda and various trends, including the emergence of anticipatory criminal justice, the use and availability of ethnic data and the strength of populist parties mobilising around (cr)immigration and integration, have made the risk of side-effects of security measures for minority communities more pertinent. The apparently decreased political and public support for the anti-discrimination framework and the weak socio-economic position and institutional representation of ethnic minorities and migrants, contribute to the necessity of sound empirical research on the impact of security measures on minority, especially Muslim, communities in the Netherlands.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14914373" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1b651628364ce83904abde7e45deac91" rel="nofollow" data-download="{&quot;attachment_id&quot;:38471933,&quot;asset_id&quot;:14914373,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38471933/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="30039073" href="https://independent.academia.edu/DoutjeLettinga">Doutje Lettinga</a><script data-card-contents-for-user="30039073" type="text/json">{"id":30039073,"first_name":"Doutje","last_name":"Lettinga","domain_name":"independent","page_name":"DoutjeLettinga","display_name":"Doutje Lettinga","profile_url":"https://independent.academia.edu/DoutjeLettinga?f_ri=1660","photo":"https://0.academia-photos.com/30039073/9971040/11119429/s65_doutje.lettinga.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-14914373">+2</span><div class="hidden js-additional-users-14914373"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://hogeschool.academia.edu/QuirineEijkman">Quirine Eijkman</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://vu-nl.academia.edu/GijsVerbossen">Gijs Verbossen</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-14914373'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-14914373').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_14914373 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14914373"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14914373, container: ".js-paper-rank-work_14914373", }); });</script></li><li class="js-percentile-work_14914373 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14914373; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14914373"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14914373 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14914373"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14914373; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14914373]").text(description); $(".js-view-count-work_14914373").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14914373").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14914373"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12978" rel="nofollow" href="https://www.academia.edu/Documents/in/Muslim_Minorities">Muslim Minorities</a>,&nbsp;<script data-card-contents-for-ri="12978" type="text/json">{"id":12978,"name":"Muslim Minorities","url":"https://www.academia.edu/Documents/in/Muslim_Minorities?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26669" rel="nofollow" href="https://www.academia.edu/Documents/in/Counter_terrorism">Counter terrorism</a><script data-card-contents-for-ri="26669" type="text/json">{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14914373]'), work: {"id":14914373,"title":"Impact of Counter-Terrorism on Communities: Netherlands Background Report","created_at":"2015-08-14T02:02:10.894-07:00","url":"https://www.academia.edu/14914373/Impact_of_Counter_Terrorism_on_Communities_Netherlands_Background_Report?f_ri=1660","dom_id":"work_14914373","summary":"This country report sets the context for research on the impact of counter-terrorism legislation and policies on racial, ethnic and religious minority communities in the Netherlands. Despite the fact that over the last decade various security measures have been assessed, there are few studies on their context-specific effect. This report discusses the Dutch population and community situation, the counter-terrorism legal framework, its policy and policing background as well as security and political perspectives. It concludes that, in the years since 9/11, the Madrid and London terror attacks, and the murder of filmmaker and Islam-critic Theo van Gogh, fear of terrorism has decreased. Furthermore, the general public appears more concerned about the effect that security measures have on their civil rights and liberties. Public security and crime-prevention remain high on the political agenda and various trends, including the emergence of anticipatory criminal justice, the use and availability of ethnic data and the strength of populist parties mobilising around (cr)immigration and integration, have made the risk of side-effects of security measures for minority communities more pertinent. The apparently decreased political and public support for the anti-discrimination framework and the weak socio-economic position and institutional representation of ethnic minorities and migrants, contribute to the necessity of sound empirical research on the impact of security measures on minority, especially Muslim, communities in the Netherlands.","downloadable_attachments":[{"id":38471933,"asset_id":14914373,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":30039073,"first_name":"Doutje","last_name":"Lettinga","domain_name":"independent","page_name":"DoutjeLettinga","display_name":"Doutje Lettinga","profile_url":"https://independent.academia.edu/DoutjeLettinga?f_ri=1660","photo":"https://0.academia-photos.com/30039073/9971040/11119429/s65_doutje.lettinga.jpg"},{"id":17406781,"first_name":"Quirine","last_name":"Eijkman","domain_name":"hogeschool","page_name":"QuirineEijkman","display_name":"Quirine Eijkman","profile_url":"https://hogeschool.academia.edu/QuirineEijkman?f_ri=1660","photo":"https://0.academia-photos.com/17406781/11554079/12885708/s65_quirine.eijkman.jpg"},{"id":323941,"first_name":"Gijs","last_name":"Verbossen","domain_name":"vu-nl","page_name":"GijsVerbossen","display_name":"Gijs Verbossen","profile_url":"https://vu-nl.academia.edu/GijsVerbossen?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":12978,"name":"Muslim Minorities","url":"https://www.academia.edu/Documents/in/Muslim_Minorities?f_ri=1660","nofollow":true},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true},{"id":99915,"name":"Integration","url":"https://www.academia.edu/Documents/in/Integration?f_ri=1660"},{"id":159181,"name":"Equality and Non Discrimination","url":"https://www.academia.edu/Documents/in/Equality_and_Non_Discrimination?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43409523" data-work_id="43409523" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43409523/French_Foreign_Policy_in_Libya_and_Syria_2003_2017_Strategic_Adaptability_in_Quickly_Changing_Environments">French Foreign Policy in Libya and Syria (2003–2017): Strategic Adaptability in Quickly Changing Environments</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43409523" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be less effective than expected. Although distinct, both were pursuing the same aim: the expansion of friendly democratic regimes in the Southern European neighborhood bloc.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43409523" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fc41cda1ad4bab676dc2e8e582664927" rel="nofollow" data-download="{&quot;attachment_id&quot;:63709266,&quot;asset_id&quot;:43409523,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63709266/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="54079301" href="https://sciences-po.academia.edu/JulienTh%C3%A9ron">Julien Théron</a><script data-card-contents-for-user="54079301" type="text/json">{"id":54079301,"first_name":"Julien","last_name":"Théron","domain_name":"sciences-po","page_name":"JulienThéron","display_name":"Julien Théron","profile_url":"https://sciences-po.academia.edu/JulienTh%C3%A9ron?f_ri=1660","photo":"https://0.academia-photos.com/54079301/14265522/15221464/s65_julien.th_ron.jpg"}</script></span></span></li><li class="js-paper-rank-work_43409523 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43409523"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43409523, container: ".js-paper-rank-work_43409523", }); });</script></li><li class="js-percentile-work_43409523 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43409523; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43409523"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43409523 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43409523"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43409523; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43409523]").text(description); $(".js-view-count-work_43409523").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43409523").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43409523"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="579" rel="nofollow" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>,&nbsp;<script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2990" rel="nofollow" href="https://www.academia.edu/Documents/in/Geopolitics">Geopolitics</a><script data-card-contents-for-ri="2990" type="text/json">{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43409523]'), work: {"id":43409523,"title":"French Foreign Policy in Libya and Syria (2003–2017): Strategic Adaptability in Quickly Changing Environments","created_at":"2020-06-22T14:24:33.172-07:00","url":"https://www.academia.edu/43409523/French_Foreign_Policy_in_Libya_and_Syria_2003_2017_Strategic_Adaptability_in_Quickly_Changing_Environments?f_ri=1660","dom_id":"work_43409523","summary":"Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be less effective than expected. Although distinct, both were pursuing the same aim: the expansion of friendly democratic regimes in the Southern European neighborhood bloc.","downloadable_attachments":[{"id":63709266,"asset_id":43409523,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":54079301,"first_name":"Julien","last_name":"Théron","domain_name":"sciences-po","page_name":"JulienThéron","display_name":"Julien Théron","profile_url":"https://sciences-po.academia.edu/JulienTh%C3%A9ron?f_ri=1660","photo":"https://0.academia-photos.com/54079301/14265522/15221464/s65_julien.th_ron.jpg"}],"research_interests":[{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=1660","nofollow":true},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=1660","nofollow":true},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=1660"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria?f_ri=1660"},{"id":49153,"name":"Libya","url":"https://www.academia.edu/Documents/in/Libya?f_ri=1660"},{"id":104174,"name":"Geostrategy","url":"https://www.academia.edu/Documents/in/Geostrategy?f_ri=1660"},{"id":125423,"name":"Jihadism","url":"https://www.academia.edu/Documents/in/Jihadism?f_ri=1660"},{"id":127515,"name":"Conflict Studies","url":"https://www.academia.edu/Documents/in/Conflict_Studies?f_ri=1660"},{"id":137744,"name":"Conflict in Libya","url":"https://www.academia.edu/Documents/in/Conflict_in_Libya?f_ri=1660"},{"id":198844,"name":"Security and Peace Studies","url":"https://www.academia.edu/Documents/in/Security_and_Peace_Studies?f_ri=1660"},{"id":233192,"name":"Syrian Revolution","url":"https://www.academia.edu/Documents/in/Syrian_Revolution?f_ri=1660"},{"id":375440,"name":"French foreign policy","url":"https://www.academia.edu/Documents/in/French_foreign_policy?f_ri=1660"},{"id":575764,"name":"Syrian Conflict","url":"https://www.academia.edu/Documents/in/Syrian_Conflict?f_ri=1660"},{"id":1001904,"name":"Non State Armed Groups","url":"https://www.academia.edu/Documents/in/Non_State_Armed_Groups?f_ri=1660"},{"id":1002946,"name":"Interventionism","url":"https://www.academia.edu/Documents/in/Interventionism?f_ri=1660"},{"id":1059087,"name":"Syrian Civil War","url":"https://www.academia.edu/Documents/in/Syrian_Civil_War?f_ri=1660"},{"id":1363262,"name":"Libyan Revolution","url":"https://www.academia.edu/Documents/in/Libyan_Revolution?f_ri=1660"},{"id":1881149,"name":"Non-State Armed Groups","url":"https://www.academia.edu/Documents/in/Non-State_Armed_Groups?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1606348" data-work_id="1606348" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1606348/On_Gangs_Crime_and_Terrorism">On Gangs, Crime, and Terrorism</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper discusses the dynamics of the gang-crime-terrorism continuum and its relationship to ”generations of warfare” within the contemporary spectrum of conflict. The focus is to explore the potential for gang-terrorist interaction in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1606348" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper discusses the dynamics of the gang-crime-terrorism continuum and its relationship to ”generations of warfare” within the contemporary spectrum of conflict. The focus is to explore the potential for gang-terrorist interaction in the current and emerging conflict environment. The concepts of third generation street gangs (3G2), netwar, and fourth generation warfare (4GW) are applied to investigate the typologies and relationships of third generation street gangs and terrorist groups.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1606348" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a8d01a8c301e09c6962b64c7ae19aefb" rel="nofollow" data-download="{&quot;attachment_id&quot;:15509518,&quot;asset_id&quot;:1606348,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/15509518/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="291564" href="https://uoc.academia.edu/JohnPSullivan">John P. Sullivan</a><script data-card-contents-for-user="291564" type="text/json">{"id":291564,"first_name":"John P.","last_name":"Sullivan","domain_name":"uoc","page_name":"JohnPSullivan","display_name":"John P. Sullivan","profile_url":"https://uoc.academia.edu/JohnPSullivan?f_ri=1660","photo":"https://0.academia-photos.com/291564/71891/18899958/s65_john_p..sullivan.jpg"}</script></span></span></li><li class="js-paper-rank-work_1606348 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1606348"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1606348, container: ".js-paper-rank-work_1606348", }); });</script></li><li class="js-percentile-work_1606348 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1606348; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1606348"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1606348 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1606348"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1606348; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1606348]").text(description); $(".js-view-count-work_1606348").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1606348").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1606348"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="169246" rel="nofollow" href="https://www.academia.edu/Documents/in/Gangs">Gangs</a>,&nbsp;<script data-card-contents-for-ri="169246" type="text/json">{"id":169246,"name":"Gangs","url":"https://www.academia.edu/Documents/in/Gangs?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="213792" rel="nofollow" href="https://www.academia.edu/Documents/in/Maras_Gangs">Maras Gangs</a>,&nbsp;<script data-card-contents-for-ri="213792" type="text/json">{"id":213792,"name":"Maras Gangs","url":"https://www.academia.edu/Documents/in/Maras_Gangs?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="315813" rel="nofollow" href="https://www.academia.edu/Documents/in/3_Gen_gangs">3 Gen gangs</a><script data-card-contents-for-ri="315813" type="text/json">{"id":315813,"name":"3 Gen gangs","url":"https://www.academia.edu/Documents/in/3_Gen_gangs?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1606348]'), work: {"id":1606348,"title":"On Gangs, Crime, and Terrorism","created_at":"2012-05-30T17:02:10.130-07:00","url":"https://www.academia.edu/1606348/On_Gangs_Crime_and_Terrorism?f_ri=1660","dom_id":"work_1606348","summary":"This paper discusses the dynamics of the gang-crime-terrorism continuum and its relationship to ”generations of warfare” within the contemporary spectrum of conflict. The focus is to explore the potential for gang-terrorist interaction in the current and emerging conflict environment. The concepts of third generation street gangs (3G2), netwar, and fourth generation warfare (4GW) are applied to investigate the typologies and relationships of third generation street gangs and terrorist groups.","downloadable_attachments":[{"id":15509518,"asset_id":1606348,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":291564,"first_name":"John P.","last_name":"Sullivan","domain_name":"uoc","page_name":"JohnPSullivan","display_name":"John P. Sullivan","profile_url":"https://uoc.academia.edu/JohnPSullivan?f_ri=1660","photo":"https://0.academia-photos.com/291564/71891/18899958/s65_john_p..sullivan.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":169246,"name":"Gangs","url":"https://www.academia.edu/Documents/in/Gangs?f_ri=1660","nofollow":true},{"id":213792,"name":"Maras Gangs","url":"https://www.academia.edu/Documents/in/Maras_Gangs?f_ri=1660","nofollow":true},{"id":315813,"name":"3 Gen gangs","url":"https://www.academia.edu/Documents/in/3_Gen_gangs?f_ri=1660","nofollow":true},{"id":428564,"name":"3rd Generation Street gangs","url":"https://www.academia.edu/Documents/in/3rd_Generation_Street_gangs?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_49337736" data-work_id="49337736" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/49337736/Nexus_of_Terror_State_Sponsored_Terrorism_and_the_Case_of_Afghanistan">Nexus of Terror: State-Sponsored Terrorism and the Case of Afghanistan</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Global terrorism continues to be a multifaceted security threat that decisively shapes the policies of political actors worldwide. An important component of contemporary terrorism is the financing mechanisms connected to the activities of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_49337736" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Global terrorism continues to be a multifaceted security threat that decisively shapes the policies of political actors worldwide. An important component of contemporary terrorism is the financing mechanisms connected to the activities of terrorist organizations (TOs): TOs have proven apt in diversifying their funding sources and now rely on activities as broad as involvement in organized crime, illicit resource extraction as well as transnational trade in drugs and people. Following the innovation and popularization of modern communication technologies, TOs have also increasingly capitalized on the internet as a space through which to finance their operations, disseminate their propaganda and recruit new members. The financing mechanisms of TOs are subsequently in a process of consistent evolution and are shaped by external factors, thereby producing consistent challenges for State actors to develop their counterterrorist capacities in accordance with the newest trends in terrorist activities.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/49337736" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="21dd5a5c4cbabd516ea0b44e6cc766e6" rel="nofollow" data-download="{&quot;attachment_id&quot;:67712175,&quot;asset_id&quot;:49337736,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67712175/download_file?st=MTc0MDU5NjU2Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="89615244" href="https://independent.academia.edu/EFSAS">European Foundation for South Asian Studies (EFSAS)</a><script data-card-contents-for-user="89615244" type="text/json">{"id":89615244,"first_name":"European Foundation for South Asian Studies","last_name":"(EFSAS)","domain_name":"independent","page_name":"EFSAS","display_name":"European Foundation for South Asian Studies (EFSAS)","profile_url":"https://independent.academia.edu/EFSAS?f_ri=1660","photo":"https://0.academia-photos.com/89615244/20341995/20054407/s65_efsas.european_foundation_for_south_asian_studies.jpg"}</script></span></span></li><li class="js-paper-rank-work_49337736 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="49337736"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 49337736, container: ".js-paper-rank-work_49337736", }); });</script></li><li class="js-percentile-work_49337736 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 49337736; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_49337736"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_49337736 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="49337736"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 49337736; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=49337736]").text(description); $(".js-view-count-work_49337736").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_49337736").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="49337736"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5357" rel="nofollow" href="https://www.academia.edu/Documents/in/Afghanistan">Afghanistan</a>,&nbsp;<script data-card-contents-for-ri="5357" type="text/json">{"id":5357,"name":"Afghanistan","url":"https://www.academia.edu/Documents/in/Afghanistan?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7361" rel="nofollow" href="https://www.academia.edu/Documents/in/Pakistan">Pakistan</a><script data-card-contents-for-ri="7361" type="text/json">{"id":7361,"name":"Pakistan","url":"https://www.academia.edu/Documents/in/Pakistan?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=49337736]'), work: {"id":49337736,"title":"Nexus of Terror: State-Sponsored Terrorism and the Case of Afghanistan","created_at":"2021-06-22T06:34:27.303-07:00","url":"https://www.academia.edu/49337736/Nexus_of_Terror_State_Sponsored_Terrorism_and_the_Case_of_Afghanistan?f_ri=1660","dom_id":"work_49337736","summary":"Global terrorism continues to be a multifaceted security threat that decisively shapes the policies of political actors worldwide. An important component of contemporary terrorism is the financing mechanisms connected to the activities of terrorist organizations (TOs): TOs have proven apt in diversifying their funding sources and now rely on activities as broad as involvement in organized crime, illicit resource extraction as well as transnational trade in drugs and people. Following the innovation and popularization of modern communication technologies, TOs have also increasingly capitalized on the internet as a space through which to finance their operations, disseminate their propaganda and recruit new members. The financing mechanisms of TOs are subsequently in a process of consistent evolution and are shaped by external factors, thereby producing consistent challenges for State actors to develop their counterterrorist capacities in accordance with the newest trends in terrorist activities. ","downloadable_attachments":[{"id":67712175,"asset_id":49337736,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":89615244,"first_name":"European Foundation for South Asian Studies","last_name":"(EFSAS)","domain_name":"independent","page_name":"EFSAS","display_name":"European Foundation for South Asian Studies (EFSAS)","profile_url":"https://independent.academia.edu/EFSAS?f_ri=1660","photo":"https://0.academia-photos.com/89615244/20341995/20054407/s65_efsas.european_foundation_for_south_asian_studies.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5357,"name":"Afghanistan","url":"https://www.academia.edu/Documents/in/Afghanistan?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":7361,"name":"Pakistan","url":"https://www.academia.edu/Documents/in/Pakistan?f_ri=1660","nofollow":true},{"id":37111,"name":"State Sponsored Terrorism","url":"https://www.academia.edu/Documents/in/State_Sponsored_Terrorism?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34751540 coauthored" data-work_id="34751540" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34751540/Islamist_Violent_Extremism_A_New_Form_of_Conflict_or_Business_as_Usual">Islamist Violent Extremism: A New Form of Conflict or Business as Usual?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Islamist violent extremist (IVE) groups are frequently involved in civil conflicts. Indeed, some groups owe their origins to conflict, and tens of thousands of Islamists have chosen to participate in conflicts taking place in foreign... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34751540" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Islamist violent extremist (IVE) groups are frequently involved in civil conflicts. Indeed, some groups owe their origins to conflict, and tens of thousands of Islamists have chosen to participate in conflicts taking place in foreign countries in the past 35 years. Increasingly, IVE groups appear to have the capacity to influence the conflicts they are involved in, and are influenced in turn by their experiences. As a result, for those working on conflict resolution and post-conflict reconstruction, the involvement of IVE groups raises questions of whether traditional responses remain adequate. Drawing on three country case studies – Nigeria, Kenya and Iraq/Syria, this article examines the similarities and differences between IVE groups and other conflict actors, and what this means for development, state-building and peacebuilding responses.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34751540" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ca5cf27e97cd99502aac683300a02280" rel="nofollow" data-download="{&quot;attachment_id&quot;:54609845,&quot;asset_id&quot;:34751540,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54609845/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1067724" href="https://leidenuni.academia.edu/ThomasMaguire">Thomas Maguire</a><script data-card-contents-for-user="1067724" type="text/json">{"id":1067724,"first_name":"Thomas","last_name":"Maguire","domain_name":"leidenuni","page_name":"ThomasMaguire","display_name":"Thomas Maguire","profile_url":"https://leidenuni.academia.edu/ThomasMaguire?f_ri=1660","photo":"https://0.academia-photos.com/1067724/369199/54829889/s65_thomas.maguire.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-34751540">+1</span><div class="hidden js-additional-users-34751540"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/WinterbothamEmily">Emily Winterbotham</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-34751540'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-34751540').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_34751540 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34751540"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34751540, container: ".js-paper-rank-work_34751540", }); });</script></li><li class="js-percentile-work_34751540 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34751540; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34751540"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34751540 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34751540"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34751540; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34751540]").text(description); $(".js-view-count-work_34751540").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34751540").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34751540"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">27</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="379" rel="nofollow" href="https://www.academia.edu/Documents/in/African_Studies">African Studies</a>,&nbsp;<script data-card-contents-for-ri="379" type="text/json">{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="977" rel="nofollow" href="https://www.academia.edu/Documents/in/Development_Studies">Development Studies</a>,&nbsp;<script data-card-contents-for-ri="977" type="text/json">{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1198" rel="nofollow" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a><script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34751540]'), work: {"id":34751540,"title":"Islamist Violent Extremism: A New Form of Conflict or Business as Usual?","created_at":"2017-10-03T06:06:16.683-07:00","url":"https://www.academia.edu/34751540/Islamist_Violent_Extremism_A_New_Form_of_Conflict_or_Business_as_Usual?f_ri=1660","dom_id":"work_34751540","summary":"Islamist violent extremist (IVE) groups are frequently involved in civil conflicts. Indeed, some groups owe their origins to conflict, and tens of thousands of Islamists have chosen to participate in conflicts taking place in foreign countries in the past 35 years. Increasingly, IVE groups appear to have the capacity to influence the conflicts they are involved in, and are influenced in turn by their experiences. As a result, for those working on conflict resolution and post-conflict reconstruction, the involvement of IVE groups raises questions of whether traditional responses remain adequate. Drawing on three country case studies – Nigeria, Kenya and Iraq/Syria, this article examines the similarities and differences between IVE groups and other conflict actors, and what this means for development, state-building and peacebuilding responses.","downloadable_attachments":[{"id":54609845,"asset_id":34751540,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1067724,"first_name":"Thomas","last_name":"Maguire","domain_name":"leidenuni","page_name":"ThomasMaguire","display_name":"Thomas Maguire","profile_url":"https://leidenuni.academia.edu/ThomasMaguire?f_ri=1660","photo":"https://0.academia-photos.com/1067724/369199/54829889/s65_thomas.maguire.jpg"},{"id":30082424,"first_name":"Emily","last_name":"Winterbotham","domain_name":"independent","page_name":"WinterbothamEmily","display_name":"Emily Winterbotham","profile_url":"https://independent.academia.edu/WinterbothamEmily?f_ri=1660","photo":"https://0.academia-photos.com/30082424/80748452/71822749/s65_emily.winterbotham.jpg"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1660","nofollow":true},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660","nofollow":true},{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=1660","nofollow":true},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=1660"},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=1660"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=1660"},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=1660"},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":7980,"name":"History of Political Violence","url":"https://www.academia.edu/Documents/in/History_of_Political_Violence?f_ri=1660"},{"id":9451,"name":"Insurgency/Counterinsurgency(COIN)","url":"https://www.academia.edu/Documents/in/Insurgency_Counterinsurgency_COIN_?f_ri=1660"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660"},{"id":11589,"name":"Iraq","url":"https://www.academia.edu/Documents/in/Iraq?f_ri=1660"},{"id":12809,"name":"Middle Eastern Studies","url":"https://www.academia.edu/Documents/in/Middle_Eastern_Studies?f_ri=1660"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria?f_ri=1660"},{"id":18892,"name":"Kenya","url":"https://www.academia.edu/Documents/in/Kenya?f_ri=1660"},{"id":21318,"name":"Nigeria","url":"https://www.academia.edu/Documents/in/Nigeria?f_ri=1660"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=1660"},{"id":43520,"name":"Middle East","url":"https://www.academia.edu/Documents/in/Middle_East?f_ri=1660"},{"id":271833,"name":"Boko Haram","url":"https://www.academia.edu/Documents/in/Boko_Haram?f_ri=1660"},{"id":353591,"name":"Al Shabaab","url":"https://www.academia.edu/Documents/in/Al_Shabaab?f_ri=1660"},{"id":575764,"name":"Syrian Conflict","url":"https://www.academia.edu/Documents/in/Syrian_Conflict?f_ri=1660"},{"id":960598,"name":"Religious and Political Violence","url":"https://www.academia.edu/Documents/in/Religious_and_Political_Violence?f_ri=1660"},{"id":1223682,"name":"Insurgency and counterinsurgency","url":"https://www.academia.edu/Documents/in/Insurgency_and_counterinsurgency?f_ri=1660"},{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34900761" data-work_id="34900761" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34900761/Regional_Arrangements_and_Transnational_Security_Challenges_The_African_Union_and_the_Limits_of_Securitization_Theory">Regional Arrangements and Transnational Security Challenges: The African Union and the Limits of Securitization Theory</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">How do regional arrangements construct and respond to threat agendas, and to what extent can the existing literature on securitization theory help us understand this process? This article explores these questions by analyzing how the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34900761" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">How do regional arrangements construct and respond to threat agendas, and to what extent can the existing literature on securitization theory help us understand this process? This article explores these questions by analyzing how the African Union (AU) has responded to contemporary transnational challenges. After providing an overview of the Copenhagen School&#39;s concept of securitization, the article discusses whether the known problems and limitations of securitization theory prevent this approach from being applied to regional arrangements. Arguing that they do not do so per se, the article then provides an overview of transnational challenges on the AU&#39;s agenda and explores the extent to which the organization has &quot; securitized &quot; them. It concludes that the AU has collectively securitized only a limited number of transnational challenges, particularly terrorism and HIV/AIDS, and that significant problems remain when attempting to apply the Copenhagen School&#39;s framework to regional arrangements.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34900761" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7676257c7f86c19224f3ab28ae0bd4d4" rel="nofollow" data-download="{&quot;attachment_id&quot;:54761460,&quot;asset_id&quot;:34900761,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54761460/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="885140" href="https://gwu.academia.edu/PaulWilliams">Paul D Williams</a><script data-card-contents-for-user="885140" type="text/json">{"id":885140,"first_name":"Paul","last_name":"Williams","domain_name":"gwu","page_name":"PaulWilliams","display_name":"Paul D Williams","profile_url":"https://gwu.academia.edu/PaulWilliams?f_ri=1660","photo":"https://0.academia-photos.com/885140/322207/33401822/s65_paul.williams.png"}</script></span></span></li><li class="js-paper-rank-work_34900761 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34900761"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34900761, container: ".js-paper-rank-work_34900761", }); });</script></li><li class="js-percentile-work_34900761 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34900761; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34900761"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34900761 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34900761"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34900761; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34900761]").text(description); $(".js-view-count-work_34900761").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34900761").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34900761"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="379" rel="nofollow" href="https://www.academia.edu/Documents/in/African_Studies">African Studies</a>,&nbsp;<script data-card-contents-for-ri="379" type="text/json">{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4814" rel="nofollow" href="https://www.academia.edu/Documents/in/HIV_AIDS">HIV/AIDS</a>,&nbsp;<script data-card-contents-for-ri="4814" type="text/json">{"id":4814,"name":"HIV/AIDS","url":"https://www.academia.edu/Documents/in/HIV_AIDS?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6831" rel="nofollow" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a><script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34900761]'), work: {"id":34900761,"title":"Regional Arrangements and Transnational Security Challenges: The African Union and the Limits of Securitization Theory","created_at":"2017-10-19T11:04:51.256-07:00","url":"https://www.academia.edu/34900761/Regional_Arrangements_and_Transnational_Security_Challenges_The_African_Union_and_the_Limits_of_Securitization_Theory?f_ri=1660","dom_id":"work_34900761","summary":"How do regional arrangements construct and respond to threat agendas, and to what extent can the existing literature on securitization theory help us understand this process? This article explores these questions by analyzing how the African Union (AU) has responded to contemporary transnational challenges. After providing an overview of the Copenhagen School's concept of securitization, the article discusses whether the known problems and limitations of securitization theory prevent this approach from being applied to regional arrangements. Arguing that they do not do so per se, the article then provides an overview of transnational challenges on the AU's agenda and explores the extent to which the organization has \" securitized \" them. It concludes that the AU has collectively securitized only a limited number of transnational challenges, particularly terrorism and HIV/AIDS, and that significant problems remain when attempting to apply the Copenhagen School's framework to regional arrangements.","downloadable_attachments":[{"id":54761460,"asset_id":34900761,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":885140,"first_name":"Paul","last_name":"Williams","domain_name":"gwu","page_name":"PaulWilliams","display_name":"Paul D Williams","profile_url":"https://gwu.academia.edu/PaulWilliams?f_ri=1660","photo":"https://0.academia-photos.com/885140/322207/33401822/s65_paul.williams.png"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":4814,"name":"HIV/AIDS","url":"https://www.academia.edu/Documents/in/HIV_AIDS?f_ri=1660","nofollow":true},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization?f_ri=1660","nofollow":true},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization?f_ri=1660"},{"id":49396,"name":"African Union","url":"https://www.academia.edu/Documents/in/African_Union?f_ri=1660"},{"id":114957,"name":"The African Union Peace and Security Architecture","url":"https://www.academia.edu/Documents/in/The_African_Union_Peace_and_Security_Architecture?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_75738388" data-work_id="75738388" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/75738388/Far_Right_Terrorism_as_a_Threat_to_the_Security_of_the_United_States">Far-Right Terrorism as a Threat to the Security of the United States</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">White supremacism and anti-government violent groups in the United States has seen a rapid increase in the last five to ten years, with its rhetoric being brought to the front line of American politics. Despite a decrease in actual major... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_75738388" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">White supremacism and anti-government violent groups in the United States has seen a rapid increase in the last five to ten years, with its rhetoric being brought to the front line of American politics. Despite a decrease in actual major attacks in the last two years, far-right clandestine groups with violent aspirations have proliferated since, approximately 2018 with the Pittsburgh synagogue shooting. The most recent administration shift has seen the fight against terrorism with these foundations set as a priority in the long term to avoid further anti-democratic attacks such as the January 2021 raid on the Capitol which could carry more violent consequences. Despite what seems as an un-organized, multi-focused extremist movement uncapable of carrying out terrorist acts per se, the re-interpretation of their violence or threat of its use may have the same effects or lead to larger and deadlier consequences, thus targeting the core groups and armaments with law enforcement efforts could avoid further expenses and losses for a longer term. The present paper will analyze the level of threat that the different groups pose nowadays, or could pose in the future, to American national security, the actions taken in its regard and their possibilities of success and adequacy.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/75738388" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ce2243563c15a5cb2f884bda920fd51b" rel="nofollow" data-download="{&quot;attachment_id&quot;:83389302,&quot;asset_id&quot;:75738388,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/83389302/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="182975247" rel="nofollow" href="https://uc3m.academia.edu/H%C3%A9ctordelPino">Héctor M . del Pino</a><script data-card-contents-for-user="182975247" type="text/json">{"id":182975247,"first_name":"Héctor","last_name":"del Pino","domain_name":"uc3m","page_name":"HéctordelPino","display_name":"Héctor M . del Pino","profile_url":"https://uc3m.academia.edu/H%C3%A9ctordelPino?f_ri=1660","photo":"https://0.academia-photos.com/182975247/71709371/66677411/s65_h_ctor.del_pino.jpg"}</script></span></span></li><li class="js-paper-rank-work_75738388 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="75738388"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 75738388, container: ".js-paper-rank-work_75738388", }); });</script></li><li class="js-percentile-work_75738388 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 75738388; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_75738388"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_75738388 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="75738388"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 75738388; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=75738388]").text(description); $(".js-view-count-work_75738388").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_75738388").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="75738388"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="16537" rel="nofollow" href="https://www.academia.edu/Documents/in/White_Supremacy">White Supremacy</a>,&nbsp;<script data-card-contents-for-ri="16537" type="text/json">{"id":16537,"name":"White Supremacy","url":"https://www.academia.edu/Documents/in/White_Supremacy?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26669" rel="nofollow" href="https://www.academia.edu/Documents/in/Counter_terrorism">Counter terrorism</a>,&nbsp;<script data-card-contents-for-ri="26669" type="text/json">{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="61620" rel="nofollow" href="https://www.academia.edu/Documents/in/National_Security">National Security</a><script data-card-contents-for-ri="61620" type="text/json">{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=75738388]'), work: {"id":75738388,"title":"Far-Right Terrorism as a Threat to the Security of the United States","created_at":"2022-04-07T09:29:16.309-07:00","url":"https://www.academia.edu/75738388/Far_Right_Terrorism_as_a_Threat_to_the_Security_of_the_United_States?f_ri=1660","dom_id":"work_75738388","summary":"White supremacism and anti-government violent groups in the United States has seen a rapid increase in the last five to ten years, with its rhetoric being brought to the front line of American politics. Despite a decrease in actual major attacks in the last two years, far-right clandestine groups with violent aspirations have proliferated since, approximately 2018 with the Pittsburgh synagogue shooting. The most recent administration shift has seen the fight against terrorism with these foundations set as a priority in the long term to avoid further anti-democratic attacks such as the January 2021 raid on the Capitol which could carry more violent consequences. Despite what seems as an un-organized, multi-focused extremist movement uncapable of carrying out terrorist acts per se, the re-interpretation of their violence or threat of its use may have the same effects or lead to larger and deadlier consequences, thus targeting the core groups and armaments with law enforcement efforts could avoid further expenses and losses for a longer term. The present paper will analyze the level of threat that the different groups pose nowadays, or could pose in the future, to American national security, the actions taken in its regard and their possibilities of success and adequacy.","downloadable_attachments":[{"id":83389302,"asset_id":75738388,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":182975247,"first_name":"Héctor","last_name":"del Pino","domain_name":"uc3m","page_name":"HéctordelPino","display_name":"Héctor M . del Pino","profile_url":"https://uc3m.academia.edu/H%C3%A9ctordelPino?f_ri=1660","photo":"https://0.academia-photos.com/182975247/71709371/66677411/s65_h_ctor.del_pino.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":16537,"name":"White Supremacy","url":"https://www.academia.edu/Documents/in/White_Supremacy?f_ri=1660","nofollow":true},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660","nofollow":true},{"id":98134,"name":"United States","url":"https://www.academia.edu/Documents/in/United_States?f_ri=1660"},{"id":920583,"name":"US National Security Policy","url":"https://www.academia.edu/Documents/in/US_National_Security_Policy?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_6170175" data-work_id="6170175" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/6170175/Public_Private_Partnerships_in_the_Fight_against_Terrorism">Public-Private Partnerships in the Fight against Terrorism? </a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">&quot;Based on a case study of the role of private financial institutions in the fight against terrorist financing, this article examines the rationales for, and actual results of, public-private partnerships in counterterrorism. It shows that... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_6170175" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">&quot;Based on a case study of the role of private financial institutions in the fight against terrorist financing, this article examines the rationales for, and actual results of, public-private partnerships in counterterrorism. It shows that there is still a lack of appreciation of the roles that regular private business play, both willingly and <br />unwillingly, in the fight against terrorism. As profit, rather than security, maximizers, private sector actors may decide to take certain security risks rather than addressing them directly, which in contrast is expected from public agencies. As a consequence, <br />public-private partnerships have not been the silver bullet that the representatives of public agencies had hoped for since 9/11. In fact, to many private sector representatives, they are more akin to public-private dictatorships.&quot;</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/6170175" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cc28698376d2033c92a21c09a73dc311" rel="nofollow" data-download="{&quot;attachment_id&quot;:33384073,&quot;asset_id&quot;:6170175,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33384073/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9390806" href="https://seznam.academia.edu/OldrichBures">Oldrich Bures</a><script data-card-contents-for-user="9390806" type="text/json">{"id":9390806,"first_name":"Oldrich","last_name":"Bures","domain_name":"seznam","page_name":"OldrichBures","display_name":"Oldrich Bures","profile_url":"https://seznam.academia.edu/OldrichBures?f_ri=1660","photo":"https://0.academia-photos.com/9390806/2995040/4909632/s65_oldrich.bures.jpg"}</script></span></span></li><li class="js-paper-rank-work_6170175 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="6170175"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 6170175, container: ".js-paper-rank-work_6170175", }); });</script></li><li class="js-percentile-work_6170175 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 6170175; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_6170175"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_6170175 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="6170175"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 6170175; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=6170175]").text(description); $(".js-view-count-work_6170175").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_6170175").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="6170175"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26669" rel="nofollow" href="https://www.academia.edu/Documents/in/Counter_terrorism">Counter terrorism</a>,&nbsp;<script data-card-contents-for-ri="26669" type="text/json">{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="46332" rel="nofollow" href="https://www.academia.edu/Documents/in/Public_Private_Partnerships">Public Private Partnerships</a>,&nbsp;<script data-card-contents-for-ri="46332" type="text/json">{"id":46332,"name":"Public Private Partnerships","url":"https://www.academia.edu/Documents/in/Public_Private_Partnerships?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="184376" rel="nofollow" href="https://www.academia.edu/Documents/in/Public-Private_Partnerships">Public-Private Partnerships</a><script data-card-contents-for-ri="184376" type="text/json">{"id":184376,"name":"Public-Private Partnerships","url":"https://www.academia.edu/Documents/in/Public-Private_Partnerships?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=6170175]'), work: {"id":6170175,"title":"Public-Private Partnerships in the Fight against Terrorism? ","created_at":"2014-02-22T05:56:58.170-08:00","url":"https://www.academia.edu/6170175/Public_Private_Partnerships_in_the_Fight_against_Terrorism?f_ri=1660","dom_id":"work_6170175","summary":"\"Based on a case study of the role of private financial institutions in the fight against terrorist financing, this article examines the rationales for, and actual results of, public-private partnerships in counterterrorism. It shows that there is still a lack of appreciation of the roles that regular private business play, both willingly and\r\nunwillingly, in the fight against terrorism. As profit, rather than security, maximizers, private sector actors may decide to take certain security risks rather than addressing them directly, which in contrast is expected from public agencies. As a consequence,\r\npublic-private partnerships have not been the silver bullet that the representatives of public agencies had hoped for since 9/11. In fact, to many private sector representatives, they are more akin to public-private dictatorships.\"","downloadable_attachments":[{"id":33384073,"asset_id":6170175,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9390806,"first_name":"Oldrich","last_name":"Bures","domain_name":"seznam","page_name":"OldrichBures","display_name":"Oldrich Bures","profile_url":"https://seznam.academia.edu/OldrichBures?f_ri=1660","photo":"https://0.academia-photos.com/9390806/2995040/4909632/s65_oldrich.bures.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660","nofollow":true},{"id":46332,"name":"Public Private Partnerships","url":"https://www.academia.edu/Documents/in/Public_Private_Partnerships?f_ri=1660","nofollow":true},{"id":184376,"name":"Public-Private Partnerships","url":"https://www.academia.edu/Documents/in/Public-Private_Partnerships?f_ri=1660","nofollow":true},{"id":191169,"name":"Anti money laundering and Terrorist Financing","url":"https://www.academia.edu/Documents/in/Anti_money_laundering_and_Terrorist_Financing?f_ri=1660"},{"id":620062,"name":"Aml and Fraud Detection in Bank Transactions","url":"https://www.academia.edu/Documents/in/Aml_and_Fraud_Detection_in_Bank_Transactions?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_76552023" data-work_id="76552023" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/76552023/The_Cultural_Politics_of_WMD_Terrorism_in_Post_Cold_War_America">The Cultural Politics of WMD Terrorism in Post-Cold War America</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper analyzes the prehistory of the War on Terror to explore how the meanings counterterrorists attributed to “terrorism” in the 1990s. A Tom Clancy novel, Rainbow Six, read in the context American cultural shifts in the 1990s... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_76552023" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper analyzes the prehistory of the War on Terror to explore how the meanings counterterrorists attributed to “terrorism” in the 1990s. A Tom Clancy novel, Rainbow Six, read in the context American cultural shifts in the 1990s surrounding capitalism, technology, globalization, and gender, reveal a counterterrorist fantast of mirroring terrorist dissociation from state institutions to engage in extralegal practices. These tactics range from breaking international law to torture, anticipating the War on Terror. The paper concludes with a consideration of the possibility that 9/11 may have slipped into a pre-existing cultural narrative rather than starting a new one.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/76552023" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0877ad4da95ba416ddf80620206add50" rel="nofollow" data-download="{&quot;attachment_id&quot;:84225856,&quot;asset_id&quot;:76552023,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84225856/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="76850628" href="https://northwestern.academia.edu/HaroldWilliford">Harold Williford</a><script data-card-contents-for-user="76850628" type="text/json">{"id":76850628,"first_name":"Harold","last_name":"Williford","domain_name":"northwestern","page_name":"HaroldWilliford","display_name":"Harold Williford","profile_url":"https://northwestern.academia.edu/HaroldWilliford?f_ri=1660","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_76552023 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="76552023"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 76552023, container: ".js-paper-rank-work_76552023", }); });</script></li><li class="js-percentile-work_76552023 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76552023; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_76552023"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_76552023 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="76552023"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76552023; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76552023]").text(description); $(".js-view-count-work_76552023").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_76552023").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="76552023"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2858" rel="nofollow" href="https://www.academia.edu/Documents/in/Popular_Culture">Popular Culture</a>,&nbsp;<script data-card-contents-for-ri="2858" type="text/json">{"id":2858,"name":"Popular Culture","url":"https://www.academia.edu/Documents/in/Popular_Culture?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4506" rel="nofollow" href="https://www.academia.edu/Documents/in/Weapons_of_Mass_Destruction">Weapons of Mass Destruction</a><script data-card-contents-for-ri="4506" type="text/json">{"id":4506,"name":"Weapons of Mass Destruction","url":"https://www.academia.edu/Documents/in/Weapons_of_Mass_Destruction?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=76552023]'), work: {"id":76552023,"title":"The Cultural Politics of WMD Terrorism in Post-Cold War America","created_at":"2022-04-15T13:13:58.693-07:00","url":"https://www.academia.edu/76552023/The_Cultural_Politics_of_WMD_Terrorism_in_Post_Cold_War_America?f_ri=1660","dom_id":"work_76552023","summary":"This paper analyzes the prehistory of the War on Terror to explore how the meanings counterterrorists attributed to “terrorism” in the 1990s. A Tom Clancy novel, Rainbow Six, read in the context American cultural shifts in the 1990s surrounding capitalism, technology, globalization, and gender, reveal a counterterrorist fantast of mirroring terrorist dissociation from state institutions to engage in extralegal practices. These tactics range from breaking international law to torture, anticipating the War on Terror. The paper concludes with a consideration of the possibility that 9/11 may have slipped into a pre-existing cultural narrative rather than starting a new one.","downloadable_attachments":[{"id":84225856,"asset_id":76552023,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":76850628,"first_name":"Harold","last_name":"Williford","domain_name":"northwestern","page_name":"HaroldWilliford","display_name":"Harold Williford","profile_url":"https://northwestern.academia.edu/HaroldWilliford?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2858,"name":"Popular Culture","url":"https://www.academia.edu/Documents/in/Popular_Culture?f_ri=1660","nofollow":true},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660","nofollow":true},{"id":4506,"name":"Weapons of Mass Destruction","url":"https://www.academia.edu/Documents/in/Weapons_of_Mass_Destruction?f_ri=1660","nofollow":true},{"id":5214,"name":"Cold War","url":"https://www.academia.edu/Documents/in/Cold_War?f_ri=1660"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=1660"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660"},{"id":125753,"name":"Contextual Analysis","url":"https://www.academia.edu/Documents/in/Contextual_Analysis?f_ri=1660"},{"id":201273,"name":"Soviet Union","url":"https://www.academia.edu/Documents/in/Soviet_Union?f_ri=1660"},{"id":232684,"name":"Technological Development","url":"https://www.academia.edu/Documents/in/Technological_Development?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11177493" data-work_id="11177493" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11177493/ASEAN_Convention_on_Counter_Terrorism_2007_How_it_benefit_Indonesia_and_Malaysia">ASEAN Convention on Counter Terrorism 2007: How it benefit Indonesia and Malaysia</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Terrorism that occurred in the ASEAN region forced the ASEAN members to strengthen its commitment to peace and security in the region. One of the actions taken by ASEAN members are by made ASEAN Convention on Counter Terrorism, 2007. The... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11177493" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Terrorism that occurred in the ASEAN region forced the ASEAN members to strengthen its commitment to peace and security in the region. One of the actions taken by ASEAN members are by made ASEAN Convention on Counter Terrorism, 2007. The different things of ACCT 2007 are: the concept of recovery, extradition and collective security. Those different things make ACCT 2007 different from another terrorism conventions. Now, only 7 (seven) from 10 (ten) member of ASEAN countries that have adopted this convention. Some things that might be the main reason the country has not ratified the convention yet is because the concept of non intervention and territorial integrity. The objective of this paper is to consider the impact of ratified the ACCT 2007 related to bilateral relationship betwen Indonesia and Malaysia. The methodology of this research is analysis-normative approach to the regulation of ACCT 2007 itself. Main purposes of this study is to encourage countries that have not ratified this convention, such as Malaysia, Laos, and Myanmar to ratified the ASEAN Convention on Counter Terrorism, 2007. ABSTRAK Terorisme yang terjadi di wilayah ASEAN memaksa ASEAN untuk memperkuat komitmen terhadap keamanan dan perdamaian dalam kawasan regional. Salah satu tindakan yang diambil ASEAN adalah dengan dibuatnya ASEAN Convention on Counter Terrorism 2007. Hal yang berbeda dalam ACCT ini adalah terdapat beberapa poin penting yaitu adanya konsep rehabilitasi, em,kstradisi dan collective security yang berbeda dari konvensi sejenisnya. Namun, hanya 7 (tujuh) dari 10 (sepuluh) negara anggota yang telah meratifikasi konvensi ini. Beberapa hal yang mungkin menjadi alasan negara belum meratifikasi ACCT diantaranya adalah konsep non intervensi dan integritas wilayah. Kajian ini melihat dampak dari diratifikasinya ACCT terhadap hubungan bilateral antara Indonesia dan Malaysia. Metode pengkajian yang digunakan adalah secara analisis normatif dengan pendekatan terhadap regulasi ACCT itu sendiri. Tujuan pembuatan kajian ini adalah untuk mendorong negara-negara yang belum meratifikasi konvensi ini seperti Malaysia, Laos, dan Myanmar untuk meratifikasi ASEAN Convention on Counter Terrorism 2007.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11177493" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d65e3f1756a029ace753d9d5e0110865" rel="nofollow" data-download="{&quot;attachment_id&quot;:36812578,&quot;asset_id&quot;:11177493,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36812578/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26991057" href="https://ukm.academia.edu/HMadyasti">Hera Madyasti</a><script data-card-contents-for-user="26991057" type="text/json">{"id":26991057,"first_name":"Hera","last_name":"Madyasti","domain_name":"ukm","page_name":"HMadyasti","display_name":"Hera Madyasti","profile_url":"https://ukm.academia.edu/HMadyasti?f_ri=1660","photo":"https://0.academia-photos.com/26991057/174630575/164659969/s65_hera.madyasti.png"}</script></span></span></li><li class="js-paper-rank-work_11177493 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11177493"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11177493, container: ".js-paper-rank-work_11177493", }); });</script></li><li class="js-percentile-work_11177493 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11177493; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11177493"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11177493 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11177493"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11177493; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11177493]").text(description); $(".js-view-count-work_11177493").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11177493").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11177493"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="38972" rel="nofollow" href="https://www.academia.edu/Documents/in/ASEAN">ASEAN</a>,&nbsp;<script data-card-contents-for-ri="38972" type="text/json">{"id":38972,"name":"ASEAN","url":"https://www.academia.edu/Documents/in/ASEAN?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="91240" rel="nofollow" href="https://www.academia.edu/Documents/in/Benefit">Benefit</a>,&nbsp;<script data-card-contents-for-ri="91240" type="text/json">{"id":91240,"name":"Benefit","url":"https://www.academia.edu/Documents/in/Benefit?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="470939" rel="nofollow" href="https://www.academia.edu/Documents/in/Malaysia-Indonesia_Relations">Malaysia-Indonesia Relations</a><script data-card-contents-for-ri="470939" type="text/json">{"id":470939,"name":"Malaysia-Indonesia Relations","url":"https://www.academia.edu/Documents/in/Malaysia-Indonesia_Relations?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11177493]'), work: {"id":11177493,"title":"ASEAN Convention on Counter Terrorism 2007: How it benefit Indonesia and Malaysia","created_at":"2015-03-01T02:30:23.405-08:00","url":"https://www.academia.edu/11177493/ASEAN_Convention_on_Counter_Terrorism_2007_How_it_benefit_Indonesia_and_Malaysia?f_ri=1660","dom_id":"work_11177493","summary":"Terrorism that occurred in the ASEAN region forced the ASEAN members to strengthen its commitment to peace and security in the region. One of the actions taken by ASEAN members are by made ASEAN Convention on Counter Terrorism, 2007. The different things of ACCT 2007 are: the concept of recovery, extradition and collective security. Those different things make ACCT 2007 different from another terrorism conventions. Now, only 7 (seven) from 10 (ten) member of ASEAN countries that have adopted this convention. Some things that might be the main reason the country has not ratified the convention yet is because the concept of non intervention and territorial integrity. The objective of this paper is to consider the impact of ratified the ACCT 2007 related to bilateral relationship betwen Indonesia and Malaysia. The methodology of this research is analysis-normative approach to the regulation of ACCT 2007 itself. Main purposes of this study is to encourage countries that have not ratified this convention, such as Malaysia, Laos, and Myanmar to ratified the ASEAN Convention on Counter Terrorism, 2007. ABSTRAK Terorisme yang terjadi di wilayah ASEAN memaksa ASEAN untuk memperkuat komitmen terhadap keamanan dan perdamaian dalam kawasan regional. Salah satu tindakan yang diambil ASEAN adalah dengan dibuatnya ASEAN Convention on Counter Terrorism 2007. Hal yang berbeda dalam ACCT ini adalah terdapat beberapa poin penting yaitu adanya konsep rehabilitasi, em,kstradisi dan collective security yang berbeda dari konvensi sejenisnya. Namun, hanya 7 (tujuh) dari 10 (sepuluh) negara anggota yang telah meratifikasi konvensi ini. Beberapa hal yang mungkin menjadi alasan negara belum meratifikasi ACCT diantaranya adalah konsep non intervensi dan integritas wilayah. Kajian ini melihat dampak dari diratifikasinya ACCT terhadap hubungan bilateral antara Indonesia dan Malaysia. Metode pengkajian yang digunakan adalah secara analisis normatif dengan pendekatan terhadap regulasi ACCT itu sendiri. Tujuan pembuatan kajian ini adalah untuk mendorong negara-negara yang belum meratifikasi konvensi ini seperti Malaysia, Laos, dan Myanmar untuk meratifikasi ASEAN Convention on Counter Terrorism 2007.","downloadable_attachments":[{"id":36812578,"asset_id":11177493,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26991057,"first_name":"Hera","last_name":"Madyasti","domain_name":"ukm","page_name":"HMadyasti","display_name":"Hera Madyasti","profile_url":"https://ukm.academia.edu/HMadyasti?f_ri=1660","photo":"https://0.academia-photos.com/26991057/174630575/164659969/s65_hera.madyasti.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":38972,"name":"ASEAN","url":"https://www.academia.edu/Documents/in/ASEAN?f_ri=1660","nofollow":true},{"id":91240,"name":"Benefit","url":"https://www.academia.edu/Documents/in/Benefit?f_ri=1660","nofollow":true},{"id":470939,"name":"Malaysia-Indonesia Relations","url":"https://www.academia.edu/Documents/in/Malaysia-Indonesia_Relations?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39812639" data-work_id="39812639" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39812639/Acting_Ethically_in_the_Shadows">Acting Ethically in the Shadows</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39812639" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such extraordinary measures can be used. First and foremost, intelligence collection, by its very nature, is likely to infringe aspects of the right to privacy that all individuals enjoy under international human rights law. However, there are six accepted grounds in international law under which it may be acceptable to interfere with an individual’s or group’s privacy: National security, public safety, the economic wellbeing of the country, the prevention of disorder or crime, protection of public health or morals, and the protection of the rights and freedoms of others. All but public health and morals fall squarely within an intelligence service’s purview. While there is a growing body of jurisprudence on the use of so-called Special Investigation Techniques by law enforcement and domestic security agencies – for instance, telephone intercepts, eavesdropping devices, surveillance tools, undercover operations and human source recruitment – there is far less jurisprudence that touches upon the collection of foreign intelligence although perhaps some basic principles can be inferred from court rulings, as well as other international bodies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39812639" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="93e4452611def2befd418617383bab69" rel="nofollow" data-download="{&quot;attachment_id&quot;:59997919,&quot;asset_id&quot;:39812639,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59997919/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3648897" href="https://independent.academia.edu/ParkerTom">Tom Parker</a><script data-card-contents-for-user="3648897" type="text/json">{"id":3648897,"first_name":"Tom","last_name":"Parker","domain_name":"independent","page_name":"ParkerTom","display_name":"Tom Parker","profile_url":"https://independent.academia.edu/ParkerTom?f_ri=1660","photo":"https://0.academia-photos.com/3648897/1307247/27464226/s65_tom.parker.jpg"}</script></span></span></li><li class="js-paper-rank-work_39812639 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39812639"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39812639, container: ".js-paper-rank-work_39812639", }); });</script></li><li class="js-percentile-work_39812639 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39812639; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39812639"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39812639 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39812639"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39812639; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39812639]").text(description); $(".js-view-count-work_39812639").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39812639").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39812639"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2592" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>,&nbsp;<script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5321" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Human_Rights_Law">International Human Rights Law</a>,&nbsp;<script data-card-contents-for-ri="5321" type="text/json">{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12628" rel="nofollow" href="https://www.academia.edu/Documents/in/Intelligence_and_Espionage">Intelligence and Espionage</a><script data-card-contents-for-ri="12628" type="text/json">{"id":12628,"name":"Intelligence and Espionage","url":"https://www.academia.edu/Documents/in/Intelligence_and_Espionage?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39812639]'), work: {"id":39812639,"title":"Acting Ethically in the Shadows","created_at":"2019-07-13T02:56:42.065-07:00","url":"https://www.academia.edu/39812639/Acting_Ethically_in_the_Shadows?f_ri=1660","dom_id":"work_39812639","summary":"While recognizing the need for intelligence gathering and acknowledging that gathering such intelligence may require the adoption of extraordinary measures and approaches, international human rights law ascribes limits to how such extraordinary measures can be used. First and foremost, intelligence collection, by its very nature, is likely to infringe aspects of the right to privacy that all individuals enjoy under international human rights law. However, there are six accepted grounds in international law under which it may be acceptable to interfere with an individual’s or group’s privacy: National security, public safety, the economic wellbeing of the country, the prevention of disorder or crime, protection of public health or morals, and the protection of the rights and freedoms of others. All but public health and morals fall squarely within an intelligence service’s purview. While there is a growing body of jurisprudence on the use of so-called Special Investigation Techniques by law enforcement and domestic security agencies – for instance, telephone intercepts, eavesdropping devices, surveillance tools, undercover operations and human source recruitment – there is far less jurisprudence that touches upon the collection of foreign intelligence although perhaps some basic principles can be inferred from court rulings, as well as other international bodies.","downloadable_attachments":[{"id":59997919,"asset_id":39812639,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3648897,"first_name":"Tom","last_name":"Parker","domain_name":"independent","page_name":"ParkerTom","display_name":"Tom Parker","profile_url":"https://independent.academia.edu/ParkerTom?f_ri=1660","photo":"https://0.academia-photos.com/3648897/1307247/27464226/s65_tom.parker.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=1660","nofollow":true},{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=1660","nofollow":true},{"id":12628,"name":"Intelligence and Espionage","url":"https://www.academia.edu/Documents/in/Intelligence_and_Espionage?f_ri=1660","nofollow":true},{"id":13312,"name":"Counterterrorism Law","url":"https://www.academia.edu/Documents/in/Counterterrorism_Law?f_ri=1660"},{"id":20136,"name":"Counterterrorism policing","url":"https://www.academia.edu/Documents/in/Counterterrorism_policing?f_ri=1660"},{"id":21364,"name":"Intelligence Collection","url":"https://www.academia.edu/Documents/in/Intelligence_Collection?f_ri=1660"},{"id":24892,"name":"Surveillance","url":"https://www.academia.edu/Documents/in/Surveillance?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35542453" data-work_id="35542453" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35542453/Bombshells_Women_and_Terror">Bombshells: Women and Terror</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Terrorism is considered the ultimate &#39;&#39;weapon of the weak&#39;&#39;. Groups that could not possibly succeed using conventional tactics on the battlefield employ unconventional means to strike terror behind the battle lines. Increasingly, however,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35542453" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Terrorism is considered the ultimate &#39;&#39;weapon of the weak&#39;&#39;. Groups that could not possibly succeed using conventional tactics on the battlefield employ unconventional means to strike terror behind the battle lines. Increasingly, however, the &#39;&#39;weakest&#39;&#39; members of society, notably women and children, have been drawn into the fray as operatives. Once an occasional occurrence, the use of women is growing at an alarming rate. Using female recruits provides the terrorist organizations with a comparative advantage, particularly the element of surprise. At the same time, this strategy damages the psychological well being and morale of the soldiers opposing them. Soldiers have been trained to protect the civilian population. US Army doctrine specifies that, &#39;&#39;preserving noncombatant lives and dignity is central to mission accomplishment in counterinsurgency&#39;&#39; (Lt. Col. Perez in The embedded morality in FM 3-24 Counterinsurgency, Military Review, 32) The requirement to shoot people that soldiers are ordinarily trained to protect can have deep psychological impact disproportionate to killing adult men. This often results in higher levels of post-traumatic stress disorder (PTSD) and battle fatigue. The upsurge in female suicide bombers has occurred across a variety of nationalistic and secular groups but has also spread to the conservative religious terror networks. This article assesses the growing phenomenon of female terrorists and looks at the different roles that women play in terrorist organizations. It also analyzes the different Portions of this article are taken from an earlier draft of Bombshell: the Many Faces of Women Terrorists. Toronto: Penguin (Viking) mechanisms for women&#39;s mobilization and briefly discusses whether women are coerced or are willing participants in terrorist violence.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35542453" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="77a61e9a7a42422e20a4f20e44f0a41e" rel="nofollow" data-download="{&quot;attachment_id&quot;:55408149,&quot;asset_id&quot;:35542453,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55408149/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="22160247" href="https://gsu.academia.edu/MiaBloom">Mia Bloom</a><script data-card-contents-for-user="22160247" type="text/json">{"id":22160247,"first_name":"Mia","last_name":"Bloom","domain_name":"gsu","page_name":"MiaBloom","display_name":"Mia Bloom","profile_url":"https://gsu.academia.edu/MiaBloom?f_ri=1660","photo":"https://0.academia-photos.com/22160247/6987406/11341326/s65_mia.bloom.jpg"}</script></span></span></li><li class="js-paper-rank-work_35542453 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35542453"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35542453, container: ".js-paper-rank-work_35542453", }); });</script></li><li class="js-percentile-work_35542453 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35542453; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35542453"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35542453 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35542453"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35542453; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35542453]").text(description); $(".js-view-count-work_35542453").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35542453").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35542453"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="41325" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychological_Well_Being">Psychological Well Being</a>,&nbsp;<script data-card-contents-for-ri="41325" type="text/json">{"id":41325,"name":"Psychological Well Being","url":"https://www.academia.edu/Documents/in/Psychological_Well_Being?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="42695" rel="nofollow" href="https://www.academia.edu/Documents/in/Post_traumatic_stress_disorder">Post traumatic stress disorder</a>,&nbsp;<script data-card-contents-for-ri="42695" type="text/json">{"id":42695,"name":"Post traumatic stress disorder","url":"https://www.academia.edu/Documents/in/Post_traumatic_stress_disorder?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="72781" rel="nofollow" href="https://www.academia.edu/Documents/in/Gender_Issues">Gender Issues</a><script data-card-contents-for-ri="72781" type="text/json">{"id":72781,"name":"Gender Issues","url":"https://www.academia.edu/Documents/in/Gender_Issues?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35542453]'), work: {"id":35542453,"title":"Bombshells: Women and Terror","created_at":"2017-12-30T10:23:59.724-08:00","url":"https://www.academia.edu/35542453/Bombshells_Women_and_Terror?f_ri=1660","dom_id":"work_35542453","summary":"Terrorism is considered the ultimate ''weapon of the weak''. Groups that could not possibly succeed using conventional tactics on the battlefield employ unconventional means to strike terror behind the battle lines. Increasingly, however, the ''weakest'' members of society, notably women and children, have been drawn into the fray as operatives. Once an occasional occurrence, the use of women is growing at an alarming rate. Using female recruits provides the terrorist organizations with a comparative advantage, particularly the element of surprise. At the same time, this strategy damages the psychological well being and morale of the soldiers opposing them. Soldiers have been trained to protect the civilian population. US Army doctrine specifies that, ''preserving noncombatant lives and dignity is central to mission accomplishment in counterinsurgency'' (Lt. Col. Perez in The embedded morality in FM 3-24 Counterinsurgency, Military Review, 32) The requirement to shoot people that soldiers are ordinarily trained to protect can have deep psychological impact disproportionate to killing adult men. This often results in higher levels of post-traumatic stress disorder (PTSD) and battle fatigue. The upsurge in female suicide bombers has occurred across a variety of nationalistic and secular groups but has also spread to the conservative religious terror networks. This article assesses the growing phenomenon of female terrorists and looks at the different roles that women play in terrorist organizations. It also analyzes the different Portions of this article are taken from an earlier draft of Bombshell: the Many Faces of Women Terrorists. Toronto: Penguin (Viking) mechanisms for women's mobilization and briefly discusses whether women are coerced or are willing participants in terrorist violence.","downloadable_attachments":[{"id":55408149,"asset_id":35542453,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":22160247,"first_name":"Mia","last_name":"Bloom","domain_name":"gsu","page_name":"MiaBloom","display_name":"Mia Bloom","profile_url":"https://gsu.academia.edu/MiaBloom?f_ri=1660","photo":"https://0.academia-photos.com/22160247/6987406/11341326/s65_mia.bloom.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":41325,"name":"Psychological Well Being","url":"https://www.academia.edu/Documents/in/Psychological_Well_Being?f_ri=1660","nofollow":true},{"id":42695,"name":"Post traumatic stress disorder","url":"https://www.academia.edu/Documents/in/Post_traumatic_stress_disorder?f_ri=1660","nofollow":true},{"id":72781,"name":"Gender Issues","url":"https://www.academia.edu/Documents/in/Gender_Issues?f_ri=1660","nofollow":true},{"id":159450,"name":"Comparative Advantage","url":"https://www.academia.edu/Documents/in/Comparative_Advantage?f_ri=1660"},{"id":218315,"name":"Mobilization","url":"https://www.academia.edu/Documents/in/Mobilization?f_ri=1660"},{"id":591874,"name":"Terrorist","url":"https://www.academia.edu/Documents/in/Terrorist?f_ri=1660"},{"id":1731323,"name":"COL","url":"https://www.academia.edu/Documents/in/COL-2000?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14831006 coauthored" data-work_id="14831006" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14831006/Precaution_Against_Terrorism_Journal_of_Risk_Research">Precaution Against Terrorism - Journal of Risk Research</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Co-authored with Jonathan B. Wiener</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14831006" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cddf42250fc5a7af7c755961d4a4b92f" rel="nofollow" data-download="{&quot;attachment_id&quot;:38437585,&quot;asset_id&quot;:14831006,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38437585/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4929805" href="https://independent.academia.edu/SternJessica">Jessica Stern</a><script data-card-contents-for-user="4929805" type="text/json">{"id":4929805,"first_name":"Jessica","last_name":"Stern","domain_name":"independent","page_name":"SternJessica","display_name":"Jessica Stern","profile_url":"https://independent.academia.edu/SternJessica?f_ri=1660","photo":"https://0.academia-photos.com/4929805/9948808/11093822/s65_jessica.stern.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-14831006">+1</span><div class="hidden js-additional-users-14831006"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/JJonathanBWiener">J. Jonathan B. Wiener</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-14831006'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-14831006').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_14831006 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14831006"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14831006, container: ".js-paper-rank-work_14831006", }); });</script></li><li class="js-percentile-work_14831006 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14831006; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14831006"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14831006 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14831006"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14831006; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14831006]").text(description); $(".js-view-count-work_14831006").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14831006").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14831006"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12061" rel="nofollow" href="https://www.academia.edu/Documents/in/Risk_Management">Risk Management</a>,&nbsp;<script data-card-contents-for-ri="12061" type="text/json">{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="761870" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism">Terrorism and Counterterrorism</a><script data-card-contents-for-ri="761870" type="text/json">{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14831006]'), work: {"id":14831006,"title":"Precaution Against Terrorism - Journal of Risk Research","created_at":"2015-08-10T12:19:56.698-07:00","url":"https://www.academia.edu/14831006/Precaution_Against_Terrorism_Journal_of_Risk_Research?f_ri=1660","dom_id":"work_14831006","summary":"Co-authored with Jonathan B. Wiener","downloadable_attachments":[{"id":38437585,"asset_id":14831006,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4929805,"first_name":"Jessica","last_name":"Stern","domain_name":"independent","page_name":"SternJessica","display_name":"Jessica Stern","profile_url":"https://independent.academia.edu/SternJessica?f_ri=1660","photo":"https://0.academia-photos.com/4929805/9948808/11093822/s65_jessica.stern.jpg"},{"id":33934877,"first_name":"J. Jonathan B.","last_name":"Wiener","domain_name":"independent","page_name":"JJonathanBWiener","display_name":"J. Jonathan B. Wiener","profile_url":"https://independent.academia.edu/JJonathanBWiener?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=1660","nofollow":true},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5708303" data-work_id="5708303" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5708303/The_Internet_and_Terrorist_Radicalisation_The_Psychological_Dimension">The Internet &amp; Terrorist Radicalisation: The Psychological Dimension.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_5708303" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns which do not match fully with the reality of how terrorists are currently interested in the internet or on what activities such individuals and groups are actually engaged in. Instead, the main concern has been on what terrorists might do, especially with regard to information warfare. Such a heavy focus on possibilities is misguided and overlooks the substantial manner in which the internet is already being exploited by various extremists. Rather, much more serious issues are raised by the way in which terrorist organisations are currently and demonstrably using the internet to recruit new members, generate international support, raise and launder funds, and to share information and knowledge with similar groups</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5708303" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="62e55ab3589a225b9364459212e39519" rel="nofollow" data-download="{&quot;attachment_id&quot;:32987571,&quot;asset_id&quot;:5708303,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32987571/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7413156" href="https://royalholloway.academia.edu/AndrewSilke">Andrew Silke</a><script data-card-contents-for-user="7413156" type="text/json">{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1660","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}</script></span></span></li><li class="js-paper-rank-work_5708303 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5708303"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5708303, container: ".js-paper-rank-work_5708303", }); });</script></li><li class="js-percentile-work_5708303 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5708303; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5708303"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5708303 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5708303"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5708303; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5708303]").text(description); $(".js-view-count-work_5708303").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5708303").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5708303"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1580" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9450" rel="nofollow" href="https://www.academia.edu/Documents/in/Radicalization">Radicalization</a>,&nbsp;<script data-card-contents-for-ri="9450" type="text/json">{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11336" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a><script data-card-contents-for-ri="11336" type="text/json">{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5708303]'), work: {"id":5708303,"title":"The Internet \u0026 Terrorist Radicalisation: The Psychological Dimension.","created_at":"2014-01-13T21:33:22.720-08:00","url":"https://www.academia.edu/5708303/The_Internet_and_Terrorist_Radicalisation_The_Psychological_Dimension?f_ri=1660","dom_id":"work_5708303","summary":"Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns which do not match fully with the reality of how terrorists are currently interested in the internet or on what activities such individuals and groups are actually engaged in. Instead, the main concern has been on what terrorists might do, especially with regard to information warfare. Such a heavy focus on possibilities is misguided and overlooks the substantial manner in which the internet is already being exploited by various extremists. Rather, much more serious issues are raised by the way in which terrorist organisations are currently and demonstrably using the internet to recruit new members, generate international support, raise and launder funds, and to share information and knowledge with similar groups","downloadable_attachments":[{"id":32987571,"asset_id":5708303,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1660","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1660","nofollow":true},{"id":22342,"name":"Terrorism and Psychology","url":"https://www.academia.edu/Documents/in/Terrorism_and_Psychology?f_ri=1660"},{"id":55397,"name":"Internet psychology","url":"https://www.academia.edu/Documents/in/Internet_psychology?f_ri=1660"},{"id":57986,"name":"Radicalisation","url":"https://www.academia.edu/Documents/in/Radicalisation?f_ri=1660"},{"id":209746,"name":"Online Violent and Non-Violent Radicalisation","url":"https://www.academia.edu/Documents/in/Online_Violent_and_Non-Violent_Radicalisation?f_ri=1660"},{"id":561713,"name":"Terrorist Radicalization","url":"https://www.academia.edu/Documents/in/Terrorist_Radicalization?f_ri=1660"},{"id":645628,"name":"Psychology of Terrorism","url":"https://www.academia.edu/Documents/in/Psychology_of_Terrorism?f_ri=1660"},{"id":965590,"name":"Mindset of a Terrorist","url":"https://www.academia.edu/Documents/in/Mindset_of_a_Terrorist?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_74495575" data-work_id="74495575" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/74495575/Applying_rhetorical_design_analysis_on_hate_speech_memes">Applying rhetorical design analysis on hate-speech memes</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Internet-Bestellungen von TANGRAM und anderen Publikationen der EKR: Pour commander TANGRAM et d&#39;autres publications de la CFR par Internet : Per ordinare TANGRAM e altre pubblicazioni della CFR on-line: <a href="http://www.ekr.admin.ch" rel="nofollow">www.ekr.admin.ch</a> © EKR/CFR... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_74495575" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Internet-Bestellungen von TANGRAM und anderen Publikationen der EKR: Pour commander TANGRAM et d&#39;autres publications de la CFR par Internet : Per ordinare TANGRAM e altre pubblicazioni della CFR on-line: <a href="http://www.ekr.admin.ch" rel="nofollow">www.ekr.admin.ch</a> © EKR/CFR Nachdruck von Beiträgen mit Quellenangabe erwünscht; Belegexemplar an die EKR. Reproduction autorisée avec mention de la source ; copie à la CFR. Riproduzione autorizzata con menzione della fonte; copia alla CFR.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/74495575" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="127f45785c848c25d27699408d467710" rel="nofollow" data-download="{&quot;attachment_id&quot;:82627539,&quot;asset_id&quot;:74495575,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82627539/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="17687083" href="https://independent.academia.edu/MariaMahdessian">Maria Mahdessian</a><script data-card-contents-for-user="17687083" type="text/json">{"id":17687083,"first_name":"Maria","last_name":"Mahdessian","domain_name":"independent","page_name":"MariaMahdessian","display_name":"Maria Mahdessian","profile_url":"https://independent.academia.edu/MariaMahdessian?f_ri=1660","photo":"https://0.academia-photos.com/17687083/77743960/66285571/s65_maria.mahdessian.jpg"}</script></span></span></li><li class="js-paper-rank-work_74495575 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="74495575"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 74495575, container: ".js-paper-rank-work_74495575", }); });</script></li><li class="js-percentile-work_74495575 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 74495575; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_74495575"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_74495575 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="74495575"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 74495575; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=74495575]").text(description); $(".js-view-count-work_74495575").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_74495575").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="74495575"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9086" rel="nofollow" href="https://www.academia.edu/Documents/in/Hate_Speech">Hate Speech</a>,&nbsp;<script data-card-contents-for-ri="9086" type="text/json">{"id":9086,"name":"Hate Speech","url":"https://www.academia.edu/Documents/in/Hate_Speech?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11467" rel="nofollow" href="https://www.academia.edu/Documents/in/Visual_Communication">Visual Communication</a>,&nbsp;<script data-card-contents-for-ri="11467" type="text/json">{"id":11467,"name":"Visual Communication","url":"https://www.academia.edu/Documents/in/Visual_Communication?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="15758" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_memes">Internet memes</a><script data-card-contents-for-ri="15758" type="text/json">{"id":15758,"name":"Internet memes","url":"https://www.academia.edu/Documents/in/Internet_memes?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=74495575]'), work: {"id":74495575,"title":"Applying rhetorical design analysis on hate-speech memes","created_at":"2022-03-24T15:37:31.927-07:00","url":"https://www.academia.edu/74495575/Applying_rhetorical_design_analysis_on_hate_speech_memes?f_ri=1660","dom_id":"work_74495575","summary":"Internet-Bestellungen von TANGRAM und anderen Publikationen der EKR: Pour commander TANGRAM et d'autres publications de la CFR par Internet : Per ordinare TANGRAM e altre pubblicazioni della CFR on-line: www.ekr.admin.ch © EKR/CFR Nachdruck von Beiträgen mit Quellenangabe erwünscht; Belegexemplar an die EKR. Reproduction autorisée avec mention de la source ; copie à la CFR. Riproduzione autorizzata con menzione della fonte; copia alla CFR.","downloadable_attachments":[{"id":82627539,"asset_id":74495575,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":17687083,"first_name":"Maria","last_name":"Mahdessian","domain_name":"independent","page_name":"MariaMahdessian","display_name":"Maria Mahdessian","profile_url":"https://independent.academia.edu/MariaMahdessian?f_ri=1660","photo":"https://0.academia-photos.com/17687083/77743960/66285571/s65_maria.mahdessian.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":9086,"name":"Hate Speech","url":"https://www.academia.edu/Documents/in/Hate_Speech?f_ri=1660","nofollow":true},{"id":11467,"name":"Visual Communication","url":"https://www.academia.edu/Documents/in/Visual_Communication?f_ri=1660","nofollow":true},{"id":15758,"name":"Internet memes","url":"https://www.academia.edu/Documents/in/Internet_memes?f_ri=1660","nofollow":true},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":89524,"name":"Right-Wing Extremism","url":"https://www.academia.edu/Documents/in/Right-Wing_Extremism?f_ri=1660"},{"id":97603,"name":"Visual Communication Design","url":"https://www.academia.edu/Documents/in/Visual_Communication_Design?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_16337907 coauthored" data-work_id="16337907" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/16337907/The_Role_of_Religion_in_Conflict_and_Peacebuilding">The Role of Religion in Conflict and Peacebuilding</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The British Academy&#39;s latest international policy report explores how the role of religion in conflict and peacebuilding has all too often been depicted in binary terms, which have obscured the complexity of the subject. The report... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_16337907" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The British Academy&#39;s latest international policy report explores how the role of religion in conflict and peacebuilding has all too often been depicted in binary terms, which have obscured the complexity of the subject.<br /><br />The report argues that religion is never a static or isolated entity but should rather be understood as a fluid system of variables, contingent upon a large number of contextual and historical factors. By observing how religion operates and interacts with other aspects of the human experience at the global, institutional, group and individual levels, this report aims to gain a more nuanced understanding of its role (or potential role) in both conflict and peacebuilding</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/16337907" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="548cb91e5800968e77ac3de29111e5f1" rel="nofollow" data-download="{&quot;attachment_id&quot;:38949492,&quot;asset_id&quot;:16337907,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38949492/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="35541865" href="https://independent.academia.edu/JamesMayall">James Mayall</a><script data-card-contents-for-user="35541865" type="text/json">{"id":35541865,"first_name":"James","last_name":"Mayall","domain_name":"independent","page_name":"JamesMayall","display_name":"James Mayall","profile_url":"https://independent.academia.edu/JamesMayall?f_ri=1660","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-16337907">+1</span><div class="hidden js-additional-users-16337907"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://city.academia.edu/SaraSilvestri">Sara Silvestri</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-16337907'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-16337907').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_16337907 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="16337907"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 16337907, container: ".js-paper-rank-work_16337907", }); });</script></li><li class="js-percentile-work_16337907 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16337907; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_16337907"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_16337907 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="16337907"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16337907; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16337907]").text(description); $(".js-view-count-work_16337907").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_16337907").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="16337907"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">24</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="109" rel="nofollow" href="https://www.academia.edu/Documents/in/Christianity">Christianity</a>,&nbsp;<script data-card-contents-for-ri="109" type="text/json">{"id":109,"name":"Christianity","url":"https://www.academia.edu/Documents/in/Christianity?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="201" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>,&nbsp;<script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="217" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology_of_Religion">Sociology of Religion</a>,&nbsp;<script data-card-contents-for-ri="217" type="text/json">{"id":217,"name":"Sociology of Religion","url":"https://www.academia.edu/Documents/in/Sociology_of_Religion?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="383" rel="nofollow" href="https://www.academia.edu/Documents/in/European_Studies">European Studies</a><script data-card-contents-for-ri="383" type="text/json">{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=16337907]'), work: {"id":16337907,"title":"The Role of Religion in Conflict and Peacebuilding","created_at":"2015-09-30T16:06:13.649-07:00","url":"https://www.academia.edu/16337907/The_Role_of_Religion_in_Conflict_and_Peacebuilding?f_ri=1660","dom_id":"work_16337907","summary":"The British Academy's latest international policy report explores how the role of religion in conflict and peacebuilding has all too often been depicted in binary terms, which have obscured the complexity of the subject.\n\nThe report argues that religion is never a static or isolated entity but should rather be understood as a fluid system of variables, contingent upon a large number of contextual and historical factors. By observing how religion operates and interacts with other aspects of the human experience at the global, institutional, group and individual levels, this report aims to gain a more nuanced understanding of its role (or potential role) in both conflict and peacebuilding","downloadable_attachments":[{"id":38949492,"asset_id":16337907,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":35541865,"first_name":"James","last_name":"Mayall","domain_name":"independent","page_name":"JamesMayall","display_name":"James Mayall","profile_url":"https://independent.academia.edu/JamesMayall?f_ri=1660","photo":"/images/s65_no_pic.png"},{"id":886395,"first_name":"Sara","last_name":"Silvestri","domain_name":"city","page_name":"SaraSilvestri","display_name":"Sara Silvestri","profile_url":"https://city.academia.edu/SaraSilvestri?f_ri=1660","photo":"https://0.academia-photos.com/886395/322944/1809188/s65_sara.silvestri.jpg"}],"research_interests":[{"id":109,"name":"Christianity","url":"https://www.academia.edu/Documents/in/Christianity?f_ri=1660","nofollow":true},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true},{"id":217,"name":"Sociology of Religion","url":"https://www.academia.edu/Documents/in/Sociology_of_Religion?f_ri=1660","nofollow":true},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=1660","nofollow":true},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660"},{"id":1302,"name":"Theology","url":"https://www.academia.edu/Documents/in/Theology?f_ri=1660"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":3059,"name":"Religion and Politics","url":"https://www.academia.edu/Documents/in/Religion_and_Politics?f_ri=1660"},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":6184,"name":"Israel/Palestine","url":"https://www.academia.edu/Documents/in/Israel_Palestine?f_ri=1660"},{"id":11150,"name":"Islamic Studies","url":"https://www.academia.edu/Documents/in/Islamic_Studies?f_ri=1660"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution?f_ri=1660"},{"id":14430,"name":"Religion, Conflict and Peacebuilding","url":"https://www.academia.edu/Documents/in/Religion_Conflict_and_Peacebuilding?f_ri=1660"},{"id":15866,"name":"Islam","url":"https://www.academia.edu/Documents/in/Islam?f_ri=1660"},{"id":21750,"name":"Martyrdom","url":"https://www.academia.edu/Documents/in/Martyrdom?f_ri=1660"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=1660"},{"id":26445,"name":"Judaism","url":"https://www.academia.edu/Documents/in/Judaism?f_ri=1660"},{"id":38097,"name":"Interfaith Dialogue","url":"https://www.academia.edu/Documents/in/Interfaith_Dialogue?f_ri=1660"},{"id":52869,"name":"Mali","url":"https://www.academia.edu/Documents/in/Mali?f_ri=1660"},{"id":89536,"name":"Western Balkans","url":"https://www.academia.edu/Documents/in/Western_Balkans?f_ri=1660"},{"id":115341,"name":"Peacemaking and Interfaith Dialogue","url":"https://www.academia.edu/Documents/in/Peacemaking_and_Interfaith_Dialogue?f_ri=1660"},{"id":279460,"name":"Hamas","url":"https://www.academia.edu/Documents/in/Hamas?f_ri=1660"},{"id":609104,"name":"Peace and Conflicts Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflicts_Studies?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_74938559" data-work_id="74938559" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/74938559/Policies_and_Security_Strategies_of_G5_Sahel_States_Against_Terrorism">Policies and Security Strategies of G5 Sahel States Against Terrorism</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The issue of terrorism and insecurity in the African Sahel region is considered one of the most important global problems. This region is classified as one of the most vulnerable areas due to economic challenges, ethnic conflicts,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_74938559" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The issue of terrorism and insecurity in the African Sahel region is considered one of the most important global problems. This region is classified as one of the most vulnerable areas due to economic challenges, ethnic conflicts, political instability, lack of development, and the spread of criminal acts by terrorist organizations. The proliferation of weapons and criminal activities and the increase in illegal immigration have led to insecurity and instability in the African Sahel region, which prompted the African Sahel countries to rebuild security and political strategies in line with security developments and changes in the Sahel region. Accordingly, this research&#39;s main focus is to investigate the effectiveness of policy and security strategies pursued by G5 Sahel states (G5s) and to find whether these policies and strategies were implemented successfully or if modifications are necessary. For this purpose, the Anti-terrorism approach is used to analyze the policies and strategies adopted by the G5s Sahel countries in the process of combating terrorism, in addition to the internal and external variables that affect those policies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/74938559" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="eb3f2769383f807170f2c91fd8af8323" rel="nofollow" data-download="{&quot;attachment_id&quot;:82910547,&quot;asset_id&quot;:74938559,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82910547/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="205463767" href="https://independent.academia.edu/MoudassirOumar">Moudassir Oumar</a><script data-card-contents-for-user="205463767" type="text/json">{"id":205463767,"first_name":"Moudassir","last_name":"Oumar","domain_name":"independent","page_name":"MoudassirOumar","display_name":"Moudassir Oumar","profile_url":"https://independent.academia.edu/MoudassirOumar?f_ri=1660","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_74938559 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="74938559"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 74938559, container: ".js-paper-rank-work_74938559", }); });</script></li><li class="js-percentile-work_74938559 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 74938559; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_74938559"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_74938559 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="74938559"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 74938559; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=74938559]").text(description); $(".js-view-count-work_74938559").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_74938559").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="74938559"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3896" rel="nofollow" href="https://www.academia.edu/Documents/in/African_History">African History</a>,&nbsp;<script data-card-contents-for-ri="3896" type="text/json">{"id":3896,"name":"African History","url":"https://www.academia.edu/Documents/in/African_History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="61620" rel="nofollow" href="https://www.academia.edu/Documents/in/National_Security">National Security</a>,&nbsp;<script data-card-contents-for-ri="61620" type="text/json">{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="125639" rel="nofollow" href="https://www.academia.edu/Documents/in/Terorism">Terorism</a><script data-card-contents-for-ri="125639" type="text/json">{"id":125639,"name":"Terorism","url":"https://www.academia.edu/Documents/in/Terorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=74938559]'), work: {"id":74938559,"title":"Policies and Security Strategies of G5 Sahel States Against Terrorism","created_at":"2022-03-29T23:13:14.594-07:00","url":"https://www.academia.edu/74938559/Policies_and_Security_Strategies_of_G5_Sahel_States_Against_Terrorism?f_ri=1660","dom_id":"work_74938559","summary":"The issue of terrorism and insecurity in the African Sahel region is considered one of the most important global problems. This region is classified as one of the most vulnerable areas due to economic challenges, ethnic conflicts, political instability, lack of development, and the spread of criminal acts by terrorist organizations. The proliferation of weapons and criminal activities and the increase in illegal immigration have led to insecurity and instability in the African Sahel region, which prompted the African Sahel countries to rebuild security and political strategies in line with security developments and changes in the Sahel region. Accordingly, this research's main focus is to investigate the effectiveness of policy and security strategies pursued by G5 Sahel states (G5s) and to find whether these policies and strategies were implemented successfully or if modifications are necessary. For this purpose, the Anti-terrorism approach is used to analyze the policies and strategies adopted by the G5s Sahel countries in the process of combating terrorism, in addition to the internal and external variables that affect those policies.","downloadable_attachments":[{"id":82910547,"asset_id":74938559,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":205463767,"first_name":"Moudassir","last_name":"Oumar","domain_name":"independent","page_name":"MoudassirOumar","display_name":"Moudassir Oumar","profile_url":"https://independent.academia.edu/MoudassirOumar?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":3896,"name":"African History","url":"https://www.academia.edu/Documents/in/African_History?f_ri=1660","nofollow":true},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660","nofollow":true},{"id":125639,"name":"Terorism","url":"https://www.academia.edu/Documents/in/Terorism?f_ri=1660","nofollow":true},{"id":1247657,"name":"Sahel Region","url":"https://www.academia.edu/Documents/in/Sahel_Region?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_81443416" data-work_id="81443416" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/81443416/Gandhara_Journal_of_Research_in_Social_Science">Gandhara Journal of Research in Social Science</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/81443416" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="805fb810e0752257c6785efe56200865" rel="nofollow" data-download="{&quot;attachment_id&quot;:87484808,&quot;asset_id&quot;:81443416,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/87484808/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3757992" href="https://hu-pk.academia.edu/AdilSeemab">Adil Seemab</a><script data-card-contents-for-user="3757992" type="text/json">{"id":3757992,"first_name":"Adil","last_name":"Seemab","domain_name":"hu-pk","page_name":"AdilSeemab","display_name":"Adil Seemab","profile_url":"https://hu-pk.academia.edu/AdilSeemab?f_ri=1660","photo":"https://0.academia-photos.com/3757992/1355789/1674109/s65_adil.seemab.jpg"}</script></span></span></li><li class="js-paper-rank-work_81443416 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="81443416"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 81443416, container: ".js-paper-rank-work_81443416", }); });</script></li><li class="js-percentile-work_81443416 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 81443416; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_81443416"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_81443416 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="81443416"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 81443416; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=81443416]").text(description); $(".js-view-count-work_81443416").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_81443416").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="81443416"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="885" rel="nofollow" href="https://www.academia.edu/Documents/in/English_Literature">English Literature</a>,&nbsp;<script data-card-contents-for-ri="885" type="text/json">{"id":885,"name":"English Literature","url":"https://www.academia.edu/Documents/in/English_Literature?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1200" rel="nofollow" href="https://www.academia.edu/Documents/in/Languages_and_Linguistics">Languages and Linguistics</a>,&nbsp;<script data-card-contents-for-ri="1200" type="text/json">{"id":1200,"name":"Languages and Linguistics","url":"https://www.academia.edu/Documents/in/Languages_and_Linguistics?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6285" rel="nofollow" href="https://www.academia.edu/Documents/in/Federalism">Federalism</a><script data-card-contents-for-ri="6285" type="text/json">{"id":6285,"name":"Federalism","url":"https://www.academia.edu/Documents/in/Federalism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=81443416]'), work: {"id":81443416,"title":"Gandhara Journal of Research in Social Science","created_at":"2022-06-14T00:10:12.660-07:00","url":"https://www.academia.edu/81443416/Gandhara_Journal_of_Research_in_Social_Science?f_ri=1660","dom_id":"work_81443416","summary":null,"downloadable_attachments":[{"id":87484808,"asset_id":81443416,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3757992,"first_name":"Adil","last_name":"Seemab","domain_name":"hu-pk","page_name":"AdilSeemab","display_name":"Adil Seemab","profile_url":"https://hu-pk.academia.edu/AdilSeemab?f_ri=1660","photo":"https://0.academia-photos.com/3757992/1355789/1674109/s65_adil.seemab.jpg"}],"research_interests":[{"id":885,"name":"English Literature","url":"https://www.academia.edu/Documents/in/English_Literature?f_ri=1660","nofollow":true},{"id":1200,"name":"Languages and Linguistics","url":"https://www.academia.edu/Documents/in/Languages_and_Linguistics?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":6285,"name":"Federalism","url":"https://www.academia.edu/Documents/in/Federalism?f_ri=1660","nofollow":true},{"id":7361,"name":"Pakistan","url":"https://www.academia.edu/Documents/in/Pakistan?f_ri=1660"},{"id":70144,"name":"Democracy and democratization","url":"https://www.academia.edu/Documents/in/Democracy_and_democratization?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36187636" data-work_id="36187636" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36187636/Review_of_Unconventional_Warfare_in_South_Asia_Shadow_Warriors_and_Counterinsurgency_by_Scott_Gates_and_Kaushik_Roy">Review of &quot;Unconventional Warfare in South Asia: Shadow Warriors and Counterinsurgency&quot; by Scott Gates and Kaushik Roy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This work is a beguiling prospect for anyone who has been involved in South Asia or has an interest in the region. The idea of analysing so many distinct insurgencies and counter-insurgency (COIN) campaigns within the covers of a single... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36187636" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This work is a beguiling prospect for anyone who has been involved in South Asia or has an interest in the region. The idea of analysing so many distinct insurgencies and counter-insurgency (COIN) campaigns within the covers of a single book is both ambitious and tantalising. Unfortunately, and in spite of occasional good moments, this book provides few of the answers. It has a clunky structure, is peppered with editorial and factual errors and unsupported statements. The British General Templer in Malaya argued that COIN should only be 25% shooting. The remainder should be winning &quot;hearts and minds&quot;. Sadly this has all too rarely been the case in South Asia where many of the COIN campaigns have been heavy-handed and brutal. Partly this is a function of capability; effective COIN needs excellent intelligence and highly trained and equipped Special Forces. Yet it is interesting to reflect that two &quot;successful&quot; COIN operations of recent years; the Indian defeat of the Khalistan movement and President Rajapaksa&#39;s suppression of the Tamil Tigers owed little to Templer or the proponents of minimum force</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36187636" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d5ab4b2fe8247b6f25813dbc37467146" rel="nofollow" data-download="{&quot;attachment_id&quot;:56087996,&quot;asset_id&quot;:36187636,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56087996/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3248717" href="https://kcl.academia.edu/TimWilsey">Tim Willasey-Wilsey</a><script data-card-contents-for-user="3248717" type="text/json">{"id":3248717,"first_name":"Tim","last_name":"Willasey-Wilsey","domain_name":"kcl","page_name":"TimWilsey","display_name":"Tim Willasey-Wilsey","profile_url":"https://kcl.academia.edu/TimWilsey?f_ri=1660","photo":"https://0.academia-photos.com/3248717/35046565/30554121/s65_tim.willasey-wilsey.jpg"}</script></span></span></li><li class="js-paper-rank-work_36187636 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36187636"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36187636, container: ".js-paper-rank-work_36187636", }); });</script></li><li class="js-percentile-work_36187636 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36187636; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36187636"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36187636 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36187636"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36187636; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36187636]").text(description); $(".js-view-count-work_36187636").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36187636").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36187636"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">19</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1031" rel="nofollow" href="https://www.academia.edu/Documents/in/Southeast_Asian_Studies">Southeast Asian Studies</a>,&nbsp;<script data-card-contents-for-ri="1031" type="text/json">{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1720" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1720" type="text/json">{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3558" rel="nofollow" href="https://www.academia.edu/Documents/in/South_Asian_Studies">South Asian Studies</a><script data-card-contents-for-ri="3558" type="text/json">{"id":3558,"name":"South Asian Studies","url":"https://www.academia.edu/Documents/in/South_Asian_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36187636]'), work: {"id":36187636,"title":"Review of \"Unconventional Warfare in South Asia: Shadow Warriors and Counterinsurgency\" by Scott Gates and Kaushik Roy","created_at":"2018-03-17T15:19:51.608-07:00","url":"https://www.academia.edu/36187636/Review_of_Unconventional_Warfare_in_South_Asia_Shadow_Warriors_and_Counterinsurgency_by_Scott_Gates_and_Kaushik_Roy?f_ri=1660","dom_id":"work_36187636","summary":"This work is a beguiling prospect for anyone who has been involved in South Asia or has an interest in the region. The idea of analysing so many distinct insurgencies and counter-insurgency (COIN) campaigns within the covers of a single book is both ambitious and tantalising. Unfortunately, and in spite of occasional good moments, this book provides few of the answers. It has a clunky structure, is peppered with editorial and factual errors and unsupported statements. The British General Templer in Malaya argued that COIN should only be 25% shooting. The remainder should be winning \"hearts and minds\". Sadly this has all too rarely been the case in South Asia where many of the COIN campaigns have been heavy-handed and brutal. Partly this is a function of capability; effective COIN needs excellent intelligence and highly trained and equipped Special Forces. Yet it is interesting to reflect that two \"successful\" COIN operations of recent years; the Indian defeat of the Khalistan movement and President Rajapaksa's suppression of the Tamil Tigers owed little to Templer or the proponents of minimum force","downloadable_attachments":[{"id":56087996,"asset_id":36187636,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3248717,"first_name":"Tim","last_name":"Willasey-Wilsey","domain_name":"kcl","page_name":"TimWilsey","display_name":"Tim Willasey-Wilsey","profile_url":"https://kcl.academia.edu/TimWilsey?f_ri=1660","photo":"https://0.academia-photos.com/3248717/35046565/30554121/s65_tim.willasey-wilsey.jpg"}],"research_interests":[{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true},{"id":3558,"name":"South Asian Studies","url":"https://www.academia.edu/Documents/in/South_Asian_Studies?f_ri=1660","nofollow":true},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=1660"},{"id":5471,"name":"South Asia","url":"https://www.academia.edu/Documents/in/South_Asia?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":6746,"name":"Southeast Asia","url":"https://www.academia.edu/Documents/in/Southeast_Asia?f_ri=1660"},{"id":7361,"name":"Pakistan","url":"https://www.academia.edu/Documents/in/Pakistan?f_ri=1660"},{"id":9451,"name":"Insurgency/Counterinsurgency(COIN)","url":"https://www.academia.edu/Documents/in/Insurgency_Counterinsurgency_COIN_?f_ri=1660"},{"id":9850,"name":"Sri Lanka","url":"https://www.academia.edu/Documents/in/Sri_Lanka?f_ri=1660"},{"id":13099,"name":"Islam in the Southeast Asia","url":"https://www.academia.edu/Documents/in/Islam_in_the_Southeast_Asia?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=1660"},{"id":42356,"name":"Counterinsurgency","url":"https://www.academia.edu/Documents/in/Counterinsurgency?f_ri=1660"},{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=1660"},{"id":45146,"name":"Insurgency","url":"https://www.academia.edu/Documents/in/Insurgency?f_ri=1660"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660"},{"id":1223682,"name":"Insurgency and counterinsurgency","url":"https://www.academia.edu/Documents/in/Insurgency_and_counterinsurgency?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11958275" data-work_id="11958275" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/11958275/Violence_and_Resistance_Beyond_P%C3%B3lemos_Foucault_and_Derrida_Between_Power_and_Unpower">Violence and Resistance Beyond Pólemos: Foucault and Derrida Between Power and Unpower</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11958275" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976 lectures (“Society Must Be Defended”), this work-hypothesis theorises “basic warfare” [la guerre fondamentale] as the teleological horizon of socio-political relations. Following Boulainvilliers, Foucault champions this polemological approach, conceived as a purely descriptive discourse on “real” politics and war, against the philosophico-juridical conceptuality attached to liberal society (Hobbes’s Leviathan being here the prime example). <br />However, in doing so, Foucault did not interrogate the conceptual validity of notions such as power and war, therefore interlinking them without questioning their ontological status. This problematic conflation was partly rectified in 1982, as Foucault proposed a more dynamic definition of power relations: “actions over potential actions”. <br />I argue, somewhat polemically, that Foucault’s hermeneutics of power still involves a teleological violence, dependent on a polemological representation of human relations as essentially instrumental: this resembles what Derrida names, in “Heidegger’s Ear”, an “anthropolemology”. However, I show that all conceptualisation of power implies its self-deconstruction. This self-deconstructive (or autoimmune) structure supposes an archi-originary unpower prior to power: power presupposes an excess within power, an excessive force, another violence making it both possible and impossible. There is something within power located “beyond the power principle” (Derrida). This (self-)excess signifies a limitless resistantiality co-extensive with power-relationality. It also allows the reversal of pólemos into its opposite, as unpower opens politics and warfare to the messianic call of a pre-political, pre-ontological disruption: the archi-originary force of différance. This force, unconditional, challenges Foucault’s conceptualisations of power, suggesting an originary performativity located before or beyond hermeneutics of power-knowledge, disrupting theoreticity as well as empiricity by pointing to their ontological complicity.<br />The bulk of this essay is dedicated to sketching the theoretical implications of this deconstructive reading of Foucault with respect to the methodology and conceptuality of political science and social theory.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11958275" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ce64d0d78e86b1117b38c4460361520e" rel="nofollow" data-download="{&quot;attachment_id&quot;:63286010,&quot;asset_id&quot;:11958275,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63286010/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2357791" rel="nofollow" href="https://uai.academia.edu/T_C_Mercier">Thomas Clément MERCIER</a><script data-card-contents-for-user="2357791" type="text/json">{"id":2357791,"first_name":"Thomas Clément","last_name":"MERCIER","domain_name":"uai","page_name":"T_C_Mercier","display_name":"Thomas Clément MERCIER","profile_url":"https://uai.academia.edu/T_C_Mercier?f_ri=1660","photo":"https://0.academia-photos.com/2357791/743316/55133078/s65_thomas_cl_ment.mercier.jpg"}</script></span></span></li><li class="js-paper-rank-work_11958275 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11958275"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11958275, container: ".js-paper-rank-work_11958275", }); });</script></li><li class="js-percentile-work_11958275 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11958275; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11958275"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11958275 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11958275"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11958275; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11958275]").text(description); $(".js-view-count-work_11958275").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11958275").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11958275"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">257</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="8" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Theory">Critical Theory</a>,&nbsp;<script data-card-contents-for-ri="8" type="text/json">{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="94" rel="nofollow" href="https://www.academia.edu/Documents/in/Discourse_Analysis">Discourse Analysis</a>,&nbsp;<script data-card-contents-for-ri="94" type="text/json">{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>,&nbsp;<script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="188" rel="nofollow" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a><script data-card-contents-for-ri="188" type="text/json">{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11958275]'), work: {"id":11958275,"title":"Violence and Resistance Beyond Pólemos: Foucault and Derrida Between Power and Unpower","created_at":"2015-04-15T07:32:39.552-07:00","url":"https://www.academia.edu/11958275/Violence_and_Resistance_Beyond_P%C3%B3lemos_Foucault_and_Derrida_Between_Power_and_Unpower?f_ri=1660","dom_id":"work_11958275","summary":"“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976 lectures (“Society Must Be Defended”), this work-hypothesis theorises “basic warfare” [la guerre fondamentale] as the teleological horizon of socio-political relations. Following Boulainvilliers, Foucault champions this polemological approach, conceived as a purely descriptive discourse on “real” politics and war, against the philosophico-juridical conceptuality attached to liberal society (Hobbes’s Leviathan being here the prime example). \nHowever, in doing so, Foucault did not interrogate the conceptual validity of notions such as power and war, therefore interlinking them without questioning their ontological status. This problematic conflation was partly rectified in 1982, as Foucault proposed a more dynamic definition of power relations: “actions over potential actions”. \nI argue, somewhat polemically, that Foucault’s hermeneutics of power still involves a teleological violence, dependent on a polemological representation of human relations as essentially instrumental: this resembles what Derrida names, in “Heidegger’s Ear”, an “anthropolemology”. However, I show that all conceptualisation of power implies its self-deconstruction. This self-deconstructive (or autoimmune) structure supposes an archi-originary unpower prior to power: power presupposes an excess within power, an excessive force, another violence making it both possible and impossible. There is something within power located “beyond the power principle” (Derrida). This (self-)excess signifies a limitless resistantiality co-extensive with power-relationality. It also allows the reversal of pólemos into its opposite, as unpower opens politics and warfare to the messianic call of a pre-political, pre-ontological disruption: the archi-originary force of différance. This force, unconditional, challenges Foucault’s conceptualisations of power, suggesting an originary performativity located before or beyond hermeneutics of power-knowledge, disrupting theoreticity as well as empiricity by pointing to their ontological complicity.\nThe bulk of this essay is dedicated to sketching the theoretical implications of this deconstructive reading of Foucault with respect to the methodology and conceptuality of political science and social theory.","downloadable_attachments":[{"id":63286010,"asset_id":11958275,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2357791,"first_name":"Thomas Clément","last_name":"MERCIER","domain_name":"uai","page_name":"T_C_Mercier","display_name":"Thomas Clément MERCIER","profile_url":"https://uai.academia.edu/T_C_Mercier?f_ri=1660","photo":"https://0.academia-photos.com/2357791/743316/55133078/s65_thomas_cl_ment.mercier.jpg"}],"research_interests":[{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=1660","nofollow":true},{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=1660","nofollow":true},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=1660","nofollow":true},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=1660","nofollow":true},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660"},{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=1660"},{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=1660"},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=1660"},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=1660"},{"id":699,"name":"Queer Studies","url":"https://www.academia.edu/Documents/in/Queer_Studies?f_ri=1660"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=1660"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=1660"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=1660"},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=1660"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=1660"},{"id":893,"name":"Pragmatism","url":"https://www.academia.edu/Documents/in/Pragmatism?f_ri=1660"},{"id":899,"name":"Legitimacy and Authority","url":"https://www.academia.edu/Documents/in/Legitimacy_and_Authority?f_ri=1660"},{"id":938,"name":"Critical Discourse Studies","url":"https://www.academia.edu/Documents/in/Critical_Discourse_Studies?f_ri=1660"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=1660"},{"id":972,"name":"Self and Identity","url":"https://www.academia.edu/Documents/in/Self_and_Identity?f_ri=1660"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=1660"},{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=1660"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1660"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=1660"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=1660"},{"id":1698,"name":"Marxism","url":"https://www.academia.edu/Documents/in/Marxism?f_ri=1660"},{"id":2089,"name":"Social Identity","url":"https://www.academia.edu/Documents/in/Social_Identity?f_ri=1660"},{"id":2238,"name":"Pragmatics","url":"https://www.academia.edu/Documents/in/Pragmatics?f_ri=1660"},{"id":2337,"name":"Performance Studies","url":"https://www.academia.edu/Documents/in/Performance_Studies?f_ri=1660"},{"id":2729,"name":"Hospitality Studies","url":"https://www.academia.edu/Documents/in/Hospitality_Studies?f_ri=1660"},{"id":2860,"name":"Postcolonial Studies","url":"https://www.academia.edu/Documents/in/Postcolonial_Studies?f_ri=1660"},{"id":2993,"name":"Sociology of Knowledge","url":"https://www.academia.edu/Documents/in/Sociology_of_Knowledge?f_ri=1660"},{"id":3064,"name":"Heterotopia","url":"https://www.academia.edu/Documents/in/Heterotopia?f_ri=1660"},{"id":3114,"name":"Queer Theory","url":"https://www.academia.edu/Documents/in/Queer_Theory?f_ri=1660"},{"id":3115,"name":"Posthumanism","url":"https://www.academia.edu/Documents/in/Posthumanism?f_ri=1660"},{"id":3200,"name":"Praxis","url":"https://www.academia.edu/Documents/in/Praxis?f_ri=1660"},{"id":3231,"name":"Governmentality","url":"https://www.academia.edu/Documents/in/Governmentality?f_ri=1660"},{"id":3233,"name":"Animal Studies","url":"https://www.academia.edu/Documents/in/Animal_Studies?f_ri=1660"},{"id":3234,"name":"Animal Ethics","url":"https://www.academia.edu/Documents/in/Animal_Ethics?f_ri=1660"},{"id":3353,"name":"Subjectivities","url":"https://www.academia.edu/Documents/in/Subjectivities?f_ri=1660"},{"id":3354,"name":"Poststructuralism","url":"https://www.academia.edu/Documents/in/Poststructuralism?f_ri=1660"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=1660"},{"id":3661,"name":"Sovereignty","url":"https://www.academia.edu/Documents/in/Sovereignty?f_ri=1660"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=1660"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=1660"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=1660"},{"id":3876,"name":"Hobbes","url":"https://www.academia.edu/Documents/in/Hobbes?f_ri=1660"},{"id":4195,"name":"Cultural Theory","url":"https://www.academia.edu/Documents/in/Cultural_Theory?f_ri=1660"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=1660"},{"id":4401,"name":"Jean-Luc Nancy","url":"https://www.academia.edu/Documents/in/Jean-Luc_Nancy?f_ri=1660"},{"id":4433,"name":"Self-Determination Theory","url":"https://www.academia.edu/Documents/in/Self-Determination_Theory?f_ri=1660"},{"id":4474,"name":"Critical Thinking","url":"https://www.academia.edu/Documents/in/Critical_Thinking?f_ri=1660"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660"},{"id":4823,"name":"Critical Legal Theory","url":"https://www.academia.edu/Documents/in/Critical_Legal_Theory?f_ri=1660"},{"id":4868,"name":"Deconstruction","url":"https://www.academia.edu/Documents/in/Deconstruction?f_ri=1660"},{"id":4917,"name":"Gender and Sexuality","url":"https://www.academia.edu/Documents/in/Gender_and_Sexuality?f_ri=1660"},{"id":5272,"name":"Identity (Culture)","url":"https://www.academia.edu/Documents/in/Identity_Culture_?f_ri=1660"},{"id":5340,"name":"Jurgen Habermas","url":"https://www.academia.edu/Documents/in/Jurgen_Habermas?f_ri=1660"},{"id":5372,"name":"Post-Marxism","url":"https://www.academia.edu/Documents/in/Post-Marxism?f_ri=1660"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=1660"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=1660"},{"id":5539,"name":"Language and Ideology","url":"https://www.academia.edu/Documents/in/Language_and_Ideology?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":5780,"name":"Ideology","url":"https://www.academia.edu/Documents/in/Ideology?f_ri=1660"},{"id":5815,"name":"Identity politics","url":"https://www.academia.edu/Documents/in/Identity_politics?f_ri=1660"},{"id":5960,"name":"Continental Philosophy","url":"https://www.academia.edu/Documents/in/Continental_Philosophy?f_ri=1660"},{"id":6013,"name":"Performativity","url":"https://www.academia.edu/Documents/in/Performativity?f_ri=1660"},{"id":6225,"name":"Civil War","url":"https://www.academia.edu/Documents/in/Civil_War?f_ri=1660"},{"id":6463,"name":"History of Sexuality","url":"https://www.academia.edu/Documents/in/History_of_Sexuality?f_ri=1660"},{"id":6728,"name":"Philosophy Of Law","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Law?f_ri=1660"},{"id":6749,"name":"Cultural Politics","url":"https://www.academia.edu/Documents/in/Cultural_Politics?f_ri=1660"},{"id":7024,"name":"Gender","url":"https://www.academia.edu/Documents/in/Gender?f_ri=1660"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1660"},{"id":7229,"name":"Critical Criminology","url":"https://www.academia.edu/Documents/in/Critical_Criminology?f_ri=1660"},{"id":7982,"name":"Legitimacy","url":"https://www.academia.edu/Documents/in/Legitimacy?f_ri=1660"},{"id":8004,"name":"Resistance (Social)","url":"https://www.academia.edu/Documents/in/Resistance_Social_?f_ri=1660"},{"id":8326,"name":"Political Legitimacy","url":"https://www.academia.edu/Documents/in/Political_Legitimacy?f_ri=1660"},{"id":8411,"name":"Émmanuel Lévinas","url":"https://www.academia.edu/Documents/in/%C3%89mmanuel_L%C3%A9vinas?f_ri=1660"},{"id":8453,"name":"Maurice Blanchot","url":"https://www.academia.edu/Documents/in/Maurice_Blanchot?f_ri=1660"},{"id":8470,"name":"Empowerment","url":"https://www.academia.edu/Documents/in/Empowerment?f_ri=1660"},{"id":9405,"name":"Post-Colonialism","url":"https://www.academia.edu/Documents/in/Post-Colonialism?f_ri=1660"},{"id":9590,"name":"Self Care","url":"https://www.academia.edu/Documents/in/Self_Care?f_ri=1660"},{"id":9650,"name":"Cultural Identity","url":"https://www.academia.edu/Documents/in/Cultural_Identity?f_ri=1660"},{"id":10142,"name":"Gender Theory","url":"https://www.academia.edu/Documents/in/Gender_Theory?f_ri=1660"},{"id":10167,"name":"Hauntology","url":"https://www.academia.edu/Documents/in/Hauntology?f_ri=1660"},{"id":10256,"name":"Violence/Power","url":"https://www.academia.edu/Documents/in/Violence_Power?f_ri=1660"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660"},{"id":10348,"name":"Identity Politics (Political Science)","url":"https://www.academia.edu/Documents/in/Identity_Politics_Political_Science_?f_ri=1660"},{"id":10387,"name":"Subjectivity (Identity Politics)","url":"https://www.academia.edu/Documents/in/Subjectivity_Identity_Politics_?f_ri=1660"},{"id":10444,"name":"Postmodernism","url":"https://www.academia.edu/Documents/in/Postmodernism?f_ri=1660"},{"id":10492,"name":"Thomas Hobbes","url":"https://www.academia.edu/Documents/in/Thomas_Hobbes?f_ri=1660"},{"id":10610,"name":"Survival Analysis","url":"https://www.academia.edu/Documents/in/Survival_Analysis?f_ri=1660"},{"id":10633,"name":"Critical Discourse Analysis","url":"https://www.academia.edu/Documents/in/Critical_Discourse_Analysis?f_ri=1660"},{"id":10806,"name":"Marxist theory","url":"https://www.academia.edu/Documents/in/Marxist_theory?f_ri=1660"},{"id":10853,"name":"Activity Theory","url":"https://www.academia.edu/Documents/in/Activity_Theory?f_ri=1660"},{"id":11563,"name":"Performance and performativity","url":"https://www.academia.edu/Documents/in/Performance_and_performativity?f_ri=1660"},{"id":11848,"name":"Social Ontology","url":"https://www.academia.edu/Documents/in/Social_Ontology?f_ri=1660"},{"id":11927,"name":"Michel Foucault","url":"https://www.academia.edu/Documents/in/Michel_Foucault?f_ri=1660"},{"id":12040,"name":"Jacques Derrida","url":"https://www.academia.edu/Documents/in/Jacques_Derrida?f_ri=1660"},{"id":12320,"name":"Autoimmunity","url":"https://www.academia.edu/Documents/in/Autoimmunity?f_ri=1660"},{"id":12651,"name":"Archive Fever","url":"https://www.academia.edu/Documents/in/Archive_Fever?f_ri=1660"},{"id":12754,"name":"Language Ideology","url":"https://www.academia.edu/Documents/in/Language_Ideology?f_ri=1660"},{"id":12824,"name":"Intersubjectivity","url":"https://www.academia.edu/Documents/in/Intersubjectivity?f_ri=1660"},{"id":13197,"name":"Language and Identity","url":"https://www.academia.edu/Documents/in/Language_and_Identity?f_ri=1660"},{"id":13229,"name":"History Of Madness And Psychiatry","url":"https://www.academia.edu/Documents/in/History_Of_Madness_And_Psychiatry?f_ri=1660"},{"id":13788,"name":"Catherine Malabou","url":"https://www.academia.edu/Documents/in/Catherine_Malabou?f_ri=1660"},{"id":13995,"name":"Postcolonial Theory","url":"https://www.academia.edu/Documents/in/Postcolonial_Theory?f_ri=1660"},{"id":14105,"name":"Levinas","url":"https://www.academia.edu/Documents/in/Levinas?f_ri=1660"},{"id":14197,"name":"Autonomy","url":"https://www.academia.edu/Documents/in/Autonomy?f_ri=1660"},{"id":14256,"name":"Subjectivity In Discourse","url":"https://www.academia.edu/Documents/in/Subjectivity_In_Discourse?f_ri=1660"},{"id":14386,"name":"Agonistic Pluralism","url":"https://www.academia.edu/Documents/in/Agonistic_Pluralism?f_ri=1660"},{"id":15488,"name":"Ernesto Laclau and Chantal Mouffe","url":"https://www.academia.edu/Documents/in/Ernesto_Laclau_and_Chantal_Mouffe?f_ri=1660"},{"id":16323,"name":"Biopolitics","url":"https://www.academia.edu/Documents/in/Biopolitics?f_ri=1660"},{"id":16376,"name":"Cultural Studies (Communication)","url":"https://www.academia.edu/Documents/in/Cultural_Studies_Communication_?f_ri=1660"},{"id":17754,"name":"Derridean Deconstruction","url":"https://www.academia.edu/Documents/in/Derridean_Deconstruction?f_ri=1660"},{"id":18127,"name":"Baruch Spinoza","url":"https://www.academia.edu/Documents/in/Baruch_Spinoza?f_ri=1660"},{"id":18640,"name":"Ideology and Discourse Analysis","url":"https://www.academia.edu/Documents/in/Ideology_and_Discourse_Analysis?f_ri=1660"},{"id":18995,"name":"Critique","url":"https://www.academia.edu/Documents/in/Critique?f_ri=1660"},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=1660"},{"id":19118,"name":"Pragmatism (Philosophy)","url":"https://www.academia.edu/Documents/in/Pragmatism_Philosophy_?f_ri=1660"},{"id":19191,"name":"Knowledge and Power","url":"https://www.academia.edu/Documents/in/Knowledge_and_Power?f_ri=1660"},{"id":19357,"name":"Individuation","url":"https://www.academia.edu/Documents/in/Individuation?f_ri=1660"},{"id":20719,"name":"Interpretation","url":"https://www.academia.edu/Documents/in/Interpretation?f_ri=1660"},{"id":20827,"name":"Politics Of Identities","url":"https://www.academia.edu/Documents/in/Politics_Of_Identities?f_ri=1660"},{"id":22120,"name":"Politics and Friendship","url":"https://www.academia.edu/Documents/in/Politics_and_Friendship?f_ri=1660"},{"id":22292,"name":"Political Ideology","url":"https://www.academia.edu/Documents/in/Political_Ideology?f_ri=1660"},{"id":22547,"name":"Social and Political Philosophy","url":"https://www.academia.edu/Documents/in/Social_and_Political_Philosophy?f_ri=1660"},{"id":22656,"name":"Hospitality","url":"https://www.academia.edu/Documents/in/Hospitality?f_ri=1660"},{"id":23342,"name":"Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Cultural_Anthropology?f_ri=1660"},{"id":24140,"name":"Biopower","url":"https://www.academia.edu/Documents/in/Biopower?f_ri=1660"},{"id":24879,"name":"Hegemony","url":"https://www.academia.edu/Documents/in/Hegemony?f_ri=1660"},{"id":25582,"name":"Social and Political Theories of Justice \u0026 Human Rights","url":"https://www.academia.edu/Documents/in/Social_and_Political_Theories_of_Justice_and_Human_Rights?f_ri=1660"},{"id":25660,"name":"Decision Theory","url":"https://www.academia.edu/Documents/in/Decision_Theory?f_ri=1660"},{"id":26321,"name":"Critical Legal Studies and Empire","url":"https://www.academia.edu/Documents/in/Critical_Legal_Studies_and_Empire?f_ri=1660"},{"id":27269,"name":"Subjectivity Studies","url":"https://www.academia.edu/Documents/in/Subjectivity_Studies?f_ri=1660"},{"id":27573,"name":"Derrida","url":"https://www.academia.edu/Documents/in/Derrida?f_ri=1660"},{"id":27982,"name":"Theories of Sovereignty","url":"https://www.academia.edu/Documents/in/Theories_of_Sovereignty?f_ri=1660"},{"id":29108,"name":"Feminist Literary Theory and Gender Studies","url":"https://www.academia.edu/Documents/in/Feminist_Literary_Theory_and_Gender_Studies?f_ri=1660"},{"id":29110,"name":"Ideology and Discourse Theory","url":"https://www.academia.edu/Documents/in/Ideology_and_Discourse_Theory?f_ri=1660"},{"id":30095,"name":"Cultural power and resistance","url":"https://www.academia.edu/Documents/in/Cultural_power_and_resistance?f_ri=1660"},{"id":30223,"name":"Antagonist politics","url":"https://www.academia.edu/Documents/in/Antagonist_politics?f_ri=1660"},{"id":30361,"name":"Foucault (Research Methodology)","url":"https://www.academia.edu/Documents/in/Foucault_Research_Methodology_?f_ri=1660"},{"id":30965,"name":"Jacques Derrida \u0026 Deconstruction","url":"https://www.academia.edu/Documents/in/Jacques_Derrida_and_Deconstruction?f_ri=1660"},{"id":31103,"name":"Performativity of Gender","url":"https://www.academia.edu/Documents/in/Performativity_of_Gender?f_ri=1660"},{"id":34292,"name":"Poststructuralist Theory","url":"https://www.academia.edu/Documents/in/Poststructuralist_Theory?f_ri=1660"},{"id":34442,"name":"Responsibility","url":"https://www.academia.edu/Documents/in/Responsibility?f_ri=1660"},{"id":36467,"name":"Language Ideologies","url":"https://www.academia.edu/Documents/in/Language_Ideologies?f_ri=1660"},{"id":36979,"name":"Use of Force","url":"https://www.academia.edu/Documents/in/Use_of_Force?f_ri=1660"},{"id":36990,"name":"Event Studies","url":"https://www.academia.edu/Documents/in/Event_Studies?f_ri=1660"},{"id":37647,"name":"Gramsci and Cultural Hegemony","url":"https://www.academia.edu/Documents/in/Gramsci_and_Cultural_Hegemony?f_ri=1660"},{"id":39525,"name":"Discipline","url":"https://www.academia.edu/Documents/in/Discipline?f_ri=1660"},{"id":39824,"name":"International Political Theory","url":"https://www.academia.edu/Documents/in/International_Political_Theory?f_ri=1660"},{"id":41213,"name":"Political Subjectivity","url":"https://www.academia.edu/Documents/in/Political_Subjectivity?f_ri=1660"},{"id":43594,"name":"Jean-François Lyotard","url":"https://www.academia.edu/Documents/in/Jean-Fran%C3%A7ois_Lyotard?f_ri=1660"},{"id":44006,"name":"Identity","url":"https://www.academia.edu/Documents/in/Identity?f_ri=1660"},{"id":44722,"name":"Power and domination","url":"https://www.academia.edu/Documents/in/Power_and_domination?f_ri=1660"},{"id":46271,"name":"Strategy","url":"https://www.academia.edu/Documents/in/Strategy?f_ri=1660"},{"id":48672,"name":"Chantal Mouffe","url":"https://www.academia.edu/Documents/in/Chantal_Mouffe?f_ri=1660"},{"id":49405,"name":"Symbolic violence","url":"https://www.academia.edu/Documents/in/Symbolic_violence?f_ri=1660"},{"id":49425,"name":"Engagement","url":"https://www.academia.edu/Documents/in/Engagement?f_ri=1660"},{"id":49663,"name":"Women and Gender Studies","url":"https://www.academia.edu/Documents/in/Women_and_Gender_Studies?f_ri=1660"},{"id":52096,"name":"Foucault power/knowledge - discourse","url":"https://www.academia.edu/Documents/in/Foucault_power_knowledge_-_discourse?f_ri=1660"},{"id":53039,"name":"Haunting and Spectrality","url":"https://www.academia.edu/Documents/in/Haunting_and_Spectrality?f_ri=1660"},{"id":53390,"name":"Power relations","url":"https://www.academia.edu/Documents/in/Power_relations?f_ri=1660"},{"id":53828,"name":"Polemology","url":"https://www.academia.edu/Documents/in/Polemology?f_ri=1660"},{"id":54236,"name":"Etienne Balibar","url":"https://www.academia.edu/Documents/in/Etienne_Balibar?f_ri=1660"},{"id":54659,"name":"Subjectivity","url":"https://www.academia.edu/Documents/in/Subjectivity?f_ri=1660"},{"id":54941,"name":"Biopolitics (in Agamben, Foucault and Negri)","url":"https://www.academia.edu/Documents/in/Biopolitics_in_Agamben_Foucault_and_Negri_?f_ri=1660"},{"id":55196,"name":"Cultural Reproduction and Social Reproduction. Knowledge, Power and Education","url":"https://www.academia.edu/Documents/in/Cultural_Reproduction_and_Social_Reproduction._Knowledge_Power_and_Education?f_ri=1660"},{"id":55577,"name":"Survival","url":"https://www.academia.edu/Documents/in/Survival?f_ri=1660"},{"id":60235,"name":"Alterity","url":"https://www.academia.edu/Documents/in/Alterity?f_ri=1660"},{"id":60903,"name":"Critical Legal Studies","url":"https://www.academia.edu/Documents/in/Critical_Legal_Studies?f_ri=1660"},{"id":61448,"name":"Power, conflict and violence","url":"https://www.academia.edu/Documents/in/Power_conflict_and_violence?f_ri=1660"},{"id":70724,"name":"Neo-Marxism","url":"https://www.academia.edu/Documents/in/Neo-Marxism?f_ri=1660"},{"id":70962,"name":"Theories of power","url":"https://www.academia.edu/Documents/in/Theories_of_power?f_ri=1660"},{"id":71526,"name":"Soft Power and International Relations","url":"https://www.academia.edu/Documents/in/Soft_Power_and_International_Relations?f_ri=1660"},{"id":77274,"name":"Symbolic Capital","url":"https://www.academia.edu/Documents/in/Symbolic_Capital?f_ri=1660"},{"id":77724,"name":"Philosophy of Praxis","url":"https://www.academia.edu/Documents/in/Philosophy_of_Praxis?f_ri=1660"},{"id":77969,"name":"Identity and Alterity","url":"https://www.academia.edu/Documents/in/Identity_and_Alterity?f_ri=1660"},{"id":91722,"name":"Philosophy of the Subject","url":"https://www.academia.edu/Documents/in/Philosophy_of_the_Subject?f_ri=1660"},{"id":94532,"name":"Immanence","url":"https://www.academia.edu/Documents/in/Immanence?f_ri=1660"},{"id":96098,"name":"Resistance","url":"https://www.academia.edu/Documents/in/Resistance?f_ri=1660"},{"id":98376,"name":"Jürgen Habermas","url":"https://www.academia.edu/Documents/in/J%C3%BCrgen_Habermas?f_ri=1660"},{"id":100218,"name":"Clausewitz","url":"https://www.academia.edu/Documents/in/Clausewitz?f_ri=1660"},{"id":102352,"name":"Heterotopias","url":"https://www.academia.edu/Documents/in/Heterotopias?f_ri=1660"},{"id":107547,"name":"Agonism","url":"https://www.academia.edu/Documents/in/Agonism?f_ri=1660"},{"id":110388,"name":"Biopower and Biopolitics","url":"https://www.academia.edu/Documents/in/Biopower_and_Biopolitics?f_ri=1660"},{"id":111931,"name":"Ethics and Politics of Friendship","url":"https://www.academia.edu/Documents/in/Ethics_and_Politics_of_Friendship?f_ri=1660"},{"id":116541,"name":"Event Study","url":"https://www.academia.edu/Documents/in/Event_Study?f_ri=1660"},{"id":123951,"name":"Political Power","url":"https://www.academia.edu/Documents/in/Political_Power?f_ri=1660"},{"id":135292,"name":"Phenomenology of Violence","url":"https://www.academia.edu/Documents/in/Phenomenology_of_Violence?f_ri=1660"},{"id":137587,"name":"International Relations, Security, Strategic Studies, Politics","url":"https://www.academia.edu/Documents/in/International_Relations_Security_Strategic_Studies_Politics?f_ri=1660"},{"id":142522,"name":"Domestication","url":"https://www.academia.edu/Documents/in/Domestication?f_ri=1660"},{"id":148419,"name":"Sociology of power and knowledge","url":"https://www.academia.edu/Documents/in/Sociology_of_power_and_knowledge?f_ri=1660"},{"id":150067,"name":"Hegemony and Counter-Hegemony","url":"https://www.academia.edu/Documents/in/Hegemony_and_Counter-Hegemony?f_ri=1660"},{"id":151313,"name":"Marxism and Hauntology","url":"https://www.academia.edu/Documents/in/Marxism_and_Hauntology?f_ri=1660"},{"id":151317,"name":"Use of force in international law and international relations","url":"https://www.academia.edu/Documents/in/Use_of_force_in_international_law_and_international_relations?f_ri=1660"},{"id":155212,"name":"Herrschaft","url":"https://www.academia.edu/Documents/in/Herrschaft?f_ri=1660"},{"id":160841,"name":"Ideologia","url":"https://www.academia.edu/Documents/in/Ideologia?f_ri=1660"},{"id":198879,"name":"Post-structuralism (especially the work of Jacques Derrida)","url":"https://www.academia.edu/Documents/in/Post-structuralism_especially_the_work_of_Jacques_Derrida_?f_ri=1660"},{"id":204255,"name":"Posthegemony","url":"https://www.academia.edu/Documents/in/Posthegemony?f_ri=1660"},{"id":220464,"name":"Politics and International relations","url":"https://www.academia.edu/Documents/in/Politics_and_International_relations?f_ri=1660"},{"id":222851,"name":"Biopolítica","url":"https://www.academia.edu/Documents/in/Biopol%C3%ADtica?f_ri=1660"},{"id":228979,"name":"Symbolic Power","url":"https://www.academia.edu/Documents/in/Symbolic_Power?f_ri=1660"},{"id":231588,"name":"Spectrality","url":"https://www.academia.edu/Documents/in/Spectrality?f_ri=1660"},{"id":257285,"name":"Social and political science","url":"https://www.academia.edu/Documents/in/Social_and_political_science?f_ri=1660"},{"id":258502,"name":"Foucault Studies","url":"https://www.academia.edu/Documents/in/Foucault_Studies?f_ri=1660"},{"id":258942,"name":"War and Peace Studies","url":"https://www.academia.edu/Documents/in/War_and_Peace_Studies?f_ri=1660"},{"id":279368,"name":"Carl von Clausewitz","url":"https://www.academia.edu/Documents/in/Carl_von_Clausewitz?f_ri=1660"},{"id":285166,"name":"Alteridad","url":"https://www.academia.edu/Documents/in/Alteridad?f_ri=1660"},{"id":298072,"name":"Ethics of Care of the Self","url":"https://www.academia.edu/Documents/in/Ethics_of_Care_of_the_Self?f_ri=1660"},{"id":339161,"name":"Politics of Identity","url":"https://www.academia.edu/Documents/in/Politics_of_Identity?f_ri=1660"},{"id":347292,"name":"State sovereignty","url":"https://www.academia.edu/Documents/in/State_sovereignty?f_ri=1660"},{"id":358581,"name":"Critical War Studies","url":"https://www.academia.edu/Documents/in/Critical_War_Studies?f_ri=1660"},{"id":366453,"name":"Subjectivation","url":"https://www.academia.edu/Documents/in/Subjectivation?f_ri=1660"},{"id":370144,"name":"Cogito and the History of Madness","url":"https://www.academia.edu/Documents/in/Cogito_and_the_History_of_Madness?f_ri=1660"},{"id":375041,"name":"Antagonism","url":"https://www.academia.edu/Documents/in/Antagonism?f_ri=1660"},{"id":378179,"name":"Institutionalization","url":"https://www.academia.edu/Documents/in/Institutionalization?f_ri=1660"},{"id":382027,"name":"Powerlessness","url":"https://www.academia.edu/Documents/in/Powerlessness?f_ri=1660"},{"id":390915,"name":"Power and Subjectivation","url":"https://www.academia.edu/Documents/in/Power_and_Subjectivation?f_ri=1660"},{"id":392820,"name":"Discipline and Punish","url":"https://www.academia.edu/Documents/in/Discipline_and_Punish?f_ri=1660"},{"id":421462,"name":"Altérité","url":"https://www.academia.edu/Documents/in/Alt%C3%A9rit%C3%A9?f_ri=1660"},{"id":444538,"name":"Linguistic violence","url":"https://www.academia.edu/Documents/in/Linguistic_violence?f_ri=1660"},{"id":488034,"name":"Critical Anthropology","url":"https://www.academia.edu/Documents/in/Critical_Anthropology?f_ri=1660"},{"id":513795,"name":"Michel Foucault and the theory of Power","url":"https://www.academia.edu/Documents/in/Michel_Foucault_and_the_theory_of_Power?f_ri=1660"},{"id":530276,"name":"Rogues","url":"https://www.academia.edu/Documents/in/Rogues?f_ri=1660"},{"id":566353,"name":"Infrapolitics","url":"https://www.academia.edu/Documents/in/Infrapolitics?f_ri=1660"},{"id":606197,"name":"Logocentrism","url":"https://www.academia.edu/Documents/in/Logocentrism?f_ri=1660"},{"id":623625,"name":"Subjectification and Intersubjectification","url":"https://www.academia.edu/Documents/in/Subjectification_and_Intersubjectification?f_ri=1660"},{"id":642869,"name":"Critical Military Studies","url":"https://www.academia.edu/Documents/in/Critical_Military_Studies?f_ri=1660"},{"id":661751,"name":"Agonistic Democracy","url":"https://www.academia.edu/Documents/in/Agonistic_Democracy?f_ri=1660"},{"id":672885,"name":"Specters of Marx","url":"https://www.academia.edu/Documents/in/Specters_of_Marx?f_ri=1660"},{"id":719990,"name":"Archive Studies","url":"https://www.academia.edu/Documents/in/Archive_Studies?f_ri=1660"},{"id":785274,"name":"Care Theory","url":"https://www.academia.edu/Documents/in/Care_Theory?f_ri=1660"},{"id":874579,"name":"Politics of Friendship","url":"https://www.academia.edu/Documents/in/Politics_of_Friendship?f_ri=1660"},{"id":882032,"name":"Legitimidad","url":"https://www.academia.edu/Documents/in/Legitimidad?f_ri=1660"},{"id":951126,"name":"Ethnicity and Identity Politics","url":"https://www.academia.edu/Documents/in/Ethnicity_and_Identity_Politics?f_ri=1660"},{"id":952730,"name":"Pouvoir Politique","url":"https://www.academia.edu/Documents/in/Pouvoir_Politique?f_ri=1660"},{"id":958273,"name":"Emmanuel Levinas","url":"https://www.academia.edu/Documents/in/Emmanuel_Levinas?f_ri=1660"},{"id":964146,"name":"Political Praxis","url":"https://www.academia.edu/Documents/in/Political_Praxis?f_ri=1660"},{"id":966833,"name":"Gewalt","url":"https://www.academia.edu/Documents/in/Gewalt?f_ri=1660"},{"id":968103,"name":"Archive Theory","url":"https://www.academia.edu/Documents/in/Archive_Theory?f_ri=1660"},{"id":972605,"name":"Power; Subjection","url":"https://www.academia.edu/Documents/in/Power_Subjection?f_ri=1660"},{"id":973140,"name":"Power and Knowledge","url":"https://www.academia.edu/Documents/in/Power_and_Knowledge?f_ri=1660"},{"id":982866,"name":"Agonistic and Tragic Modes of Political Theory","url":"https://www.academia.edu/Documents/in/Agonistic_and_Tragic_Modes_of_Political_Theory?f_ri=1660"},{"id":1005863,"name":"Linguistic Power","url":"https://www.academia.edu/Documents/in/Linguistic_Power?f_ri=1660"},{"id":1124349,"name":"Event Theory","url":"https://www.academia.edu/Documents/in/Event_Theory?f_ri=1660"},{"id":1166760,"name":"Ipseity","url":"https://www.academia.edu/Documents/in/Ipseity?f_ri=1660"},{"id":1198960,"name":"Foucault","url":"https://www.academia.edu/Documents/in/Foucault?f_ri=1660"},{"id":1230868,"name":"Phallocentricism","url":"https://www.academia.edu/Documents/in/Phallocentricism?f_ri=1660"},{"id":1249719,"name":"Emmanuel Lévinas","url":"https://www.academia.edu/Documents/in/Emmanuel_L%C3%A9vinas?f_ri=1660"},{"id":1297772,"name":"Spectralité","url":"https://www.academia.edu/Documents/in/Spectralite?f_ri=1660"},{"id":1477285,"name":"Michel Foucault: The subject and power","url":"https://www.academia.edu/Documents/in/Michel_Foucault_The_subject_and_power?f_ri=1660"},{"id":1675888,"name":"Violence and Power","url":"https://www.academia.edu/Documents/in/Violence_and_Power?f_ri=1660"},{"id":1745337,"name":"Derrida Hauntology","url":"https://www.academia.edu/Documents/in/Derrida_Hauntology?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_31660435 coauthored" data-work_id="31660435" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/31660435/The_Tenth_Men_rule_in_Reality_the_final_version_2023_EN_and_DE_">The Tenth Men (rule) in Reality- the final version (2023 / EN &amp; DE)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Many people worldwide ask if &quot;The Tenth Man Rule&quot; introduced in the Hollywood Blockbuster &quot;World War Z&quot; is only fiction or basing on facts. This research answers it. The 2023 update is presumably the last one. It has an enhanced... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_31660435" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Many people worldwide ask if &quot;The Tenth Man Rule&quot; introduced in the Hollywood Blockbuster &quot;World War Z&quot; is only fiction or basing on facts. <br /> <br />This research answers it. <br /> <br />The 2023 update is presumably the last one. It has an enhanced structure and better visability regarding the primary language - in this case English. <br /> <br />From its content, there was only a slightly upgrade: we included an &quot;about us&quot; section and brought some reference to the RAND Corporation.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/31660435" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="24e4ba1676526d6efcc38c6eb7cebdf0" rel="nofollow" data-download="{&quot;attachment_id&quot;:99599016,&quot;asset_id&quot;:31660435,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/99599016/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="22471126" href="https://greifswald.academia.edu/WalterLeonhardt">Walter Leonhardt</a><script data-card-contents-for-user="22471126" type="text/json">{"id":22471126,"first_name":"Walter","last_name":"Leonhardt","domain_name":"greifswald","page_name":"WalterLeonhardt","display_name":"Walter Leonhardt","profile_url":"https://greifswald.academia.edu/WalterLeonhardt?f_ri=1660","photo":"https://0.academia-photos.com/22471126/9987481/41718422/s65_walter.leonhardt.jpeg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-31660435">+1</span><div class="hidden js-additional-users-31660435"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://greifswald.academia.edu/BorAnkhbaatar">Bor Ankhbaatar</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-31660435'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-31660435').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_31660435 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="31660435"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 31660435, container: ".js-paper-rank-work_31660435", }); });</script></li><li class="js-percentile-work_31660435 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 31660435; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_31660435"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_31660435 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="31660435"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 31660435; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=31660435]").text(description); $(".js-view-count-work_31660435").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_31660435").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="31660435"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>,&nbsp;<script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="535" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Law-1">Criminal Law</a>,&nbsp;<script data-card-contents-for-ri="535" type="text/json">{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="821" rel="nofollow" href="https://www.academia.edu/Documents/in/Philosophy_of_Science">Philosophy of Science</a>,&nbsp;<script data-card-contents-for-ri="821" type="text/json">{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a><script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=31660435]'), work: {"id":31660435,"title":"The Tenth Men (rule) in Reality- the final version (2023 / EN \u0026 DE)","created_at":"2017-03-01T04:47:27.342-08:00","url":"https://www.academia.edu/31660435/The_Tenth_Men_rule_in_Reality_the_final_version_2023_EN_and_DE_?f_ri=1660","dom_id":"work_31660435","summary":"Many people worldwide ask if \"The Tenth Man Rule\" introduced in the Hollywood Blockbuster \"World War Z\" is only fiction or basing on facts.\r\n\r\nThis research answers it.\r\n\r\nThe 2023 update is presumably the last one. It has an enhanced structure and better visability regarding the primary language - in this case English.\r\n\r\nFrom its content, there was only a slightly upgrade: we included an \"about us\" section and brought some reference to the RAND Corporation.","downloadable_attachments":[{"id":99599016,"asset_id":31660435,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":22471126,"first_name":"Walter","last_name":"Leonhardt","domain_name":"greifswald","page_name":"WalterLeonhardt","display_name":"Walter Leonhardt","profile_url":"https://greifswald.academia.edu/WalterLeonhardt?f_ri=1660","photo":"https://0.academia-photos.com/22471126/9987481/41718422/s65_walter.leonhardt.jpeg"},{"id":44671116,"first_name":"Bor","last_name":"Ankhbaatar","domain_name":"greifswald","page_name":"BorAnkhbaatar","display_name":"Bor Ankhbaatar","profile_url":"https://greifswald.academia.edu/BorAnkhbaatar?f_ri=1660","photo":"https://0.academia-photos.com/44671116/15529602/20364436/s65_bor.ankhbaatar.jpg"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1660","nofollow":true},{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true},{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":5815,"name":"Identity politics","url":"https://www.academia.edu/Documents/in/Identity_politics?f_ri=1660"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660"},{"id":16097,"name":"Decision Making Under Uncertainty","url":"https://www.academia.edu/Documents/in/Decision_Making_Under_Uncertainty?f_ri=1660"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=1660"},{"id":47990,"name":"Communication sciences","url":"https://www.academia.edu/Documents/in/Communication_sciences?f_ri=1660"},{"id":78651,"name":"Communication Science","url":"https://www.academia.edu/Documents/in/Communication_Science?f_ri=1660"},{"id":316988,"name":"Economic Sanctions","url":"https://www.academia.edu/Documents/in/Economic_Sanctions?f_ri=1660"},{"id":2060243,"name":"Dien Bien Phu","url":"https://www.academia.edu/Documents/in/Dien_Bien_Phu?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35455625" data-work_id="35455625" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35455625/Radical_Beliefs_and_Violent_Behaviour_in_De_radicalisation_Scientific_insights_for_policy">Radical Beliefs and Violent Behaviour in &#39;De-radicalisation&#39; Scientific insights for policy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This chapter aims to show how radical beliefs and violent action relate to each other. It summarises the current landscape of academic research that has, in different ways, attempted to identify the causes of terrorist action. In showing... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35455625" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This chapter aims to show how radical beliefs and violent action relate to each<br />other. It summarises the current landscape of academic research that has, in different<br />ways, attempted to identify the causes of terrorist action. In showing the current<br />trends, areas of consensus and areas of dispute, the chapter aims to show the<br />complex relationship between drivers based on ideas, ideologies and beliefs and<br />drivers based on other factors. Terrorists, like normal people, are influenced on a<br />number of different levels and in ways that they do not always realise or acknowledge<br />themselves. Whether through social ties, the power of counter-culture, or the<br />desire to seek thrills, status or recognition, the story of why people undertake political<br />violence is more complex and subtle than simply a question of belief.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35455625" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="bf537dd0001c1c251e78d09e70342fe3" rel="nofollow" data-download="{&quot;attachment_id&quot;:55317431,&quot;asset_id&quot;:35455625,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55317431/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="652585" href="https://demos.academia.edu/CarlMiller">Carl Miller</a><script data-card-contents-for-user="652585" type="text/json">{"id":652585,"first_name":"Carl","last_name":"Miller","domain_name":"demos","page_name":"CarlMiller","display_name":"Carl Miller","profile_url":"https://demos.academia.edu/CarlMiller?f_ri=1660","photo":"https://0.academia-photos.com/652585/2077295/2444199/s65_carl.miller.jpg"}</script></span></span></li><li class="js-paper-rank-work_35455625 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35455625"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35455625, container: ".js-paper-rank-work_35455625", }); });</script></li><li class="js-percentile-work_35455625 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35455625; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35455625"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35455625 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35455625"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35455625; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35455625]").text(description); $(".js-view-count-work_35455625").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35455625").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35455625"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1759" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a>,&nbsp;<script data-card-contents-for-ri="1759" type="text/json">{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5847" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism">Political Extremism/Radicalism/Populism</a><script data-card-contents-for-ri="5847" type="text/json">{"id":5847,"name":"Political Extremism/Radicalism/Populism","url":"https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35455625]'), work: {"id":35455625,"title":"Radical Beliefs and Violent Behaviour in 'De-radicalisation' Scientific insights for policy","created_at":"2017-12-18T03:34:10.288-08:00","url":"https://www.academia.edu/35455625/Radical_Beliefs_and_Violent_Behaviour_in_De_radicalisation_Scientific_insights_for_policy?f_ri=1660","dom_id":"work_35455625","summary":"This chapter aims to show how radical beliefs and violent action relate to each\nother. It summarises the current landscape of academic research that has, in different\nways, attempted to identify the causes of terrorist action. In showing the current\ntrends, areas of consensus and areas of dispute, the chapter aims to show the\ncomplex relationship between drivers based on ideas, ideologies and beliefs and\ndrivers based on other factors. Terrorists, like normal people, are influenced on a\nnumber of different levels and in ways that they do not always realise or acknowledge\nthemselves. Whether through social ties, the power of counter-culture, or the\ndesire to seek thrills, status or recognition, the story of why people undertake political\nviolence is more complex and subtle than simply a question of belief.","downloadable_attachments":[{"id":55317431,"asset_id":35455625,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":652585,"first_name":"Carl","last_name":"Miller","domain_name":"demos","page_name":"CarlMiller","display_name":"Carl Miller","profile_url":"https://demos.academia.edu/CarlMiller?f_ri=1660","photo":"https://0.academia-photos.com/652585/2077295/2444199/s65_carl.miller.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":5847,"name":"Political Extremism/Radicalism/Populism","url":"https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism?f_ri=1660","nofollow":true},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660"},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660"},{"id":57986,"name":"Radicalisation","url":"https://www.academia.edu/Documents/in/Radicalisation?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_16854200" data-work_id="16854200" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/16854200/Terrorists_or_national_heroes_Politics_and_perceptions_of_the_OUN_and_the_UPA_in_Ukraine">Terrorists or national heroes? Politics and perceptions of the OUN and the UPA in Ukraine</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This study analyzes controversies and public attitudes concerning the Bandera faction of the Organization of Ukrainian Nationalists (OUN-B), the Ukrainian Insurgent Army (UPA) and Stepan Bandera in Ukraine. The research question is: Which... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_16854200" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This study analyzes controversies and public attitudes concerning the Bandera faction of the Organization of Ukrainian Nationalists (OUN-B), the Ukrainian Insurgent Army (UPA)<br />and Stepan Bandera in Ukraine. The research question is: Which factors affect attitudes toward the OUN-B, the UPA and Bandera in contemporary Ukraine? This article employs comparative and regression analyses of surveys commissioned by the author and conducted by the Kyiv International Institute of Sociology (KIIS) in 2009 and 2013 to determine the effects of regional and other factors on attitudes toward these organizations and the OUN-B leader. The study shows that regional factors and perceptions of these organizations&#39; involvement in mass murder were the strongest predictors of the views concerning the OUN-B, the UPA and Bandera. Their public support is strongest in Galicia and weakest in the East and the South, in particular, in Donbas and Crimea, two major conflict areas since the “Euromaidan.”</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/16854200" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c3ac6544f34838aa3efe068cb64b09dd" rel="nofollow" data-download="{&quot;attachment_id&quot;:39219458,&quot;asset_id&quot;:16854200,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39219458/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="186256" href="https://uottawa.academia.edu/IvanKatchanovski">Ivan Katchanovski</a><script data-card-contents-for-user="186256" type="text/json">{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=1660","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}</script></span></span></li><li class="js-paper-rank-work_16854200 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="16854200"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 16854200, container: ".js-paper-rank-work_16854200", }); });</script></li><li class="js-percentile-work_16854200 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16854200; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_16854200"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_16854200 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="16854200"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16854200; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16854200]").text(description); $(".js-view-count-work_16854200").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_16854200").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="16854200"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">60</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" rel="nofollow" href="https://www.academia.edu/Documents/in/History">History</a>,&nbsp;<script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="134" rel="nofollow" href="https://www.academia.edu/Documents/in/Modern_History">Modern History</a>,&nbsp;<script data-card-contents-for-ri="134" type="text/json">{"id":134,"name":"Modern History","url":"https://www.academia.edu/Documents/in/Modern_History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="201" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>,&nbsp;<script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="382" rel="nofollow" href="https://www.academia.edu/Documents/in/Eastern_European_Studies">Eastern European Studies</a><script data-card-contents-for-ri="382" type="text/json">{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=16854200]'), work: {"id":16854200,"title":"Terrorists or national heroes? Politics and perceptions of the OUN and the UPA in Ukraine","created_at":"2015-10-15T18:58:35.216-07:00","url":"https://www.academia.edu/16854200/Terrorists_or_national_heroes_Politics_and_perceptions_of_the_OUN_and_the_UPA_in_Ukraine?f_ri=1660","dom_id":"work_16854200","summary":"This study analyzes controversies and public attitudes concerning the Bandera faction of the Organization of Ukrainian Nationalists (OUN-B), the Ukrainian Insurgent Army (UPA)\nand Stepan Bandera in Ukraine. The research question is: Which factors affect attitudes toward the OUN-B, the UPA and Bandera in contemporary Ukraine? This article employs comparative and regression analyses of surveys commissioned by the author and conducted by the Kyiv International Institute of Sociology (KIIS) in 2009 and 2013 to determine the effects of regional and other factors on attitudes toward these organizations and the OUN-B leader. The study shows that regional factors and perceptions of these organizations' involvement in mass murder were the strongest predictors of the views concerning the OUN-B, the UPA and Bandera. Their public support is strongest in Galicia and weakest in the East and the South, in particular, in Donbas and Crimea, two major conflict areas since the “Euromaidan.”","downloadable_attachments":[{"id":39219458,"asset_id":16854200,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=1660","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1660","nofollow":true},{"id":134,"name":"Modern History","url":"https://www.academia.edu/Documents/in/Modern_History?f_ri=1660","nofollow":true},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true},{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=1660","nofollow":true},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=1660"},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=1660"},{"id":1116,"name":"Public Opinion","url":"https://www.academia.edu/Documents/in/Public_Opinion?f_ri=1660"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660"},{"id":1199,"name":"Eastern Europe","url":"https://www.academia.edu/Documents/in/Eastern_Europe?f_ri=1660"},{"id":1287,"name":"Political Parties","url":"https://www.academia.edu/Documents/in/Political_Parties?f_ri=1660"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=1660"},{"id":3622,"name":"Polish History","url":"https://www.academia.edu/Documents/in/Polish_History?f_ri=1660"},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=1660"},{"id":3972,"name":"Genocide Studies","url":"https://www.academia.edu/Documents/in/Genocide_Studies?f_ri=1660"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":5779,"name":"Post-Soviet Regimes","url":"https://www.academia.edu/Documents/in/Post-Soviet_Regimes?f_ri=1660"},{"id":5781,"name":"Fascism","url":"https://www.academia.edu/Documents/in/Fascism?f_ri=1660"},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=1660"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=1660"},{"id":6005,"name":"Eastern European and Russian Jewish History","url":"https://www.academia.edu/Documents/in/Eastern_European_and_Russian_Jewish_History?f_ri=1660"},{"id":6264,"name":"East European studies","url":"https://www.academia.edu/Documents/in/East_European_studies?f_ri=1660"},{"id":6327,"name":"Eastern European history","url":"https://www.academia.edu/Documents/in/Eastern_European_history?f_ri=1660"},{"id":6990,"name":"Post-Soviet Politics","url":"https://www.academia.edu/Documents/in/Post-Soviet_Politics?f_ri=1660"},{"id":7979,"name":"History of Political Parties","url":"https://www.academia.edu/Documents/in/History_of_Political_Parties?f_ri=1660"},{"id":8284,"name":"History of Terrorism","url":"https://www.academia.edu/Documents/in/History_of_Terrorism?f_ri=1660"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660"},{"id":10495,"name":"Nationalism And State Building","url":"https://www.academia.edu/Documents/in/Nationalism_And_State_Building?f_ri=1660"},{"id":12396,"name":"Post-Soviet Studies","url":"https://www.academia.edu/Documents/in/Post-Soviet_Studies?f_ri=1660"},{"id":12470,"name":"Public Opinion (Political Science)","url":"https://www.academia.edu/Documents/in/Public_Opinion_Political_Science_?f_ri=1660"},{"id":12739,"name":"Second World War","url":"https://www.academia.edu/Documents/in/Second_World_War?f_ri=1660"},{"id":12742,"name":"Holocaust Studies","url":"https://www.academia.edu/Documents/in/Holocaust_Studies?f_ri=1660"},{"id":14275,"name":"Ukrainian Nationalism","url":"https://www.academia.edu/Documents/in/Ukrainian_Nationalism?f_ri=1660"},{"id":15575,"name":"20th century (History)","url":"https://www.academia.edu/Documents/in/20th_century_History_?f_ri=1660"},{"id":16389,"name":"World War II","url":"https://www.academia.edu/Documents/in/World_War_II?f_ri=1660"},{"id":21999,"name":"Ukraine (History)","url":"https://www.academia.edu/Documents/in/Ukraine_History_?f_ri=1660"},{"id":25516,"name":"Postcommunist studies","url":"https://www.academia.edu/Documents/in/Postcommunist_studies?f_ri=1660"},{"id":27728,"name":"Politics of Ukraine","url":"https://www.academia.edu/Documents/in/Politics_of_Ukraine?f_ri=1660"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=1660"},{"id":35124,"name":"Post-Communism","url":"https://www.academia.edu/Documents/in/Post-Communism?f_ri=1660"},{"id":43575,"name":"Holocaust","url":"https://www.academia.edu/Documents/in/Holocaust?f_ri=1660"},{"id":45426,"name":"Central and Eastern Europe","url":"https://www.academia.edu/Documents/in/Central_and_Eastern_Europe?f_ri=1660"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=1660"},{"id":51753,"name":"Genocide","url":"https://www.academia.edu/Documents/in/Genocide?f_ri=1660"},{"id":58201,"name":"Ukrainian History","url":"https://www.academia.edu/Documents/in/Ukrainian_History?f_ri=1660"},{"id":77293,"name":"Holocaust and Genocide Studies","url":"https://www.academia.edu/Documents/in/Holocaust_and_Genocide_Studies?f_ri=1660"},{"id":103979,"name":"Ukrainian Far-Right Organisations","url":"https://www.academia.edu/Documents/in/Ukrainian_Far-Right_Organisations?f_ri=1660"},{"id":151869,"name":"Political leadership","url":"https://www.academia.edu/Documents/in/Political_leadership?f_ri=1660"},{"id":183454,"name":"far-right politics Europe","url":"https://www.academia.edu/Documents/in/far-right_politics_Europe?f_ri=1660"},{"id":199924,"name":"Extreme and Far Right","url":"https://www.academia.edu/Documents/in/Extreme_and_Far_Right?f_ri=1660"},{"id":202728,"name":"Post-Communist Studies","url":"https://www.academia.edu/Documents/in/Post-Communist_Studies?f_ri=1660"},{"id":319478,"name":"history of OUN UPA","url":"https://www.academia.edu/Documents/in/history_of_OUN_UPA?f_ri=1660"},{"id":451652,"name":"World War II, Nationalism, OUN UPA","url":"https://www.academia.edu/Documents/in/World_War_II_Nationalism_OUN_UPA?f_ri=1660"},{"id":518489,"name":"Ukraine in WWII","url":"https://www.academia.edu/Documents/in/Ukraine_in_WWII?f_ri=1660"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660"},{"id":931986,"name":"Post Conflict Issues","url":"https://www.academia.edu/Documents/in/Post_Conflict_Issues?f_ri=1660"},{"id":985526,"name":"Holocaust In Ukraine","url":"https://www.academia.edu/Documents/in/Holocaust_In_Ukraine?f_ri=1660"},{"id":985528,"name":"World War II In Ukraine","url":"https://www.academia.edu/Documents/in/World_War_II_In_Ukraine?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_2163809" data-work_id="2163809" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/2163809/The_Connection_between_Terrorism_and_Organized_Crime_Narcoterrorism_and_other_hybrids">The Connection between Terrorism and Organized Crime: Narcoterrorism and other hybrids</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Globalization, which has had its expansion after the fall of the Iron Curtain and the opening of borders after the fall of the ruler of Eastern Europe -Soviet Union brought the development of many spheres of social life. The development... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_2163809" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Globalization, which has had its expansion after the fall of the Iron Curtain and the opening of borders after the fall of the ruler of Eastern Europe -Soviet Union brought the development of many spheres of social life. The development of positive values of society meant development of negative too.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/2163809" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="81d29447065206679418449cf9d87186" rel="nofollow" data-download="{&quot;attachment_id&quot;:30218608,&quot;asset_id&quot;:2163809,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/30218608/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2042672" href="https://uklo.academia.edu/AngelinaStanojoska">Angelina Stanojoska</a><script data-card-contents-for-user="2042672" type="text/json">{"id":2042672,"first_name":"Angelina","last_name":"Stanojoska","domain_name":"uklo","page_name":"AngelinaStanojoska","display_name":"Angelina Stanojoska","profile_url":"https://uklo.academia.edu/AngelinaStanojoska?f_ri=1660","photo":"https://0.academia-photos.com/2042672/671599/19617600/s65_angelina.stanojoska.jpg"}</script></span></span></li><li class="js-paper-rank-work_2163809 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="2163809"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 2163809, container: ".js-paper-rank-work_2163809", }); });</script></li><li class="js-percentile-work_2163809 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 2163809; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_2163809"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_2163809 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="2163809"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 2163809; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=2163809]").text(description); $(".js-view-count-work_2163809").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_2163809").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="2163809"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">14</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="535" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Law-1">Criminal Law</a>,&nbsp;<script data-card-contents-for-ri="535" type="text/json">{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3692" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Criminal_Law">International Criminal Law</a>,&nbsp;<script data-card-contents-for-ri="3692" type="text/json">{"id":3692,"name":"International Criminal Law","url":"https://www.academia.edu/Documents/in/International_Criminal_Law?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4792" rel="nofollow" href="https://www.academia.edu/Documents/in/Juvenile_Justice">Juvenile Justice</a><script data-card-contents-for-ri="4792" type="text/json">{"id":4792,"name":"Juvenile Justice","url":"https://www.academia.edu/Documents/in/Juvenile_Justice?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=2163809]'), work: {"id":2163809,"title":"The Connection between Terrorism and Organized Crime: Narcoterrorism and other hybrids","created_at":"2012-11-19T22:49:51.533-08:00","url":"https://www.academia.edu/2163809/The_Connection_between_Terrorism_and_Organized_Crime_Narcoterrorism_and_other_hybrids?f_ri=1660","dom_id":"work_2163809","summary":"Globalization, which has had its expansion after the fall of the Iron Curtain and the opening of borders after the fall of the ruler of Eastern Europe -Soviet Union brought the development of many spheres of social life. The development of positive values of society meant development of negative too.","downloadable_attachments":[{"id":30218608,"asset_id":2163809,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2042672,"first_name":"Angelina","last_name":"Stanojoska","domain_name":"uklo","page_name":"AngelinaStanojoska","display_name":"Angelina Stanojoska","profile_url":"https://uklo.academia.edu/AngelinaStanojoska?f_ri=1660","photo":"https://0.academia-photos.com/2042672/671599/19617600/s65_angelina.stanojoska.jpg"}],"research_interests":[{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":3692,"name":"International Criminal Law","url":"https://www.academia.edu/Documents/in/International_Criminal_Law?f_ri=1660","nofollow":true},{"id":4792,"name":"Juvenile Justice","url":"https://www.academia.edu/Documents/in/Juvenile_Justice?f_ri=1660","nofollow":true},{"id":8008,"name":"Organized Crime","url":"https://www.academia.edu/Documents/in/Organized_Crime?f_ri=1660"},{"id":26965,"name":"Crime Prevention","url":"https://www.academia.edu/Documents/in/Crime_Prevention?f_ri=1660"},{"id":54484,"name":"Transnational Crime","url":"https://www.academia.edu/Documents/in/Transnational_Crime?f_ri=1660"},{"id":62945,"name":"Drugs","url":"https://www.academia.edu/Documents/in/Drugs?f_ri=1660"},{"id":73699,"name":"Corruption","url":"https://www.academia.edu/Documents/in/Corruption?f_ri=1660"},{"id":157891,"name":"Traffic","url":"https://www.academia.edu/Documents/in/Traffic?f_ri=1660"},{"id":477427,"name":"International Crimes","url":"https://www.academia.edu/Documents/in/International_Crimes?f_ri=1660"},{"id":753722,"name":"Global Crime","url":"https://www.academia.edu/Documents/in/Global_Crime?f_ri=1660"},{"id":1019138,"name":"Measures of Prevention","url":"https://www.academia.edu/Documents/in/Measures_of_Prevention?f_ri=1660"},{"id":1019139,"name":"Trafficking Human Beings","url":"https://www.academia.edu/Documents/in/Trafficking_Human_Beings?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11300568" data-work_id="11300568" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11300568/La_place_du_terroriste_dans_le_droit_international_au_XXI_si%C3%A8cle">La place du terroriste dans le droit international au XXI° siècle</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Ce rapport de recherche s’intéresse à la place réservée au terroriste dans la mouvancesécuritaire internationale de notre début de XXI° siècle, en se posant plus particulièrement la question de savoir comment la communauté internationale... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11300568" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Ce rapport de recherche s’intéresse à la place réservée au terroriste dans la mouvancesécuritaire internationale de notre début de XXI° siècle, en se posant plus particulièrement la question de savoir comment la communauté internationale et le droit peuvent-ils faire face à cette nouvelle menace en ce qu’elle n’émane pas d’un Etat, mais de plusieurs groupes extrémistes transnationaux qui ne respectent aucun code de guerre, mais pour qui il conviendrait de respecter les droits de l’homme au nom de l’universalité.<br />Il est nécessaire de situer d’une manière plus globale la place des mouvements terroristes face à la communauté internationale tant dans la notion dans laquelle le terrorisme est définit que dans les normes érigées pour lutter contre ces mouvements (Section 1), avant de s’attacher plus spécifiquement à la place du terroriste face au droit, notamment le droit international humanitaire et les droits de l’homme (Section 2).</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11300568" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fd0625e97563b31b3e26b00021430352" rel="nofollow" data-download="{&quot;attachment_id&quot;:36876350,&quot;asset_id&quot;:11300568,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36876350/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="23535780" href="https://univ-amu.academia.edu/C%C3%A9lineMartin">Céline Martin</a><script data-card-contents-for-user="23535780" type="text/json">{"id":23535780,"first_name":"Céline","last_name":"Martin","domain_name":"univ-amu","page_name":"CélineMartin","display_name":"Céline Martin","profile_url":"https://univ-amu.academia.edu/C%C3%A9lineMartin?f_ri=1660","photo":"https://0.academia-photos.com/23535780/7765174/8704439/s65_c_line.martin.jpg"}</script></span></span></li><li class="js-paper-rank-work_11300568 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11300568"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11300568, container: ".js-paper-rank-work_11300568", }); });</script></li><li class="js-percentile-work_11300568 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11300568; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11300568"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11300568 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11300568"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11300568; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11300568]").text(description); $(".js-view-count-work_11300568").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11300568").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11300568"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5321" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Human_Rights_Law">International Human Rights Law</a>,&nbsp;<script data-card-contents-for-ri="5321" type="text/json">{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11665" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Humanitarian_Law">International Humanitarian Law</a><script data-card-contents-for-ri="11665" type="text/json">{"id":11665,"name":"International Humanitarian Law","url":"https://www.academia.edu/Documents/in/International_Humanitarian_Law?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11300568]'), work: {"id":11300568,"title":"La place du terroriste dans le droit international au XXI° siècle","created_at":"2015-03-05T23:33:31.704-08:00","url":"https://www.academia.edu/11300568/La_place_du_terroriste_dans_le_droit_international_au_XXI_si%C3%A8cle?f_ri=1660","dom_id":"work_11300568","summary":"Ce rapport de recherche s’intéresse à la place réservée au terroriste dans la mouvancesécuritaire internationale de notre début de XXI° siècle, en se posant plus particulièrement la question de savoir comment la communauté internationale et le droit peuvent-ils faire face à cette nouvelle menace en ce qu’elle n’émane pas d’un Etat, mais de plusieurs groupes extrémistes transnationaux qui ne respectent aucun code de guerre, mais pour qui il conviendrait de respecter les droits de l’homme au nom de l’universalité.\nIl est nécessaire de situer d’une manière plus globale la place des mouvements terroristes face à la communauté internationale tant dans la notion dans laquelle le terrorisme est définit que dans les normes érigées pour lutter contre ces mouvements (Section 1), avant de s’attacher plus spécifiquement à la place du terroriste face au droit, notamment le droit international humanitaire et les droits de l’homme (Section 2).","downloadable_attachments":[{"id":36876350,"asset_id":11300568,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":23535780,"first_name":"Céline","last_name":"Martin","domain_name":"univ-amu","page_name":"CélineMartin","display_name":"Céline Martin","profile_url":"https://univ-amu.academia.edu/C%C3%A9lineMartin?f_ri=1660","photo":"https://0.academia-photos.com/23535780/7765174/8704439/s65_c_line.martin.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=1660","nofollow":true},{"id":11665,"name":"International Humanitarian Law","url":"https://www.academia.edu/Documents/in/International_Humanitarian_Law?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7819879" data-work_id="7819879" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7819879/La_imagen_de_ETA_en_el_cine_espa%C3%B1ol_Operaci%C3%B3n_Ogro_Sombras_en_una_batalla_y_El_Lobo">La imagen de ETA en el cine español: Operación Ogro, Sombras en una batalla y El Lobo</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">ÍNDICE DE CONTENIDOS Introducción 5 2. La imagen de ETA en Operación Ogro (1979) 20 3. La imagen de ETA en Sombras en una batalla (1993) 28 4. La imagen de ETA en El Lobo (2004) 35 Conclusiones 43 Referencias bibliográficas 45</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7819879" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d4b2cf3cdee90d6072bc84a18dc8bf03" rel="nofollow" data-download="{&quot;attachment_id&quot;:34322037,&quot;asset_id&quot;:7819879,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34322037/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5998463" href="https://uw.academia.edu/NataliaK%C5%82opotek">Natalia Kłopotek</a><script data-card-contents-for-user="5998463" type="text/json">{"id":5998463,"first_name":"Natalia","last_name":"Kłopotek","domain_name":"uw","page_name":"NataliaKłopotek","display_name":"Natalia Kłopotek","profile_url":"https://uw.academia.edu/NataliaK%C5%82opotek?f_ri=1660","photo":"https://0.academia-photos.com/5998463/2678078/3166375/s65_natalia.k_opotek.jpg"}</script></span></span></li><li class="js-paper-rank-work_7819879 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7819879"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7819879, container: ".js-paper-rank-work_7819879", }); });</script></li><li class="js-percentile-work_7819879 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7819879; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7819879"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7819879 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7819879"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7819879; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7819879]").text(description); $(".js-view-count-work_7819879").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7819879").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7819879"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6017" rel="nofollow" href="https://www.academia.edu/Documents/in/Spanish_Cinema">Spanish Cinema</a>,&nbsp;<script data-card-contents-for-ri="6017" type="text/json">{"id":6017,"name":"Spanish Cinema","url":"https://www.academia.edu/Documents/in/Spanish_Cinema?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="90476" rel="nofollow" href="https://www.academia.edu/Documents/in/Basque_Conflict">Basque Conflict</a>,&nbsp;<script data-card-contents-for-ri="90476" type="text/json">{"id":90476,"name":"Basque Conflict","url":"https://www.academia.edu/Documents/in/Basque_Conflict?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="306812" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorismo">Terrorismo</a><script data-card-contents-for-ri="306812" type="text/json">{"id":306812,"name":"Terrorismo","url":"https://www.academia.edu/Documents/in/Terrorismo?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7819879]'), work: {"id":7819879,"title":"La imagen de ETA en el cine español: Operación Ogro, Sombras en una batalla y El Lobo","created_at":"2014-07-30T02:55:54.509-07:00","url":"https://www.academia.edu/7819879/La_imagen_de_ETA_en_el_cine_espa%C3%B1ol_Operaci%C3%B3n_Ogro_Sombras_en_una_batalla_y_El_Lobo?f_ri=1660","dom_id":"work_7819879","summary":"ÍNDICE DE CONTENIDOS Introducción 5 2. La imagen de ETA en Operación Ogro (1979) 20 3. La imagen de ETA en Sombras en una batalla (1993) 28 4. La imagen de ETA en El Lobo (2004) 35 Conclusiones 43 Referencias bibliográficas 45","downloadable_attachments":[{"id":34322037,"asset_id":7819879,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5998463,"first_name":"Natalia","last_name":"Kłopotek","domain_name":"uw","page_name":"NataliaKłopotek","display_name":"Natalia Kłopotek","profile_url":"https://uw.academia.edu/NataliaK%C5%82opotek?f_ri=1660","photo":"https://0.academia-photos.com/5998463/2678078/3166375/s65_natalia.k_opotek.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":6017,"name":"Spanish Cinema","url":"https://www.academia.edu/Documents/in/Spanish_Cinema?f_ri=1660","nofollow":true},{"id":90476,"name":"Basque Conflict","url":"https://www.academia.edu/Documents/in/Basque_Conflict?f_ri=1660","nofollow":true},{"id":306812,"name":"Terrorismo","url":"https://www.academia.edu/Documents/in/Terrorismo?f_ri=1660","nofollow":true},{"id":348761,"name":"Cine Español","url":"https://www.academia.edu/Documents/in/Cine_Espa%C3%B1ol?f_ri=1660"},{"id":1283828,"name":"Historia De ETA (Euskadi Ta Askatasuna)","url":"https://www.academia.edu/Documents/in/Historia_De_ETA_Euskadi_Ta_Askatasuna_?f_ri=1660"},{"id":1283842,"name":"History of ETA (Euskadi Ta Askatasuna)","url":"https://www.academia.edu/Documents/in/History_of_ETA_Euskadi_Ta_Askatasuna_?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41249961" data-work_id="41249961" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41249961/Ter%C3%B6rizm_Su%C3%A7lar%C4%B1yla_%C4%B0lgili_Kar%C5%9F%C4%B1la%C5%9Ft%C4%B1rmal%C4%B1_%C3%87al%C4%B1%C5%9Fma_Raporu">Terörizm Suçlarıyla İlgili Karşılaştırmalı Çalışma Raporu</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">&quot;Bu çalışma, terör örgütü üyeliği, terör örgütüne yardım, terörizmin finansmanı, terörizmin propagandası, terör suçlarından dolayı sorumluluk, terör suçlarından dolayı cezalandırılabilirliğin alanını genişletme, sorumluluk alanını öne... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41249961" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">&quot;Bu çalışma, terör örgütü üyeliği, terör örgütüne yardım, terörizmin finansmanı, terörizmin propagandası, terör suçlarından dolayı sorumluluk, terör suçlarından dolayı cezalandırılabilirliğin alanını genişletme, sorumluluk alanını öne çekme konularında yapılmış bir karşılaştırmalı hukuk çalışmasıdır.&quot; <br />Şahsımızın, &quot;Amerika Birleşik Devletleri&quot; başlığı altındaki açıklamaların kaleme alınmasında katkısı bulunmaktadır. <br />Editörler: Prof. Dr. İzzet ÖZGENÇ, Prof. Dr. Cumhur ŞAHİN, Prof. Dr. İlhan ÜZÜLMEZ</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41249961" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="da14c6baa7eb96b9ba6b01e0fd53bbe1" rel="nofollow" data-download="{&quot;attachment_id&quot;:61473456,&quot;asset_id&quot;:41249961,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61473456/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="70185" href="https://ahbv.academia.edu/FatmaUmayGEN%C3%87">F. Umay GENÇ</a><script data-card-contents-for-user="70185" type="text/json">{"id":70185,"first_name":"F. Umay","last_name":"GENÇ","domain_name":"ahbv","page_name":"FatmaUmayGENÇ","display_name":"F. Umay GENÇ","profile_url":"https://ahbv.academia.edu/FatmaUmayGEN%C3%87?f_ri=1660","photo":"https://0.academia-photos.com/70185/2349899/36722751/s65_f._umay.gen_.jpg"}</script></span></span></li><li class="js-paper-rank-work_41249961 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41249961"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41249961, container: ".js-paper-rank-work_41249961", }); });</script></li><li class="js-percentile-work_41249961 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41249961; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41249961"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41249961 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41249961"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41249961; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41249961]").text(description); $(".js-view-count-work_41249961").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41249961").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41249961"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="535" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminal_Law-1">Criminal Law</a>,&nbsp;<script data-card-contents-for-ri="535" type="text/json">{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="761870" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism">Terrorism and Counterterrorism</a>,&nbsp;<script data-card-contents-for-ri="761870" type="text/json">{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1107721" rel="nofollow" href="https://www.academia.edu/Documents/in/COMBAT_OF_FINANCING_OF_TERRORISM">COMBAT OF FINANCING OF TERRORISM</a><script data-card-contents-for-ri="1107721" type="text/json">{"id":1107721,"name":"COMBAT OF FINANCING OF TERRORISM","url":"https://www.academia.edu/Documents/in/COMBAT_OF_FINANCING_OF_TERRORISM?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41249961]'), work: {"id":41249961,"title":"Terörizm Suçlarıyla İlgili Karşılaştırmalı Çalışma Raporu","created_at":"2019-12-10T03:04:57.839-08:00","url":"https://www.academia.edu/41249961/Ter%C3%B6rizm_Su%C3%A7lar%C4%B1yla_%C4%B0lgili_Kar%C5%9F%C4%B1la%C5%9Ft%C4%B1rmal%C4%B1_%C3%87al%C4%B1%C5%9Fma_Raporu?f_ri=1660","dom_id":"work_41249961","summary":"\"Bu çalışma, terör örgütü üyeliği, terör örgütüne yardım, terörizmin finansmanı, terörizmin propagandası, terör suçlarından dolayı sorumluluk, terör suçlarından dolayı cezalandırılabilirliğin alanını genişletme, sorumluluk alanını öne çekme konularında yapılmış bir karşılaştırmalı hukuk çalışmasıdır.\"\r\nŞahsımızın, \"Amerika Birleşik Devletleri\" başlığı altındaki açıklamaların kaleme alınmasında katkısı bulunmaktadır. \r\nEditörler: Prof. Dr. İzzet ÖZGENÇ, Prof. Dr. Cumhur ŞAHİN, Prof. Dr. İlhan ÜZÜLMEZ ","downloadable_attachments":[{"id":61473456,"asset_id":41249961,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":70185,"first_name":"F. Umay","last_name":"GENÇ","domain_name":"ahbv","page_name":"FatmaUmayGENÇ","display_name":"F. Umay GENÇ","profile_url":"https://ahbv.academia.edu/FatmaUmayGEN%C3%87?f_ri=1660","photo":"https://0.academia-photos.com/70185/2349899/36722751/s65_f._umay.gen_.jpg"}],"research_interests":[{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660","nofollow":true},{"id":1107721,"name":"COMBAT OF FINANCING OF TERRORISM","url":"https://www.academia.edu/Documents/in/COMBAT_OF_FINANCING_OF_TERRORISM?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3378079" data-work_id="3378079" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3378079/The_Politics_of_World_War_II_in_Contemporary_Ukraine">The Politics of World War II in Contemporary Ukraine</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This study examines the role of political factors in attitudes toward World War II in contemporary Ukraine. The question under examination is which factors determine public views of the principal warring sides and their leaders in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_3378079" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This study examines the role of political factors in attitudes toward World War II in contemporary Ukraine. The question under examination is which factors determine public views of the principal warring sides and their leaders in Ukraine. This paper uses a representative national survey specifically designed for this research project and conducted by the Kyiv International Institute of Sociology in 2012. It analyzes the roles of regionalism, political party preferences, ethnicity, language, age, and sex in attitudes toward the Red Army, Soviet partisans, the German Army (Wehrmacht), and the Ukrainian Insurgent Army (UPA) during the war, as well as toward the wartime leaders of the Soviet Union, Nazi Germany, and the UPA. The analysis of the survey data shows that regional values, political party preferences, ethnicity, language, and age have significant effects on views of the Soviet Army and the Ukrainian Insurgent Army during the war and attitudes toward the wartime activities of Joseph Stalin and Roman Shukhevych. Public perceptions of the German Army and Adolf Hitler in Ukraine do not vary much across regions, political parties, and ethnic, language, age, and sex groups.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3378079" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="897488de43bc8d5d6f9deb458add2437" rel="nofollow" data-download="{&quot;attachment_id&quot;:38565772,&quot;asset_id&quot;:3378079,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38565772/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="186256" href="https://uottawa.academia.edu/IvanKatchanovski">Ivan Katchanovski</a><script data-card-contents-for-user="186256" type="text/json">{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=1660","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}</script></span></span></li><li class="js-paper-rank-work_3378079 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3378079"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3378079, container: ".js-paper-rank-work_3378079", }); });</script></li><li class="js-percentile-work_3378079 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3378079; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3378079"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3378079 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3378079"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3378079; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3378079]").text(description); $(".js-view-count-work_3378079").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3378079").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3378079"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">112</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="128" rel="nofollow" href="https://www.academia.edu/Documents/in/History">History</a>,&nbsp;<script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="131" rel="nofollow" href="https://www.academia.edu/Documents/in/European_History">European History</a>,&nbsp;<script data-card-contents-for-ri="131" type="text/json">{"id":131,"name":"European History","url":"https://www.academia.edu/Documents/in/European_History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="133" rel="nofollow" href="https://www.academia.edu/Documents/in/Military_History">Military History</a>,&nbsp;<script data-card-contents-for-ri="133" type="text/json">{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="201" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a><script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3378079]'), work: {"id":3378079,"title":"The Politics of World War II in Contemporary Ukraine","created_at":"2013-04-24T12:31:15.456-07:00","url":"https://www.academia.edu/3378079/The_Politics_of_World_War_II_in_Contemporary_Ukraine?f_ri=1660","dom_id":"work_3378079","summary":"This study examines the role of political factors in attitudes toward World War II in contemporary Ukraine. The question under examination is which factors determine public views of the principal warring sides and their leaders in Ukraine. This paper uses a representative national survey specifically designed for this research project and conducted by the Kyiv International Institute of Sociology in 2012. It analyzes the roles of regionalism, political party preferences, ethnicity, language, age, and sex in attitudes toward the Red Army, Soviet partisans, the German Army (Wehrmacht), and the Ukrainian Insurgent Army (UPA) during the war, as well as toward the wartime leaders of the Soviet Union, Nazi Germany, and the UPA. The analysis of the survey data shows that regional values, political party preferences, ethnicity, language, and age have significant effects on views of the Soviet Army and the Ukrainian Insurgent Army during the war and attitudes toward the wartime activities of Joseph Stalin and Roman Shukhevych. Public perceptions of the German Army and Adolf Hitler in Ukraine do not vary much across regions, political parties, and ethnic, language, age, and sex groups.","downloadable_attachments":[{"id":38565772,"asset_id":3378079,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=1660","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1660","nofollow":true},{"id":131,"name":"European History","url":"https://www.academia.edu/Documents/in/European_History?f_ri=1660","nofollow":true},{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=1660","nofollow":true},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=1660","nofollow":true},{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=1660"},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=1660"},{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science?f_ri=1660"},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=1660"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660"},{"id":878,"name":"Soviet Regime","url":"https://www.academia.edu/Documents/in/Soviet_Regime?f_ri=1660"},{"id":1116,"name":"Public Opinion","url":"https://www.academia.edu/Documents/in/Public_Opinion?f_ri=1660"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660"},{"id":1199,"name":"Eastern Europe","url":"https://www.academia.edu/Documents/in/Eastern_Europe?f_ri=1660"},{"id":1287,"name":"Political Parties","url":"https://www.academia.edu/Documents/in/Political_Parties?f_ri=1660"},{"id":1567,"name":"Soviet History","url":"https://www.academia.edu/Documents/in/Soviet_History?f_ri=1660"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=1660"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=1660"},{"id":2472,"name":"Sociology of the Military","url":"https://www.academia.edu/Documents/in/Sociology_of_the_Military?f_ri=1660"},{"id":3516,"name":"Contemporary History","url":"https://www.academia.edu/Documents/in/Contemporary_History?f_ri=1660"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=1660"},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=1660"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=1660"},{"id":3972,"name":"Genocide Studies","url":"https://www.academia.edu/Documents/in/Genocide_Studies?f_ri=1660"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":5779,"name":"Post-Soviet Regimes","url":"https://www.academia.edu/Documents/in/Post-Soviet_Regimes?f_ri=1660"},{"id":5781,"name":"Fascism","url":"https://www.academia.edu/Documents/in/Fascism?f_ri=1660"},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=1660"},{"id":5895,"name":"Russian Politics","url":"https://www.academia.edu/Documents/in/Russian_Politics?f_ri=1660"},{"id":5954,"name":"European Security and Defence Policy","url":"https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy?f_ri=1660"},{"id":6264,"name":"East European studies","url":"https://www.academia.edu/Documents/in/East_European_studies?f_ri=1660"},{"id":6326,"name":"Central European history","url":"https://www.academia.edu/Documents/in/Central_European_history?f_ri=1660"},{"id":6327,"name":"Eastern European history","url":"https://www.academia.edu/Documents/in/Eastern_European_history?f_ri=1660"},{"id":6990,"name":"Post-Soviet Politics","url":"https://www.academia.edu/Documents/in/Post-Soviet_Politics?f_ri=1660"},{"id":7978,"name":"Political History","url":"https://www.academia.edu/Documents/in/Political_History?f_ri=1660"},{"id":7980,"name":"History of Political Violence","url":"https://www.academia.edu/Documents/in/History_of_Political_Violence?f_ri=1660"},{"id":9154,"name":"History of the USSR","url":"https://www.academia.edu/Documents/in/History_of_the_USSR?f_ri=1660"},{"id":9626,"name":"Ukrainian Politics","url":"https://www.academia.edu/Documents/in/Ukrainian_Politics?f_ri=1660"},{"id":10311,"name":"European Politics","url":"https://www.academia.edu/Documents/in/European_Politics?f_ri=1660"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=1660"},{"id":10344,"name":"International Politics","url":"https://www.academia.edu/Documents/in/International_Politics?f_ri=1660"},{"id":10871,"name":"Regionalism","url":"https://www.academia.edu/Documents/in/Regionalism?f_ri=1660"},{"id":12396,"name":"Post-Soviet Studies","url":"https://www.academia.edu/Documents/in/Post-Soviet_Studies?f_ri=1660"},{"id":12470,"name":"Public Opinion (Political Science)","url":"https://www.academia.edu/Documents/in/Public_Opinion_Political_Science_?f_ri=1660"},{"id":12531,"name":"Post-Socialist Societies","url":"https://www.academia.edu/Documents/in/Post-Socialist_Societies?f_ri=1660"},{"id":12739,"name":"Second World War","url":"https://www.academia.edu/Documents/in/Second_World_War?f_ri=1660"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict?f_ri=1660"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution?f_ri=1660"},{"id":13629,"name":"Comparative genocide","url":"https://www.academia.edu/Documents/in/Comparative_genocide?f_ri=1660"},{"id":14275,"name":"Ukrainian Nationalism","url":"https://www.academia.edu/Documents/in/Ukrainian_Nationalism?f_ri=1660"},{"id":14370,"name":"Conflict Management","url":"https://www.academia.edu/Documents/in/Conflict_Management?f_ri=1660"},{"id":16211,"name":"Ethnic Conflict","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict?f_ri=1660"},{"id":16389,"name":"World War II","url":"https://www.academia.edu/Documents/in/World_War_II?f_ri=1660"},{"id":18977,"name":"Soviet Union (History)","url":"https://www.academia.edu/Documents/in/Soviet_Union_History_?f_ri=1660"},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=1660"},{"id":19200,"name":"Post-Conflict State Building","url":"https://www.academia.edu/Documents/in/Post-Conflict_State_Building?f_ri=1660"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3?f_ri=1660"},{"id":21999,"name":"Ukraine (History)","url":"https://www.academia.edu/Documents/in/Ukraine_History_?f_ri=1660"},{"id":22644,"name":"National Socialism","url":"https://www.academia.edu/Documents/in/National_Socialism?f_ri=1660"},{"id":22665,"name":"Post-Socialism","url":"https://www.academia.edu/Documents/in/Post-Socialism?f_ri=1660"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=1660"},{"id":25516,"name":"Postcommunist studies","url":"https://www.academia.edu/Documents/in/Postcommunist_studies?f_ri=1660"},{"id":27641,"name":"Soviet, post-Soviet, Russian politics","url":"https://www.academia.edu/Documents/in/Soviet_post-Soviet_Russian_politics?f_ri=1660"},{"id":27728,"name":"Politics of Ukraine","url":"https://www.academia.edu/Documents/in/Politics_of_Ukraine?f_ri=1660"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=1660"},{"id":32836,"name":"Stalin and Stalinism","url":"https://www.academia.edu/Documents/in/Stalin_and_Stalinism?f_ri=1660"},{"id":33654,"name":"East European History","url":"https://www.academia.edu/Documents/in/East_European_History?f_ri=1660"},{"id":35124,"name":"Post-Communism","url":"https://www.academia.edu/Documents/in/Post-Communism?f_ri=1660"},{"id":36160,"name":"Ethnicity \u0026 Ethnic Conflicts","url":"https://www.academia.edu/Documents/in/Ethnicity_and_Ethnic_Conflicts?f_ri=1660"},{"id":38062,"name":"Second World War (History)","url":"https://www.academia.edu/Documents/in/Second_World_War_History_?f_ri=1660"},{"id":39946,"name":"Military","url":"https://www.academia.edu/Documents/in/Military?f_ri=1660"},{"id":41861,"name":"War","url":"https://www.academia.edu/Documents/in/War?f_ri=1660"},{"id":43023,"name":"Nazi Germany","url":"https://www.academia.edu/Documents/in/Nazi_Germany?f_ri=1660"},{"id":44617,"name":"Armed Forces","url":"https://www.academia.edu/Documents/in/Armed_Forces?f_ri=1660"},{"id":45426,"name":"Central and Eastern Europe","url":"https://www.academia.edu/Documents/in/Central_and_Eastern_Europe?f_ri=1660"},{"id":45578,"name":"Peacebuilding","url":"https://www.academia.edu/Documents/in/Peacebuilding?f_ri=1660"},{"id":46962,"name":"Ukrainian Foreign Policy","url":"https://www.academia.edu/Documents/in/Ukrainian_Foreign_Policy?f_ri=1660"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=1660"},{"id":50856,"name":"World War II history","url":"https://www.academia.edu/Documents/in/World_War_II_history?f_ri=1660"},{"id":51629,"name":"Survey","url":"https://www.academia.edu/Documents/in/Survey?f_ri=1660"},{"id":51753,"name":"Genocide","url":"https://www.academia.edu/Documents/in/Genocide?f_ri=1660"},{"id":52234,"name":"Peace and Conflict Resolution","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Resolution?f_ri=1660"},{"id":52236,"name":"Foreign Policy of Ukraine","url":"https://www.academia.edu/Documents/in/Foreign_Policy_of_Ukraine?f_ri=1660"},{"id":57845,"name":"Defence and Security","url":"https://www.academia.edu/Documents/in/Defence_and_Security?f_ri=1660"},{"id":58201,"name":"Ukrainian History","url":"https://www.academia.edu/Documents/in/Ukrainian_History?f_ri=1660"},{"id":58937,"name":"Slavic Studies","url":"https://www.academia.edu/Documents/in/Slavic_Studies?f_ri=1660"},{"id":63327,"name":"Stalinism","url":"https://www.academia.edu/Documents/in/Stalinism?f_ri=1660"},{"id":66678,"name":"Nazism","url":"https://www.academia.edu/Documents/in/Nazism?f_ri=1660"},{"id":77293,"name":"Holocaust and Genocide Studies","url":"https://www.academia.edu/Documents/in/Holocaust_and_Genocide_Studies?f_ri=1660"},{"id":79323,"name":"Foreign Affairs","url":"https://www.academia.edu/Documents/in/Foreign_Affairs?f_ri=1660"},{"id":99598,"name":"Stalinism and De-Stalinization","url":"https://www.academia.edu/Documents/in/Stalinism_and_De-Stalinization?f_ri=1660"},{"id":102828,"name":"History of Communism; Soviet; Post-Soviet; Russia; Eastern Europe","url":"https://www.academia.edu/Documents/in/History_of_Communism_Soviet_Post-Soviet_Russia_Eastern_Europe?f_ri=1660"},{"id":128091,"name":"Comparative Politics, Foreign and Security Policy, European Affairs","url":"https://www.academia.edu/Documents/in/Comparative_Politics_Foreign_and_Security_Policy_European_Affairs?f_ri=1660"},{"id":131866,"name":"Ukrainian Insurgent Army","url":"https://www.academia.edu/Documents/in/Ukrainian_Insurgent_Army?f_ri=1660"},{"id":140181,"name":"International conflicts","url":"https://www.academia.edu/Documents/in/International_conflicts?f_ri=1660"},{"id":215782,"name":"Security and Defence Studies","url":"https://www.academia.edu/Documents/in/Security_and_Defence_Studies?f_ri=1660"},{"id":220464,"name":"Politics and International relations","url":"https://www.academia.edu/Documents/in/Politics_and_International_relations?f_ri=1660"},{"id":296190,"name":"Stalin and the USSR","url":"https://www.academia.edu/Documents/in/Stalin_and_the_USSR?f_ri=1660"},{"id":319478,"name":"history of OUN UPA","url":"https://www.academia.edu/Documents/in/history_of_OUN_UPA?f_ri=1660"},{"id":406685,"name":"Polish-Ukrainian relations","url":"https://www.academia.edu/Documents/in/Polish-Ukrainian_relations?f_ri=1660"},{"id":451652,"name":"World War II, Nationalism, OUN UPA","url":"https://www.academia.edu/Documents/in/World_War_II_Nationalism_OUN_UPA?f_ri=1660"},{"id":518489,"name":"Ukraine in WWII","url":"https://www.academia.edu/Documents/in/Ukraine_in_WWII?f_ri=1660"},{"id":629415,"name":"History of Ukraine","url":"https://www.academia.edu/Documents/in/History_of_Ukraine?f_ri=1660"},{"id":636840,"name":"Conflict and Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_and_Conflict_Resolution?f_ri=1660"},{"id":842700,"name":"History and Political Science","url":"https://www.academia.edu/Documents/in/History_and_Political_Science-2?f_ri=1660"},{"id":931986,"name":"Post Conflict Issues","url":"https://www.academia.edu/Documents/in/Post_Conflict_Issues?f_ri=1660"},{"id":985526,"name":"Holocaust In Ukraine","url":"https://www.academia.edu/Documents/in/Holocaust_In_Ukraine?f_ri=1660"},{"id":985528,"name":"World War II In Ukraine","url":"https://www.academia.edu/Documents/in/World_War_II_In_Ukraine?f_ri=1660"},{"id":993137,"name":"IR In Post soviet Space","url":"https://www.academia.edu/Documents/in/IR_In_Post_soviet_Space?f_ri=1660"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35629306" data-work_id="35629306" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35629306/Countering_Modern_Terrorism_Military_and_other_Options">Countering Modern Terrorism: Military and other Options</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Terrorism has been part of human development dating back to the era of the struggles for independence and liberation but still defy attempts at an accepted definition. Hence, it has become increasingly necessary for governments to tackle... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35629306" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Terrorism has been part of human development dating back to the era of the struggles for independence and liberation but still defy attempts at an accepted definition. Hence, it has become increasingly necessary for governments to tackle this menace by whichever counter-terrorism measures possible. However, one pivotal means is the use of military force introduced by the then President of the United States, George W. Bush through his &quot; War on Terror &quot; speech on September 20, 2001. This paper tries to assess the pros and cons of this measure and other counterterrorism strategies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35629306" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a7997f8bfefdfe7c9ae7843086b75e43" rel="nofollow" data-download="{&quot;attachment_id&quot;:55498032,&quot;asset_id&quot;:35629306,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55498032/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33384065" href="https://euinstitute.academia.edu/EuropeanScientificJournalESJ">European Scientific Journal ESJ</a><script data-card-contents-for-user="33384065" type="text/json">{"id":33384065,"first_name":"European Scientific Journal","last_name":"ESJ","domain_name":"euinstitute","page_name":"EuropeanScientificJournalESJ","display_name":"European Scientific Journal ESJ","profile_url":"https://euinstitute.academia.edu/EuropeanScientificJournalESJ?f_ri=1660","photo":"https://0.academia-photos.com/33384065/9874609/148656532/s65_european_scientific_journal.esj.jpeg"}</script></span></span></li><li class="js-paper-rank-work_35629306 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35629306"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35629306, container: ".js-paper-rank-work_35629306", }); });</script></li><li class="js-percentile-work_35629306 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35629306; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35629306"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35629306 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35629306"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35629306; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35629306]").text(description); $(".js-view-count-work_35629306").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35629306").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35629306"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a><script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35629306]'), work: {"id":35629306,"title":"Countering Modern Terrorism: Military and other Options","created_at":"2018-01-10T02:08:31.204-08:00","url":"https://www.academia.edu/35629306/Countering_Modern_Terrorism_Military_and_other_Options?f_ri=1660","dom_id":"work_35629306","summary":"Terrorism has been part of human development dating back to the era of the struggles for independence and liberation but still defy attempts at an accepted definition. Hence, it has become increasingly necessary for governments to tackle this menace by whichever counter-terrorism measures possible. However, one pivotal means is the use of military force introduced by the then President of the United States, George W. Bush through his \" War on Terror \" speech on September 20, 2001. This paper tries to assess the pros and cons of this measure and other counterterrorism strategies.","downloadable_attachments":[{"id":55498032,"asset_id":35629306,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33384065,"first_name":"European Scientific Journal","last_name":"ESJ","domain_name":"euinstitute","page_name":"EuropeanScientificJournalESJ","display_name":"European Scientific Journal ESJ","profile_url":"https://euinstitute.academia.edu/EuropeanScientificJournalESJ?f_ri=1660","photo":"https://0.academia-photos.com/33384065/9874609/148656532/s65_european_scientific_journal.esj.jpeg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37724733" data-work_id="37724733" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37724733/Strategi_ASEAN_Mengatasi_Masalah_Pengganas_Di_Asia_Tenggara">Strategi ASEAN Mengatasi Masalah Pengganas Di Asia Tenggara</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Selepas Era perang dunia ke-dua,Negara-negara Asia Tenggara yang telah mencapai kemerdekaan telah bersepakat menubuhkan ‘The Association of Southeast Asia ‘ ( ASA ) di Bangkok . Tujuan penubuhan ini adalah untuk mengadakan kerjasama dari... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37724733" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Selepas Era perang dunia ke-dua,Negara-negara Asia Tenggara yang&nbsp; telah mencapai kemerdekaan telah bersepakat menubuhkan ‘The Association of Southeast Asia ‘ ( ASA ) di Bangkok . Tujuan penubuhan ini adalah untuk mengadakan kerjasama dari segi ekonomi , politik dan keselamatan Negara serantau .ASA ini diaggotai oleh Malaysia , Filipina dan Thailand . Penubuhan ASA ini telah gagal&nbsp; dan membawa pula kepada&nbsp; penubuhan Maphilindo iaitu dari gabungan Negara Malaysia , Filipina , dan Indonesia pada awal tahun 1960 . Penubuhan Maphilindo ini juga turut gagal dan kegagalan ini telah membawa kepada penubuhan ASEAN . ASEAN mula ditubuhkan pada 8 ogos iaitu pada tahun 1967 apabila menteri-menteri luar dari lima Negara iaitu Indonesia , Malaysia , Filipina Singapura dan Thailand berjumpa di kementeriaan hubungan luar Thailand di Bangkok untuk menandatangani Deklarasi ASEAN</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37724733" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="37c15b6dbdc8e91bf908a58a81f8f808" rel="nofollow" data-download="{&quot;attachment_id&quot;:58032363,&quot;asset_id&quot;:37724733,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58032363/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9377048" href="https://ukm-my.academia.edu/ifizura">Ifizura Ibrahim</a><script data-card-contents-for-user="9377048" type="text/json">{"id":9377048,"first_name":"Ifizura","last_name":"Ibrahim","domain_name":"ukm-my","page_name":"ifizura","display_name":"Ifizura Ibrahim","profile_url":"https://ukm-my.academia.edu/ifizura?f_ri=1660","photo":"https://0.academia-photos.com/9377048/21141845/20606769/s65_ifi.zura.jpg"}</script></span></span></li><li class="js-paper-rank-work_37724733 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37724733"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37724733, container: ".js-paper-rank-work_37724733", }); });</script></li><li class="js-percentile-work_37724733 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37724733; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37724733"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37724733 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37724733"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37724733; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37724733]").text(description); $(".js-view-count-work_37724733").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37724733").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37724733"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="380" rel="nofollow" href="https://www.academia.edu/Documents/in/Asian_Studies">Asian Studies</a>,&nbsp;<script data-card-contents-for-ri="380" type="text/json">{"id":380,"name":"Asian Studies","url":"https://www.academia.edu/Documents/in/Asian_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1720" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1720" type="text/json">{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8223" rel="nofollow" href="https://www.academia.edu/Documents/in/East_Asian_Studies">East Asian Studies</a><script data-card-contents-for-ri="8223" type="text/json">{"id":8223,"name":"East Asian Studies","url":"https://www.academia.edu/Documents/in/East_Asian_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37724733]'), work: {"id":37724733,"title":"Strategi ASEAN Mengatasi Masalah Pengganas Di Asia Tenggara","created_at":"2018-11-08T00:03:04.936-08:00","url":"https://www.academia.edu/37724733/Strategi_ASEAN_Mengatasi_Masalah_Pengganas_Di_Asia_Tenggara?f_ri=1660","dom_id":"work_37724733","summary":"Selepas Era perang dunia ke-dua,Negara-negara Asia Tenggara yang telah mencapai kemerdekaan telah bersepakat menubuhkan ‘The Association of Southeast Asia ‘ ( ASA ) di Bangkok . Tujuan penubuhan ini adalah untuk mengadakan kerjasama dari segi ekonomi , politik dan keselamatan Negara serantau .ASA ini diaggotai oleh Malaysia , Filipina dan Thailand . Penubuhan ASA ini telah gagal dan membawa pula kepada penubuhan Maphilindo iaitu dari gabungan Negara Malaysia , Filipina , dan Indonesia pada awal tahun 1960 . Penubuhan Maphilindo ini juga turut gagal dan kegagalan ini telah membawa kepada penubuhan ASEAN . ASEAN mula ditubuhkan pada 8 ogos iaitu pada tahun 1967 apabila menteri-menteri luar dari lima Negara iaitu Indonesia , Malaysia , Filipina Singapura dan Thailand berjumpa di kementeriaan hubungan luar Thailand di Bangkok untuk menandatangani Deklarasi ASEAN ","downloadable_attachments":[{"id":58032363,"asset_id":37724733,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9377048,"first_name":"Ifizura","last_name":"Ibrahim","domain_name":"ukm-my","page_name":"ifizura","display_name":"Ifizura Ibrahim","profile_url":"https://ukm-my.academia.edu/ifizura?f_ri=1660","photo":"https://0.academia-photos.com/9377048/21141845/20606769/s65_ifi.zura.jpg"}],"research_interests":[{"id":380,"name":"Asian Studies","url":"https://www.academia.edu/Documents/in/Asian_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true},{"id":8223,"name":"East Asian Studies","url":"https://www.academia.edu/Documents/in/East_Asian_Studies?f_ri=1660","nofollow":true},{"id":38972,"name":"ASEAN","url":"https://www.academia.edu/Documents/in/ASEAN?f_ri=1660"},{"id":183140,"name":"ASEAN Studies","url":"https://www.academia.edu/Documents/in/ASEAN_Studies?f_ri=1660"},{"id":319711,"name":"Sejarah Asia Tenggara","url":"https://www.academia.edu/Documents/in/Sejarah_Asia_Tenggara?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_29831966" data-work_id="29831966" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/29831966/Feminisation_of_Radical_Islam">Feminisation of Radical Islam</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Women are considered a modernising factor in Islam. For decades the active and vocal Muslim feminists represented a progressive and liberating force challenging the traditional understanding of women in Islam and spearheading the efforts... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_29831966" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Women are considered a modernising factor in Islam. For decades the active and vocal Muslim feminists represented a progressive and liberating force challenging the traditional understanding of women in Islam and spearheading the efforts aimed at widening the spaces where females could exercise their full potential. Radical Islam, to the contrary, was believed to be and thus portrayed, as inherently masculine and necessarily patriarchal enterprise, somewhat oppressive when it came to women or at least defending the traditional status quo with regards to gender relations and roles. This paper provides an analysis of an emerging trend whereby Muslim women are not only active in the modernising circles but, quite the opposite, become vocal proponents of radical political Islam. Hence, instead of being the much hoped for progressive force, they constitute an avant-garde of the opposite: radical agenda advocating and actively supporting the agenda of political Islam; also in the sphere of political violence. This paper examines how feminisation of radical Islam progressed over time and shows how what hitherto represented a solely masculine privilege and domain, now also belongs to women. Where at first women were not present, with time they became pliable instrument in political struggle, only to gain their own independent voice, agency and a power to act autonomously. <br /><br />ISBN 978-83-65158-04-8 Bartoszewicz, M.G (2015). Feminisation of Radical Islam. “Studia Erasmiana Wratislaviensia”, Vol. 9, pp. 307-330.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/29831966" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8c525a52d59ce5fb9adf7fdbd164aef4" rel="nofollow" data-download="{&quot;attachment_id&quot;:53234296,&quot;asset_id&quot;:29831966,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/53234296/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="291362" href="https://jokstad.academia.edu/MonikaGabrielaBartoszewicz">Monika Gabriela Bartoszewicz</a><script data-card-contents-for-user="291362" type="text/json">{"id":291362,"first_name":"Monika Gabriela","last_name":"Bartoszewicz","domain_name":"jokstad","page_name":"MonikaGabrielaBartoszewicz","display_name":"Monika Gabriela Bartoszewicz","profile_url":"https://jokstad.academia.edu/MonikaGabrielaBartoszewicz?f_ri=1660","photo":"https://0.academia-photos.com/291362/59063/49705265/s65_monika_gabriela.bartoszewicz.png"}</script></span></span></li><li class="js-paper-rank-work_29831966 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="29831966"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 29831966, container: ".js-paper-rank-work_29831966", }); });</script></li><li class="js-percentile-work_29831966 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 29831966; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_29831966"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_29831966 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="29831966"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 29831966; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=29831966]").text(description); $(".js-view-count-work_29831966").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_29831966").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="29831966"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11155" rel="nofollow" href="https://www.academia.edu/Documents/in/Women_and_Gender_Issues_in_Islam">Women and Gender Issues in Islam</a>,&nbsp;<script data-card-contents-for-ri="11155" type="text/json">{"id":11155,"name":"Women and Gender Issues in Islam","url":"https://www.academia.edu/Documents/in/Women_and_Gender_Issues_in_Islam?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="283707" rel="nofollow" href="https://www.academia.edu/Documents/in/Western_converts_to_Islam">Western converts to Islam</a>,&nbsp;<script data-card-contents-for-ri="283707" type="text/json">{"id":283707,"name":"Western converts to Islam","url":"https://www.academia.edu/Documents/in/Western_converts_to_Islam?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="963051" rel="nofollow" href="https://www.academia.edu/Documents/in/Burqa">Burqa</a><script data-card-contents-for-ri="963051" type="text/json">{"id":963051,"name":"Burqa","url":"https://www.academia.edu/Documents/in/Burqa?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=29831966]'), work: {"id":29831966,"title":"Feminisation of Radical Islam","created_at":"2016-11-14T08:07:22.124-08:00","url":"https://www.academia.edu/29831966/Feminisation_of_Radical_Islam?f_ri=1660","dom_id":"work_29831966","summary":"Women are considered a modernising factor in Islam. For decades the active and vocal Muslim feminists represented a progressive and liberating force challenging the traditional understanding of women in Islam and spearheading the efforts aimed at widening the spaces where females could exercise their full potential. Radical Islam, to the contrary, was believed to be and thus portrayed, as inherently masculine and necessarily patriarchal enterprise, somewhat oppressive when it came to women or at least defending the traditional status quo with regards to gender relations and roles. This paper provides an analysis of an emerging trend whereby Muslim women are not only active in the modernising circles but, quite the opposite, become vocal proponents of radical political Islam. Hence, instead of being the much hoped for progressive force, they constitute an avant-garde of the opposite: radical agenda advocating and actively supporting the agenda of political Islam; also in the sphere of political violence. This paper examines how feminisation of radical Islam progressed over time and shows how what hitherto represented a solely masculine privilege and domain, now also belongs to women. Where at first women were not present, with time they became pliable instrument in political struggle, only to gain their own independent voice, agency and a power to act autonomously. \n\nISBN 978-83-65158-04-8 Bartoszewicz, M.G (2015). Feminisation of Radical Islam. “Studia Erasmiana Wratislaviensia”, Vol. 9, pp. 307-330.","downloadable_attachments":[{"id":53234296,"asset_id":29831966,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":291362,"first_name":"Monika Gabriela","last_name":"Bartoszewicz","domain_name":"jokstad","page_name":"MonikaGabrielaBartoszewicz","display_name":"Monika Gabriela Bartoszewicz","profile_url":"https://jokstad.academia.edu/MonikaGabrielaBartoszewicz?f_ri=1660","photo":"https://0.academia-photos.com/291362/59063/49705265/s65_monika_gabriela.bartoszewicz.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":11155,"name":"Women and Gender Issues in Islam","url":"https://www.academia.edu/Documents/in/Women_and_Gender_Issues_in_Islam?f_ri=1660","nofollow":true},{"id":283707,"name":"Western converts to Islam","url":"https://www.academia.edu/Documents/in/Western_converts_to_Islam?f_ri=1660","nofollow":true},{"id":963051,"name":"Burqa","url":"https://www.academia.edu/Documents/in/Burqa?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19989953" data-work_id="19989953" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19989953/TERRORISM_AND_POLITICAL_STABILITY_IN_AFRICA_A_CASE_STUDY_OF_THE_BOKO_HARAM_INSURGENCY">TERRORISM AND POLITICAL STABILITY IN AFRICA : A CASE STUDY OF THE BOKO HARAM INSURGENCY</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The frequent Boko Haram insurgences in the North-Eastern part of the country is still the latest act of terrorism in the country. The tactics, strategies and mode of operations adopted by these terrorists are similar and professional in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19989953" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The frequent Boko Haram insurgences in the North-Eastern&nbsp; part of the country is still the latest act of terrorism in the country. The tactics, strategies and mode of operations adopted by these terrorists are similar and professional in line with terrorist ideologies and practices found elsewhere around the world. The ugly phenomenon of terrorism has dented the image and credibility Nigeria among other nations of the world.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19989953" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a0461d004c75046bffddc8beea58b7de" rel="nofollow" data-download="{&quot;attachment_id&quot;:40947441,&quot;asset_id&quot;:19989953,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40947441/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26139071" href="https://eksu.academia.edu/AbimbolaRasheed">Abimbola Rasheed</a><script data-card-contents-for-user="26139071" type="text/json">{"id":26139071,"first_name":"Abimbola","last_name":"Rasheed","domain_name":"eksu","page_name":"AbimbolaRasheed","display_name":"Abimbola Rasheed","profile_url":"https://eksu.academia.edu/AbimbolaRasheed?f_ri=1660","photo":"https://0.academia-photos.com/26139071/11118483/12407957/s65_abimbola.rasheed.jpg_oh_bc0ab9b7c55fa7e24025083c5355f6ff_oe_57142590"}</script></span></span></li><li class="js-paper-rank-work_19989953 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19989953"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19989953, container: ".js-paper-rank-work_19989953", }); });</script></li><li class="js-percentile-work_19989953 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19989953; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19989953"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19989953 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19989953"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19989953; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19989953]").text(description); $(".js-view-count-work_19989953").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19989953").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19989953"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="106" rel="nofollow" href="https://www.academia.edu/Documents/in/Religion">Religion</a>,&nbsp;<script data-card-contents-for-ri="106" type="text/json">{"id":106,"name":"Religion","url":"https://www.academia.edu/Documents/in/Religion?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2592" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>,&nbsp;<script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a><script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19989953]'), work: {"id":19989953,"title":"TERRORISM AND POLITICAL STABILITY IN AFRICA : A CASE STUDY OF THE BOKO HARAM INSURGENCY","created_at":"2016-01-03T16:29:52.237-08:00","url":"https://www.academia.edu/19989953/TERRORISM_AND_POLITICAL_STABILITY_IN_AFRICA_A_CASE_STUDY_OF_THE_BOKO_HARAM_INSURGENCY?f_ri=1660","dom_id":"work_19989953","summary":"The frequent Boko Haram insurgences in the North-Eastern part of the country is still the latest act of terrorism in the country. The tactics, strategies and mode of operations adopted by these terrorists are similar and professional in line with terrorist ideologies and practices found elsewhere around the world. The ugly phenomenon of terrorism has dented the image and credibility Nigeria among other nations of the world.","downloadable_attachments":[{"id":40947441,"asset_id":19989953,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26139071,"first_name":"Abimbola","last_name":"Rasheed","domain_name":"eksu","page_name":"AbimbolaRasheed","display_name":"Abimbola Rasheed","profile_url":"https://eksu.academia.edu/AbimbolaRasheed?f_ri=1660","photo":"https://0.academia-photos.com/26139071/11118483/12407957/s65_abimbola.rasheed.jpg_oh_bc0ab9b7c55fa7e24025083c5355f6ff_oe_57142590"}],"research_interests":[{"id":106,"name":"Religion","url":"https://www.academia.edu/Documents/in/Religion?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=1660","nofollow":true},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660","nofollow":true},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=1660"},{"id":21318,"name":"Nigeria","url":"https://www.academia.edu/Documents/in/Nigeria?f_ri=1660"},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=1660"},{"id":271833,"name":"Boko Haram","url":"https://www.academia.edu/Documents/in/Boko_Haram?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_72178766" data-work_id="72178766" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/72178766/The_Linkages_Between_Democracy_Terrorism_and_Foreign_Direct_Investments_in_Developed_and_Developing_Countries">The Linkages Between Democracy, Terrorism and Foreign Direct Investments in Developed and Developing Countries</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In this study, the linkages between political dynamics and foreign direct investment inwards to 118 developed and developing countries over the 2002-2017 period were analysed by the System GMM Panel Model to avoid the potential... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_72178766" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In this study, the linkages between political dynamics and foreign direct investment inwards to 118 developed and developing countries over the 2002-2017 period were analysed by the System GMM Panel Model to avoid the potential endogeneity problem. Findings indicate that the most vital positive determinant of FDI inwards is trade liberalization or trade openness. Also, there is no statistically significant relationship between countries&#39; democratization and freedom level and FDI inwards. However, terrorism hinders FDI directly, especially in developed countries. Therefore, the decision of foreign investors might mainly depend on economic dynamics, which are related to them and host countries rather than politics.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/72178766" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="74d1c8ce1dbb7758b438ac672f2102ff" rel="nofollow" data-download="{&quot;attachment_id&quot;:81211394,&quot;asset_id&quot;:72178766,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/81211394/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19266361" href="https://ikc.academia.edu/Necmettin%C3%87elik">Necmettin Çelik</a><script data-card-contents-for-user="19266361" type="text/json">{"id":19266361,"first_name":"Necmettin","last_name":"Çelik","domain_name":"ikc","page_name":"NecmettinÇelik","display_name":"Necmettin Çelik","profile_url":"https://ikc.academia.edu/Necmettin%C3%87elik?f_ri=1660","photo":"https://0.academia-photos.com/19266361/5372070/19496439/s65_necmettin._elik.jpg"}</script></span></span></li><li class="js-paper-rank-work_72178766 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="72178766"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 72178766, container: ".js-paper-rank-work_72178766", }); });</script></li><li class="js-percentile-work_72178766 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 72178766; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_72178766"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_72178766 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="72178766"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 72178766; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=72178766]").text(description); $(".js-view-count-work_72178766").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_72178766").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="72178766"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="17123" rel="nofollow" href="https://www.academia.edu/Documents/in/Democracy">Democracy</a>,&nbsp;<script data-card-contents-for-ri="17123" type="text/json">{"id":17123,"name":"Democracy","url":"https://www.academia.edu/Documents/in/Democracy?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="21973" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Rights">Political Rights</a>,&nbsp;<script data-card-contents-for-ri="21973" type="text/json">{"id":21973,"name":"Political Rights","url":"https://www.academia.edu/Documents/in/Political_Rights?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="102715" rel="nofollow" href="https://www.academia.edu/Documents/in/Civil_liberties">Civil liberties</a><script data-card-contents-for-ri="102715" type="text/json">{"id":102715,"name":"Civil liberties","url":"https://www.academia.edu/Documents/in/Civil_liberties?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=72178766]'), work: {"id":72178766,"title":"The Linkages Between Democracy, Terrorism and Foreign Direct Investments in Developed and Developing Countries","created_at":"2022-02-21T23:15:47.517-08:00","url":"https://www.academia.edu/72178766/The_Linkages_Between_Democracy_Terrorism_and_Foreign_Direct_Investments_in_Developed_and_Developing_Countries?f_ri=1660","dom_id":"work_72178766","summary":"In this study, the linkages between political dynamics and foreign direct investment inwards to 118 developed and developing countries over the 2002-2017 period were analysed by the System GMM Panel Model to avoid the potential endogeneity problem. Findings indicate that the most vital positive determinant of FDI inwards is trade liberalization or trade openness. Also, there is no statistically significant relationship between countries' democratization and freedom level and FDI inwards. However, terrorism hinders FDI directly, especially in developed countries. Therefore, the decision of foreign investors might mainly depend on economic dynamics, which are related to them and host countries rather than politics.","downloadable_attachments":[{"id":81211394,"asset_id":72178766,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":19266361,"first_name":"Necmettin","last_name":"Çelik","domain_name":"ikc","page_name":"NecmettinÇelik","display_name":"Necmettin Çelik","profile_url":"https://ikc.academia.edu/Necmettin%C3%87elik?f_ri=1660","photo":"https://0.academia-photos.com/19266361/5372070/19496439/s65_necmettin._elik.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":17123,"name":"Democracy","url":"https://www.academia.edu/Documents/in/Democracy?f_ri=1660","nofollow":true},{"id":21973,"name":"Political Rights","url":"https://www.academia.edu/Documents/in/Political_Rights?f_ri=1660","nofollow":true},{"id":102715,"name":"Civil liberties","url":"https://www.academia.edu/Documents/in/Civil_liberties?f_ri=1660","nofollow":true},{"id":161235,"name":"Foreign Direct Investment ( FDI )","url":"https://www.academia.edu/Documents/in/Foreign_Direct_Investment_FDI_-1?f_ri=1660"},{"id":863823,"name":"system GMM","url":"https://www.academia.edu/Documents/in/system_GMM?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39085999" data-work_id="39085999" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39085999/Understanding_the_Rising_Cult_of_the_Suicide_Bomber">Understanding the Rising Cult of the Suicide Bomber</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Although suicide attacks have been carried out for hundreds of years, suicide bombings have only been a permanent feature of conflicts since the 1980s. In recent years, though, their use has dramatically escalated. AOAV, which collects... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39085999" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Although suicide attacks have been carried out for hundreds of years, suicide bombings have only been a permanent feature of conflicts since the 1980s. In recent years, though, their use has dramatically escalated. AOAV, which collects data on explosive violence, has recorded a total of 1,191 suicide bombings globally between 2011 and 2015, resulting in 31,477 civilian deaths and injuries.<br /><br />The vast majority of suicide bombings within these years have been carried out by international Salafi-Jihadi terrorist organisations.<br /><br />In light of this, AOAV’s extensive report Understanding the rising cult of the suicide bomber investigates what makes individuals give their lives, and take others, for causes propagated by these transnational terrorist groups.<br /><br />It also looks at what effect such attacks have had on local and regional conflicts, as well as on the communities exposed to them.<br /><br />Furthermore, the report proposes how states and other actors in the international community might seek to prevent their use and further escalation based on the reports’ findings.<br /><br />The report is based on extensive field-work, as well as a thorough mapping and investigation of specific suicide bombings and the individuals that perpetrated them.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39085999" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e84006d1b96b4be0b55191abee842a5b" rel="nofollow" data-download="{&quot;attachment_id&quot;:59203352,&quot;asset_id&quot;:39085999,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59203352/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="74453470" href="https://soas-uk.academia.edu/KhalilDewan">Khalil Dewan</a><script data-card-contents-for-user="74453470" type="text/json">{"id":74453470,"first_name":"Khalil","last_name":"Dewan","domain_name":"soas-uk","page_name":"KhalilDewan","display_name":"Khalil Dewan","profile_url":"https://soas-uk.academia.edu/KhalilDewan?f_ri=1660","photo":"https://0.academia-photos.com/74453470/26759548/100709074/s65_khalil.dewan.jpeg"}</script></span></span></li><li class="js-paper-rank-work_39085999 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39085999"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39085999, container: ".js-paper-rank-work_39085999", }); });</script></li><li class="js-percentile-work_39085999 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39085999; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39085999"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39085999 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39085999"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39085999; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39085999]").text(description); $(".js-view-count-work_39085999").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39085999").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39085999"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1198" rel="nofollow" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>,&nbsp;<script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2015" rel="nofollow" href="https://www.academia.edu/Documents/in/Middle_East_Studies">Middle East Studies</a>,&nbsp;<script data-card-contents-for-ri="2015" type="text/json">{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2575" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Law">International Law</a><script data-card-contents-for-ri="2575" type="text/json">{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39085999]'), work: {"id":39085999,"title":"Understanding the Rising Cult of the Suicide Bomber","created_at":"2019-05-10T08:36:50.385-07:00","url":"https://www.academia.edu/39085999/Understanding_the_Rising_Cult_of_the_Suicide_Bomber?f_ri=1660","dom_id":"work_39085999","summary":"Although suicide attacks have been carried out for hundreds of years, suicide bombings have only been a permanent feature of conflicts since the 1980s. In recent years, though, their use has dramatically escalated. AOAV, which collects data on explosive violence, has recorded a total of 1,191 suicide bombings globally between 2011 and 2015, resulting in 31,477 civilian deaths and injuries.\n\nThe vast majority of suicide bombings within these years have been carried out by international Salafi-Jihadi terrorist organisations.\n\nIn light of this, AOAV’s extensive report Understanding the rising cult of the suicide bomber investigates what makes individuals give their lives, and take others, for causes propagated by these transnational terrorist groups.\n\nIt also looks at what effect such attacks have had on local and regional conflicts, as well as on the communities exposed to them.\n\nFurthermore, the report proposes how states and other actors in the international community might seek to prevent their use and further escalation based on the reports’ findings.\n\nThe report is based on extensive field-work, as well as a thorough mapping and investigation of specific suicide bombings and the individuals that perpetrated them.","downloadable_attachments":[{"id":59203352,"asset_id":39085999,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":74453470,"first_name":"Khalil","last_name":"Dewan","domain_name":"soas-uk","page_name":"KhalilDewan","display_name":"Khalil Dewan","profile_url":"https://soas-uk.academia.edu/KhalilDewan?f_ri=1660","photo":"https://0.academia-photos.com/74453470/26759548/100709074/s65_khalil.dewan.jpeg"}],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=1660","nofollow":true},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=1660","nofollow":true},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":30456,"name":"War on Terror","url":"https://www.academia.edu/Documents/in/War_on_Terror?f_ri=1660"},{"id":76752,"name":"Suicide Terrorism","url":"https://www.academia.edu/Documents/in/Suicide_Terrorism?f_ri=1660"},{"id":187415,"name":"NATO's New Strategic Concept","url":"https://www.academia.edu/Documents/in/NATOs_New_Strategic_Concept?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43523016" data-work_id="43523016" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43523016/D%C4%B0J%C4%B0TAL_MESAJLARDAN_C%C4%B0HAT%C3%87I_SAVA%C5%9E_ALANLARINA_I%C5%9E%C4%B0D%C4%B0N_YEN%C4%B0_MEDYA_KULLANIMI">DİJİTAL MESAJLARDAN CİHATÇI SAVAŞ ALANLARINA: IŞİD&#39;İN YENİ MEDYA KULLANIMI</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Dünyada ve ülkemizde terör yeni medya ilişkilerini inceleyen araştırmalarda nicel ve nitel yöntemler kullanılarak, belirlediği konular hakkında derinlikli bilgiler sunmuştur. Ancak örgütün bazı propaganda araçlarını dışarıda bırakmaları... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43523016" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Dünyada ve ülkemizde terör yeni medya ilişkilerini inceleyen araştırmalarda nicel ve nitel yöntemler kullanılarak, belirlediği konular hakkında derinlikli bilgiler sunmuştur. Ancak örgütün bazı propaganda araçlarını dışarıda bırakmaları nedeniyle büyük resme ilişkin bilgi verme konusunda yetersiz kalmaktadırlar. Bu çalışmada ile örgütün kullandığı tüm yeni medya araçlarını inceleyerek örgütün yeni medya kullanımı, iletişim stratejisi dijital yayınlar, videolar ve sosyal medya paylaşımları üzerinden bütünlüklü bir şekilde incelenmiştir. Böylelikle mecralar arasındaki ilişkiler ve benzerlikler ortaya konulabilmiştir.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43523016" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e83768db9d835f49de2fa906564266e2" rel="nofollow" data-download="{&quot;attachment_id&quot;:63833747,&quot;asset_id&quot;:43523016,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63833747/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="72967676" href="https://independent.academia.edu/Keskinkaya">Esma Keskinkaya</a><script data-card-contents-for-user="72967676" type="text/json">{"id":72967676,"first_name":"Esma","last_name":"Keskinkaya","domain_name":"independent","page_name":"Keskinkaya","display_name":"Esma Keskinkaya","profile_url":"https://independent.academia.edu/Keskinkaya?f_ri=1660","photo":"https://0.academia-photos.com/72967676/23022122/56380375/s65_esma.keskinkaya.jpeg"}</script></span></span></li><li class="js-paper-rank-work_43523016 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43523016"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43523016, container: ".js-paper-rank-work_43523016", }); });</script></li><li class="js-percentile-work_43523016 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43523016; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43523016"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43523016 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43523016"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43523016; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43523016]").text(description); $(".js-view-count-work_43523016").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43523016").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43523016"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="870" rel="nofollow" href="https://www.academia.edu/Documents/in/Visual_propaganda">Visual propaganda</a>,&nbsp;<script data-card-contents-for-ri="870" type="text/json">{"id":870,"name":"Visual propaganda","url":"https://www.academia.edu/Documents/in/Visual_propaganda?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a>,&nbsp;<script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1231865" rel="nofollow" href="https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant">Islamic State of Iraq and the Levant</a><script data-card-contents-for-ri="1231865" type="text/json">{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43523016]'), work: {"id":43523016,"title":"DİJİTAL MESAJLARDAN CİHATÇI SAVAŞ ALANLARINA: IŞİD'İN YENİ MEDYA KULLANIMI","created_at":"2020-07-05T06:54:12.613-07:00","url":"https://www.academia.edu/43523016/D%C4%B0J%C4%B0TAL_MESAJLARDAN_C%C4%B0HAT%C3%87I_SAVA%C5%9E_ALANLARINA_I%C5%9E%C4%B0D%C4%B0N_YEN%C4%B0_MEDYA_KULLANIMI?f_ri=1660","dom_id":"work_43523016","summary":" Dünyada ve ülkemizde terör yeni medya ilişkilerini inceleyen araştırmalarda nicel ve nitel yöntemler kullanılarak, belirlediği konular hakkında derinlikli bilgiler sunmuştur. Ancak örgütün bazı propaganda araçlarını dışarıda bırakmaları nedeniyle büyük resme ilişkin bilgi verme konusunda yetersiz kalmaktadırlar. Bu çalışmada ile örgütün kullandığı tüm yeni medya araçlarını inceleyerek örgütün yeni medya kullanımı, iletişim stratejisi dijital yayınlar, videolar ve sosyal medya paylaşımları üzerinden bütünlüklü bir şekilde incelenmiştir. Böylelikle mecralar arasındaki ilişkiler ve benzerlikler ortaya konulabilmiştir.","downloadable_attachments":[{"id":63833747,"asset_id":43523016,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":72967676,"first_name":"Esma","last_name":"Keskinkaya","domain_name":"independent","page_name":"Keskinkaya","display_name":"Esma Keskinkaya","profile_url":"https://independent.academia.edu/Keskinkaya?f_ri=1660","photo":"https://0.academia-photos.com/72967676/23022122/56380375/s65_esma.keskinkaya.jpeg"}],"research_interests":[{"id":870,"name":"Visual propaganda","url":"https://www.academia.edu/Documents/in/Visual_propaganda?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660","nofollow":true},{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40586997" data-work_id="40586997" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40586997/A_Threat_from_Within_Exploring_the_Link_between_the_Extreme_Right_and_the_Military">A Threat from Within? Exploring the Link between the Extreme Right and the Military</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Right-wing violence and terrorism have slowly gained more academic and public attention in recent years, with an increase in anti-immigration and anti-government organised violence from the extreme right in most Western countries. Some... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_40586997" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Right-wing violence and terrorism have slowly gained more academic and public attention in recent years, with an increase in anti-immigration and anti-government organised violence from the extreme right in most Western countries. Some evidence exists that right-wing extremists have attempted to infiltrate the military in their home countries to gain access to tactical training, weapons, and to recruit highly skilled new members. Research about the extent and impact of extreme right-wing links to the military is, however, scarce. In addition to the lack of insight into potential right-wing (or other forms of) extremism problems in the military, most armed forces have not developed effective countering violent extremism (CVE) tools. In this way, the incorporation of CVE in the military lags far behind the use of CVE in other aspects of counter-terrorism in the West. As the military, next to the police and intelligence, is a critical part of a country’s security infrastructure, it must also include specially designed mechanisms to protect it from infiltration and abuse from violent extremists and those planning terrorist activities. This Policy Brief will discuss available knowledge about extreme right-wing links to the military in Germany, the United Kingdom, Canada, and the United States. It will conclude by formulating concrete recommendations for handling this potential threat.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40586997" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ab80dad8a7fb2887f2a230803887788f" rel="nofollow" data-download="{&quot;attachment_id&quot;:60866692,&quot;asset_id&quot;:40586997,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/60866692/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="23877933" href="https://girds.academia.edu/DanielKoehler">Daniel Koehler</a><script data-card-contents-for-user="23877933" type="text/json">{"id":23877933,"first_name":"Daniel","last_name":"Koehler","domain_name":"girds","page_name":"DanielKoehler","display_name":"Daniel Koehler","profile_url":"https://girds.academia.edu/DanielKoehler?f_ri=1660","photo":"https://0.academia-photos.com/23877933/7927117/8880666/s65_daniel.koehler.jpg_oh_9bdd216420bf3f57341690a40288a113_oe_5571020a___gda___1434043715_d4f01b509ed4eb1fc11a00159d66c487"}</script></span></span></li><li class="js-paper-rank-work_40586997 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40586997"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40586997, container: ".js-paper-rank-work_40586997", }); });</script></li><li class="js-percentile-work_40586997 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40586997; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40586997"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40586997 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40586997"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40586997; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40586997]").text(description); $(".js-view-count-work_40586997").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40586997").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40586997"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9450" rel="nofollow" href="https://www.academia.edu/Documents/in/Radicalization">Radicalization</a>,&nbsp;<script data-card-contents-for-ri="9450" type="text/json">{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="19087" rel="nofollow" href="https://www.academia.edu/Documents/in/Military_and_Politics">Military and Politics</a><script data-card-contents-for-ri="19087" type="text/json">{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40586997]'), work: {"id":40586997,"title":"A Threat from Within? Exploring the Link between the Extreme Right and the Military","created_at":"2019-10-10T23:45:47.284-07:00","url":"https://www.academia.edu/40586997/A_Threat_from_Within_Exploring_the_Link_between_the_Extreme_Right_and_the_Military?f_ri=1660","dom_id":"work_40586997","summary":"Right-wing violence and terrorism have slowly gained more academic and public attention in recent years, with an increase in anti-immigration and anti-government organised violence from the extreme right in most Western countries. Some evidence exists that right-wing extremists have attempted to infiltrate the military in their home countries to gain access to tactical training, weapons, and to recruit highly skilled new members. Research about the extent and impact of extreme right-wing links to the military is, however, scarce. In addition to the lack of insight into potential right-wing (or other forms of) extremism problems in the military, most armed forces have not developed effective countering violent extremism (CVE) tools. In this way, the incorporation of CVE in the military lags far behind the use of CVE in other aspects of counter-terrorism in the West. As the military, next to the police and intelligence, is a critical part of a country’s security infrastructure, it must also include specially designed mechanisms to protect it from infiltration and abuse from violent extremists and those planning terrorist activities. This Policy Brief will discuss available knowledge about extreme right-wing links to the military in Germany, the United Kingdom, Canada, and the United States. It will conclude by formulating concrete recommendations for handling this potential threat. ","downloadable_attachments":[{"id":60866692,"asset_id":40586997,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":23877933,"first_name":"Daniel","last_name":"Koehler","domain_name":"girds","page_name":"DanielKoehler","display_name":"Daniel Koehler","profile_url":"https://girds.academia.edu/DanielKoehler?f_ri=1660","photo":"https://0.academia-photos.com/23877933/7927117/8880666/s65_daniel.koehler.jpg_oh_9bdd216420bf3f57341690a40288a113_oe_5571020a___gda___1434043715_d4f01b509ed4eb1fc11a00159d66c487"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=1660","nofollow":true},{"id":20478,"name":"Right Wing Terrorism","url":"https://www.academia.edu/Documents/in/Right_Wing_Terrorism?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":39946,"name":"Military","url":"https://www.academia.edu/Documents/in/Military?f_ri=1660"},{"id":461890,"name":"Countering Violent Extremism","url":"https://www.academia.edu/Documents/in/Countering_Violent_Extremism?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_60124985" data-work_id="60124985" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/60124985/K%C3%BCrdistan_%C4%B0%C5%9F%C3%A7i_Partisi_PKK_Partiya_Karkeren_Kurdistane_">Kürdistan İşçi Partisi (PKK-Partiya Karkeren Kurdistane)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Türkiye, uzun yıllardan beridir çeşitli ideolojilerde ve yapılarda terör örgütleriyle çeşitli yoğunluklarda mücadele etmiş ve etmeye devam eden bir ülkedir. Kürdistan İşçi Partisinin de (PKK- Partîya Karkerên Kurdistanê) bu terör... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_60124985" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Türkiye, uzun yıllardan beridir çeşitli ideolojilerde ve yapılarda terör örgütleriyle çeşitli yoğunluklarda mücadele etmiş ve etmeye devam eden bir ülkedir. Kürdistan İşçi Partisinin de (PKK- Partîya Karkerên Kurdistanê) bu terör örgütlerinin başında geldiği bilinmektedir. Ayrıca ülkeye maddi ve manevi anlamda verdiği zararlar çok büyük boyutlara ulaşmıştır. Bir terör örgütü olarak PKK, eylemlerinde silahlı yöntemlerin yanı sıra bu eylemleri ge-niş kitlelere ulaştırma, meşruiyet iddiasını sağlamlaştırma ve ele-man temini amacıyla yoğun biçimde propaganda faaliyetleri de yürütmektedir. Özellikle XXI. yüzyıl bağlamında terör örgütleri-nin propagandayı bir mücadele yöntemi olarak benimseme eğili-minin gün geçtikçe artış göstermesiyle PKK da propaganda uygu-lamalarını sürekli genişletmiş ve çeşitlendirmiştir.<br />Çalışmanın sonucunda hem Türkiye‟nin<br />hem de PKK‟nın propaganda dili, söylemi ve uygulamalarının<br />2000‟li yıllarda değişim gösterdiği, propagandanın giderek iki taraf<br />için de önem kazandığı savlanmaktadır. Son olarak da çalışmada,<br />Türkiye‟nin terörle mücadelede benimsediği propaganda yöntemleri<br />ve uygulamalarıyla PKK‟nın propaganda uygulamaları karşılaştırılmakta,<br />tespit ve önerilere yer verilmektedir.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/60124985" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="293a37a97e5047143ec3b3a9adda13fd" rel="nofollow" data-download="{&quot;attachment_id&quot;:74023281,&quot;asset_id&quot;:60124985,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/74023281/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="29328019" href="https://inonu.academia.edu/UmutTurgutY%C4%B1ld%C4%B1r%C4%B1m">Umut Turgut Yıldırım</a><script data-card-contents-for-user="29328019" type="text/json">{"id":29328019,"first_name":"Umut Turgut","last_name":"Yıldırım","domain_name":"inonu","page_name":"UmutTurgutYıldırım","display_name":"Umut Turgut Yıldırım","profile_url":"https://inonu.academia.edu/UmutTurgutY%C4%B1ld%C4%B1r%C4%B1m?f_ri=1660","photo":"https://0.academia-photos.com/29328019/8387730/163748243/s65_umut_turgut.y_ld_r_m.jpg"}</script></span></span></li><li class="js-paper-rank-work_60124985 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="60124985"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 60124985, container: ".js-paper-rank-work_60124985", }); });</script></li><li class="js-percentile-work_60124985 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 60124985; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_60124985"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_60124985 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="60124985"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 60124985; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=60124985]").text(description); $(".js-view-count-work_60124985").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_60124985").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="60124985"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>,&nbsp;<script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="933" rel="nofollow" href="https://www.academia.edu/Documents/in/New_Media">New Media</a>,&nbsp;<script data-card-contents-for-ri="933" type="text/json">{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2869" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a><script data-card-contents-for-ri="2869" type="text/json">{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=60124985]'), work: {"id":60124985,"title":"Kürdistan İşçi Partisi (PKK-Partiya Karkeren Kurdistane)","created_at":"2021-10-27T02:04:11.606-07:00","url":"https://www.academia.edu/60124985/K%C3%BCrdistan_%C4%B0%C5%9F%C3%A7i_Partisi_PKK_Partiya_Karkeren_Kurdistane_?f_ri=1660","dom_id":"work_60124985","summary":"Türkiye, uzun yıllardan beridir çeşitli ideolojilerde ve yapılarda terör örgütleriyle çeşitli yoğunluklarda mücadele etmiş ve etmeye devam eden bir ülkedir. Kürdistan İşçi Partisinin de (PKK- Partîya Karkerên Kurdistanê) bu terör örgütlerinin başında geldiği bilinmektedir. Ayrıca ülkeye maddi ve manevi anlamda verdiği zararlar çok büyük boyutlara ulaşmıştır. Bir terör örgütü olarak PKK, eylemlerinde silahlı yöntemlerin yanı sıra bu eylemleri ge-niş kitlelere ulaştırma, meşruiyet iddiasını sağlamlaştırma ve ele-man temini amacıyla yoğun biçimde propaganda faaliyetleri de yürütmektedir. Özellikle XXI. yüzyıl bağlamında terör örgütleri-nin propagandayı bir mücadele yöntemi olarak benimseme eğili-minin gün geçtikçe artış göstermesiyle PKK da propaganda uygu-lamalarını sürekli genişletmiş ve çeşitlendirmiştir.\nÇalışmanın sonucunda hem Türkiye‟nin\nhem de PKK‟nın propaganda dili, söylemi ve uygulamalarının\n2000‟li yıllarda değişim gösterdiği, propagandanın giderek iki taraf\niçin de önem kazandığı savlanmaktadır. Son olarak da çalışmada,\nTürkiye‟nin terörle mücadelede benimsediği propaganda yöntemleri\nve uygulamalarıyla PKK‟nın propaganda uygulamaları karşılaştırılmakta,\ntespit ve önerilere yer verilmektedir.","downloadable_attachments":[{"id":74023281,"asset_id":60124985,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":29328019,"first_name":"Umut Turgut","last_name":"Yıldırım","domain_name":"inonu","page_name":"UmutTurgutYıldırım","display_name":"Umut Turgut Yıldırım","profile_url":"https://inonu.academia.edu/UmutTurgutY%C4%B1ld%C4%B1r%C4%B1m?f_ri=1660","photo":"https://0.academia-photos.com/29328019/8387730/163748243/s65_umut_turgut.y_ld_r_m.jpg"}],"research_interests":[{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=1660","nofollow":true},{"id":3356,"name":"Propaganda","url":"https://www.academia.edu/Documents/in/Propaganda?f_ri=1660"},{"id":5548,"name":"Kurdish Studies","url":"https://www.academia.edu/Documents/in/Kurdish_Studies?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":6099,"name":"Propaganda Systems In Media","url":"https://www.academia.edu/Documents/in/Propaganda_Systems_In_Media?f_ri=1660"},{"id":8673,"name":"Digital Media \u0026 Learning","url":"https://www.academia.edu/Documents/in/Digital_Media_and_Learning?f_ri=1660"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660"},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=1660"},{"id":15899,"name":"Kurdish Question in Turkey","url":"https://www.academia.edu/Documents/in/Kurdish_Question_in_Turkey?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":91202,"name":"Terrorism and media","url":"https://www.academia.edu/Documents/in/Terrorism_and_media?f_ri=1660"},{"id":272505,"name":"Medya ve İletişim","url":"https://www.academia.edu/Documents/in/Medya_ve_Iletisim?f_ri=1660"},{"id":280789,"name":"Terör örgütü Pkk","url":"https://www.academia.edu/Documents/in/Teror_orgutu_Pkk?f_ri=1660"},{"id":350619,"name":"Türkiye'de terör","url":"https://www.academia.edu/Documents/in/Turkiyede_teror?f_ri=1660"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=1660"},{"id":1146403,"name":"New Media Technologies and Terrorism","url":"https://www.academia.edu/Documents/in/New_Media_Technologies_and_Terrorism?f_ri=1660"},{"id":1247348,"name":"Terör Ve Propaganda","url":"https://www.academia.edu/Documents/in/Teror_Ve_Propaganda?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23205164" data-work_id="23205164" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23205164/Il_caso_Moro_negli_atti_del_Ministero_per_la_sicurezza_di_Stato_della_Repubblica_democratica_tedesca">Il caso Moro negli atti del Ministero per la sicurezza di Stato della Repubblica democratica tedesca</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The goal of this work is to describe the relations and contacts between the most representative italian left wing terror group and the East Germany intelligence service at the time of the kidnapping of Aldo Moro, one of the most... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_23205164" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The goal of this work is to describe the relations and contacts between the most representative italian left wing terror group and the East Germany intelligence service at the time of the kidnapping of Aldo Moro, one of the most investigated crimes in the italian 70&#39;s.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23205164" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0054714fc70eb4d2a3d5253b33aa3f41" rel="nofollow" data-download="{&quot;attachment_id&quot;:43693275,&quot;asset_id&quot;:23205164,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/43693275/download_file?st=MTc0MDU5NjU2NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8277709" href="https://uniroma1.academia.edu/marcobruni">marco bruni</a><script data-card-contents-for-user="8277709" type="text/json">{"id":8277709,"first_name":"marco","last_name":"bruni","domain_name":"uniroma1","page_name":"marcobruni","display_name":"marco bruni","profile_url":"https://uniroma1.academia.edu/marcobruni?f_ri=1660","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_23205164 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23205164"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23205164, container: ".js-paper-rank-work_23205164", }); });</script></li><li class="js-percentile-work_23205164 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23205164; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23205164"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23205164 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23205164"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23205164; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23205164]").text(description); $(".js-view-count-work_23205164").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23205164").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23205164"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">12</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1720" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1720" type="text/json">{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" rel="nofollow" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>,&nbsp;<script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3516" rel="nofollow" href="https://www.academia.edu/Documents/in/Contemporary_History">Contemporary History</a><script data-card-contents-for-ri="3516" type="text/json">{"id":3516,"name":"Contemporary History","url":"https://www.academia.edu/Documents/in/Contemporary_History?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23205164]'), work: {"id":23205164,"title":"Il caso Moro negli atti del Ministero per la sicurezza di Stato della Repubblica democratica tedesca","created_at":"2016-03-13T14:38:12.273-07:00","url":"https://www.academia.edu/23205164/Il_caso_Moro_negli_atti_del_Ministero_per_la_sicurezza_di_Stato_della_Repubblica_democratica_tedesca?f_ri=1660","dom_id":"work_23205164","summary":"The goal of this work is to describe the relations and contacts between the most representative italian left wing terror group and the East Germany intelligence service at the time of the kidnapping of Aldo Moro, one of the most investigated crimes in the italian 70's.","downloadable_attachments":[{"id":43693275,"asset_id":23205164,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8277709,"first_name":"marco","last_name":"bruni","domain_name":"uniroma1","page_name":"marcobruni","display_name":"marco bruni","profile_url":"https://uniroma1.academia.edu/marcobruni?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1660","nofollow":true},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1660","nofollow":true},{"id":3516,"name":"Contemporary History","url":"https://www.academia.edu/Documents/in/Contemporary_History?f_ri=1660","nofollow":true},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=1660"},{"id":19963,"name":"New Left","url":"https://www.academia.edu/Documents/in/New_Left?f_ri=1660"},{"id":45213,"name":"Italy","url":"https://www.academia.edu/Documents/in/Italy?f_ri=1660"},{"id":86600,"name":"East Germany","url":"https://www.academia.edu/Documents/in/East_Germany?f_ri=1660"},{"id":172993,"name":"CIA","url":"https://www.academia.edu/Documents/in/CIA?f_ri=1660"},{"id":185478,"name":"Aldo Moro","url":"https://www.academia.edu/Documents/in/Aldo_Moro?f_ri=1660"},{"id":427288,"name":"Kgb","url":"https://www.academia.edu/Documents/in/Kgb?f_ri=1660"},{"id":2023778,"name":"Stasi; Ministerium für Staatssicherheit; DDR","url":"https://www.academia.edu/Documents/in/Stasi_Ministerium_f%C3%BCr_Staatssicherheit_DDR?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19861746" data-work_id="19861746" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19861746/From_SOCMINT_to_Digital_Humint_Re_frame_the_use_of_social_media_within_the_Intelligence_Cycle">From SOCMINT to Digital Humint. Re-frame the use of social media within the Intelligence Cycle</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19861746" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b4237cbffade07a709e92524618a4664" rel="nofollow" data-download="{&quot;attachment_id&quot;:40885357,&quot;asset_id&quot;:19861746,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40885357/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="40664300" href="https://unicat.academia.edu/AlessandroBurato">Alessandro Burato</a><script data-card-contents-for-user="40664300" type="text/json">{"id":40664300,"first_name":"Alessandro","last_name":"Burato","domain_name":"unicat","page_name":"AlessandroBurato","display_name":"Alessandro Burato","profile_url":"https://unicat.academia.edu/AlessandroBurato?f_ri=1660","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_19861746 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19861746"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19861746, container: ".js-paper-rank-work_19861746", }); });</script></li><li class="js-percentile-work_19861746 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19861746; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19861746"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19861746 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19861746"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19861746; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19861746]").text(description); $(".js-view-count-work_19861746").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19861746").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19861746"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1237" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Sciences">Social Sciences</a>,&nbsp;<script data-card-contents-for-ri="1237" type="text/json">{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" rel="nofollow" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>,&nbsp;<script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a><script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19861746]'), work: {"id":19861746,"title":"From SOCMINT to Digital Humint. Re-frame the use of social media within the Intelligence Cycle","created_at":"2015-12-28T00:27:11.894-08:00","url":"https://www.academia.edu/19861746/From_SOCMINT_to_Digital_Humint_Re_frame_the_use_of_social_media_within_the_Intelligence_Cycle?f_ri=1660","dom_id":"work_19861746","summary":null,"downloadable_attachments":[{"id":40885357,"asset_id":19861746,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":40664300,"first_name":"Alessandro","last_name":"Burato","domain_name":"unicat","page_name":"AlessandroBurato","display_name":"Alessandro Burato","profile_url":"https://unicat.academia.edu/AlessandroBurato?f_ri=1660","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1660","nofollow":true},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_29367688" data-work_id="29367688" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/29367688/Making_Sense_of_Turkish_Mainstream_Media_Identity_Foreign_Policy_and_Change">Making Sense of Turkish Mainstream Media: Identity, Foreign Policy, and Change</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In the reputed work Securitization: A New Framework for Analysis (Buzan, Wæver, &amp; de Wilde, 1998), the Copenhagen School theoreticians indicated that the media sector might not offer the correct answers in surveying the nexus between... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_29367688" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In the reputed work Securitization: A New Framework for Analysis (Buzan, Wæver, &amp; de Wilde, 1998), the Copenhagen School theoreticians indicated that the media sector might not offer the correct answers in surveying the nexus between governments’ manoeuvres and sociopolitical developments because it is not easy to determine the principal goals of the sector. Nonetheless, they agreed that media is apt to be exploited as a threat “manufacturing” tool (Buzan et al., 1998, pp. 88–89; Sheafer &amp; Dvir-Gvirsman, 2010, p. 212), even though it does not control the urgency levels of issues without the will of governments<br />(Hass, 2009, p. 83). The Copenhagen School also claims that securitization theory, which examines the relationship between security threats and political discourses, might have better practicability for peripheral researchers than other critical approaches within security studies (Bilgin, 2011, p. 405). The reference point is that “peripheral scholars may be distrustful of the ways in which ‘security arguments’ are often (mis)used by rulers and elites for domestic purposes” (Bilgin, 2011, p. 403). Although this statement needs to be evaluated in another review, the Copenhagen School’s arguments of (mis)usage of security issues and exploitation of the media sector have been proven in Turkey’s everlasting dilemmas, which were revived by the Justice and Development Party (Turkish acronym AKP) after the nine years of desecuritization of Kurdish separatism and Bashar Assad as the old enemy.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/29367688" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="80a8bd5b252a8a25cb6c19da28df3f24" rel="nofollow" data-download="{&quot;attachment_id&quot;:49810594,&quot;asset_id&quot;:29367688,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/49810594/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6643818" href="https://iue.academia.edu/UmutCanAd%C4%B1s%C3%B6nmez">Umut Can Adısönmez</a><script data-card-contents-for-user="6643818" type="text/json">{"id":6643818,"first_name":"Umut Can","last_name":"Adısönmez","domain_name":"iue","page_name":"UmutCanAdısönmez","display_name":"Umut Can Adısönmez","profile_url":"https://iue.academia.edu/UmutCanAd%C4%B1s%C3%B6nmez?f_ri=1660","photo":"https://0.academia-photos.com/6643818/2861358/162864411/s65_umut_can.ad_s_nmez.jpg"}</script></span></span></li><li class="js-paper-rank-work_29367688 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="29367688"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 29367688, container: ".js-paper-rank-work_29367688", }); });</script></li><li class="js-percentile-work_29367688 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 29367688; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_29367688"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_29367688 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="29367688"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 29367688; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=29367688]").text(description); $(".js-view-count-work_29367688").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_29367688").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="29367688"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">14</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="94" rel="nofollow" href="https://www.academia.edu/Documents/in/Discourse_Analysis">Discourse Analysis</a>,&nbsp;<script data-card-contents-for-ri="94" type="text/json">{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>,&nbsp;<script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="972" rel="nofollow" href="https://www.academia.edu/Documents/in/Self_and_Identity">Self and Identity</a>,&nbsp;<script data-card-contents-for-ri="972" type="text/json">{"id":972,"name":"Self and Identity","url":"https://www.academia.edu/Documents/in/Self_and_Identity?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1483" rel="nofollow" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a><script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=29367688]'), work: {"id":29367688,"title":"Making Sense of Turkish Mainstream Media: Identity, Foreign Policy, and Change","created_at":"2016-10-23T09:19:04.648-07:00","url":"https://www.academia.edu/29367688/Making_Sense_of_Turkish_Mainstream_Media_Identity_Foreign_Policy_and_Change?f_ri=1660","dom_id":"work_29367688","summary":"In the reputed work Securitization: A New Framework for Analysis (Buzan, Wæver, \u0026 de Wilde, 1998), the Copenhagen School theoreticians indicated that the media sector might not offer the correct answers in surveying the nexus between governments’ manoeuvres and sociopolitical developments because it is not easy to determine the principal goals of the sector. Nonetheless, they agreed that media is apt to be exploited as a threat “manufacturing” tool (Buzan et al., 1998, pp. 88–89; Sheafer \u0026 Dvir-Gvirsman, 2010, p. 212), even though it does not control the urgency levels of issues without the will of governments\n(Hass, 2009, p. 83). The Copenhagen School also claims that securitization theory, which examines the relationship between security threats and political discourses, might have better practicability for peripheral researchers than other critical approaches within security studies (Bilgin, 2011, p. 405). The reference point is that “peripheral scholars may be distrustful of the ways in which ‘security arguments’ are often (mis)used by rulers and elites for domestic purposes” (Bilgin, 2011, p. 403). Although this statement needs to be evaluated in another review, the Copenhagen School’s arguments of (mis)usage of security issues and exploitation of the media sector have been proven in Turkey’s everlasting dilemmas, which were revived by the Justice and Development Party (Turkish acronym AKP) after the nine years of desecuritization of Kurdish separatism and Bashar Assad as the old enemy.\n","downloadable_attachments":[{"id":49810594,"asset_id":29367688,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6643818,"first_name":"Umut Can","last_name":"Adısönmez","domain_name":"iue","page_name":"UmutCanAdısönmez","display_name":"Umut Can Adısönmez","profile_url":"https://iue.academia.edu/UmutCanAd%C4%B1s%C3%B6nmez?f_ri=1660","photo":"https://0.academia-photos.com/6643818/2861358/162864411/s65_umut_can.ad_s_nmez.jpg"}],"research_interests":[{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=1660","nofollow":true},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=1660","nofollow":true},{"id":972,"name":"Self and Identity","url":"https://www.academia.edu/Documents/in/Self_and_Identity?f_ri=1660","nofollow":true},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":8700,"name":"Turkish and Middle East Studies","url":"https://www.academia.edu/Documents/in/Turkish_and_Middle_East_Studies?f_ri=1660"},{"id":10422,"name":"National Identity","url":"https://www.academia.edu/Documents/in/National_Identity?f_ri=1660"},{"id":10633,"name":"Critical Discourse Analysis","url":"https://www.academia.edu/Documents/in/Critical_Discourse_Analysis?f_ri=1660"},{"id":12809,"name":"Middle Eastern Studies","url":"https://www.academia.edu/Documents/in/Middle_Eastern_Studies?f_ri=1660"},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization?f_ri=1660"},{"id":17717,"name":"Turkish Foreign Policy","url":"https://www.academia.edu/Documents/in/Turkish_Foreign_Policy?f_ri=1660"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1660"},{"id":95023,"name":"Ontological Security","url":"https://www.academia.edu/Documents/in/Ontological_Security?f_ri=1660"},{"id":806713,"name":"Turkey and Syria Crisis","url":"https://www.academia.edu/Documents/in/Turkey_and_Syria_Crisis?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23617415" data-work_id="23617415" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23617415/2015_Fouad_Why_young_people_from_Europe_join_violent_Islamist_groups_Multiple_causes_and_common_misperceptions">2015-Fouad-Why young people from Europe join violent Islamist groups – Multiple causes and common misperceptions</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">My conference paper written for the conference &quot;Youths and Radical Groups from the Perspective of Youths&quot; organized by the Arab Forum for Alternatives and the Rosa-Luxemburg Foundation, which took place in beirut 22-24 December 2015.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23617415" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0d417ff4bcf47806e6d46f085c457db0" rel="nofollow" data-download="{&quot;attachment_id&quot;:44032345,&quot;asset_id&quot;:23617415,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/44032345/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1667957" href="https://independent.academia.edu/hazimfouad1984">Hazim Fouad</a><script data-card-contents-for-user="1667957" type="text/json">{"id":1667957,"first_name":"Hazim","last_name":"Fouad","domain_name":"independent","page_name":"hazimfouad1984","display_name":"Hazim Fouad","profile_url":"https://independent.academia.edu/hazimfouad1984?f_ri=1660","photo":"https://0.academia-photos.com/1667957/6529706/28201483/s65_hazim.fouad.jpg"}</script></span></span></li><li class="js-paper-rank-work_23617415 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23617415"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23617415, container: ".js-paper-rank-work_23617415", }); });</script></li><li class="js-percentile-work_23617415 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23617415; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23617415"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23617415 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23617415"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23617415; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23617415]").text(description); $(".js-view-count-work_23617415").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23617415").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23617415"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9450" rel="nofollow" href="https://www.academia.edu/Documents/in/Radicalization">Radicalization</a>,&nbsp;<script data-card-contents-for-ri="9450" type="text/json">{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="88513" rel="nofollow" href="https://www.academia.edu/Documents/in/Salafism">Salafism</a>,&nbsp;<script data-card-contents-for-ri="88513" type="text/json">{"id":88513,"name":"Salafism","url":"https://www.academia.edu/Documents/in/Salafism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="316672" rel="nofollow" href="https://www.academia.edu/Documents/in/Foreign_Fighters">Foreign Fighters</a><script data-card-contents-for-ri="316672" type="text/json">{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23617415]'), work: {"id":23617415,"title":"2015-Fouad-Why young people from Europe join violent Islamist groups – Multiple causes and common misperceptions","created_at":"2016-03-23T08:12:22.745-07:00","url":"https://www.academia.edu/23617415/2015_Fouad_Why_young_people_from_Europe_join_violent_Islamist_groups_Multiple_causes_and_common_misperceptions?f_ri=1660","dom_id":"work_23617415","summary":"My conference paper written for the conference \"Youths and Radical Groups from the Perspective of Youths\" organized by the Arab Forum for Alternatives and the Rosa-Luxemburg Foundation, which took place in beirut 22-24 December 2015.","downloadable_attachments":[{"id":44032345,"asset_id":23617415,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1667957,"first_name":"Hazim","last_name":"Fouad","domain_name":"independent","page_name":"hazimfouad1984","display_name":"Hazim Fouad","profile_url":"https://independent.academia.edu/hazimfouad1984?f_ri=1660","photo":"https://0.academia-photos.com/1667957/6529706/28201483/s65_hazim.fouad.jpg"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1660","nofollow":true},{"id":88513,"name":"Salafism","url":"https://www.academia.edu/Documents/in/Salafism?f_ri=1660","nofollow":true},{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters?f_ri=1660","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34772621" data-work_id="34772621" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/34772621/The_Anger_Manual_to_Help_Reduce_Anger_in_Society_social_change_download_">The Anger Manual to Help Reduce Anger in Society (social change download)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">People abused by angry discipline as children, may tend to abuse or overly punish other people or themselves for perceived wrongs in their adult life. In some individuals, aggressive personality traits may be genetically inherited. The... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34772621" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">People abused by angry discipline as children, may tend to abuse or overly punish other people or themselves for perceived wrongs in their adult life. In some individuals, aggressive personality traits may be genetically inherited. The aggressive personality may feel weakened by having guidelines or boundaries for anger. Anger is a normal human emotion, and these guidelines can help express anger in a healthy way.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34772621" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7defb60260c38a7879d088a705f54f54" rel="nofollow" data-download="{&quot;attachment_id&quot;:65224746,&quot;asset_id&quot;:34772621,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65224746/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="345752" href="https://collegemhc.academia.edu/DanielKeeran">Daniel M Keeran MSW</a><script data-card-contents-for-user="345752" type="text/json">{"id":345752,"first_name":"Daniel","last_name":"Keeran MSW","domain_name":"collegemhc","page_name":"DanielKeeran","display_name":"Daniel M Keeran MSW","profile_url":"https://collegemhc.academia.edu/DanielKeeran?f_ri=1660","photo":"https://0.academia-photos.com/345752/94042/30134256/s65_daniel.keeran_msw.jpg"}</script></span></span></li><li class="js-paper-rank-work_34772621 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34772621"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34772621, container: ".js-paper-rank-work_34772621", }); });</script></li><li class="js-percentile-work_34772621 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34772621; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34772621"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34772621 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34772621"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34772621; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34772621]").text(description); $(".js-view-count-work_34772621").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34772621").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34772621"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">170</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="29" rel="nofollow" href="https://www.academia.edu/Documents/in/Industrial_And_Labor_Relations">Industrial And Labor Relations</a>,&nbsp;<script data-card-contents-for-ri="29" type="text/json">{"id":29,"name":"Industrial And Labor Relations","url":"https://www.academia.edu/Documents/in/Industrial_And_Labor_Relations?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="32" rel="nofollow" href="https://www.academia.edu/Documents/in/Organizational_Behavior">Organizational Behavior</a>,&nbsp;<script data-card-contents-for-ri="32" type="text/json">{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="38" rel="nofollow" href="https://www.academia.edu/Documents/in/Management">Management</a>,&nbsp;<script data-card-contents-for-ri="38" type="text/json">{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="188" rel="nofollow" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a><script data-card-contents-for-ri="188" type="text/json">{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34772621]'), work: {"id":34772621,"title":"The Anger Manual to Help Reduce Anger in Society (social change download)","created_at":"2017-10-05T07:36:07.398-07:00","url":"https://www.academia.edu/34772621/The_Anger_Manual_to_Help_Reduce_Anger_in_Society_social_change_download_?f_ri=1660","dom_id":"work_34772621","summary":"People abused by angry discipline as children, may tend to abuse or overly punish other people or themselves for perceived wrongs in their adult life. In some individuals, aggressive personality traits may be genetically inherited. The aggressive personality may feel weakened by having guidelines or boundaries for anger. Anger is a normal human emotion, and these guidelines can help express anger in a healthy way.","downloadable_attachments":[{"id":65224746,"asset_id":34772621,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":345752,"first_name":"Daniel","last_name":"Keeran MSW","domain_name":"collegemhc","page_name":"DanielKeeran","display_name":"Daniel M Keeran MSW","profile_url":"https://collegemhc.academia.edu/DanielKeeran?f_ri=1660","photo":"https://0.academia-photos.com/345752/94042/30134256/s65_daniel.keeran_msw.jpg"}],"research_interests":[{"id":29,"name":"Industrial And Labor Relations","url":"https://www.academia.edu/Documents/in/Industrial_And_Labor_Relations?f_ri=1660","nofollow":true},{"id":32,"name":"Organizational Behavior","url":"https://www.academia.edu/Documents/in/Organizational_Behavior?f_ri=1660","nofollow":true},{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1660","nofollow":true},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=1660","nofollow":true},{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1660"},{"id":206,"name":"Social Change","url":"https://www.academia.edu/Documents/in/Social_Change?f_ri=1660"},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1660"},{"id":226,"name":"Clinical Psychology","url":"https://www.academia.edu/Documents/in/Clinical_Psychology?f_ri=1660"},{"id":230,"name":"Cognitive Behavioral Therapy","url":"https://www.academia.edu/Documents/in/Cognitive_Behavioral_Therapy?f_ri=1660"},{"id":235,"name":"Psychodrama","url":"https://www.academia.edu/Documents/in/Psychodrama?f_ri=1660"},{"id":236,"name":"Cognitive Psychology","url":"https://www.academia.edu/Documents/in/Cognitive_Psychology?f_ri=1660"},{"id":240,"name":"Organizational Psychology","url":"https://www.academia.edu/Documents/in/Organizational_Psychology?f_ri=1660"},{"id":242,"name":"Personality Psychology","url":"https://www.academia.edu/Documents/in/Personality_Psychology?f_ri=1660"},{"id":243,"name":"Positive Psychology","url":"https://www.academia.edu/Documents/in/Positive_Psychology?f_ri=1660"},{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1660"},{"id":254,"name":"Emotion","url":"https://www.academia.edu/Documents/in/Emotion?f_ri=1660"},{"id":260,"name":"Health Psychology","url":"https://www.academia.edu/Documents/in/Health_Psychology?f_ri=1660"},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=1660"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1660"},{"id":523,"name":"Chemistry","url":"https://www.academia.edu/Documents/in/Chemistry?f_ri=1660"},{"id":535,"name":"Criminal Law","url":"https://www.academia.edu/Documents/in/Criminal_Law-1?f_ri=1660"},{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=1660"},{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=1660"},{"id":588,"name":"Nursing","url":"https://www.academia.edu/Documents/in/Nursing?f_ri=1660"},{"id":595,"name":"Medical Sciences","url":"https://www.academia.edu/Documents/in/Medical_Sciences?f_ri=1660"},{"id":635,"name":"Psychiatry","url":"https://www.academia.edu/Documents/in/Psychiatry?f_ri=1660"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=1660"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=1660"},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=1660"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=1660"},{"id":907,"name":"Moral Psychology","url":"https://www.academia.edu/Documents/in/Moral_Psychology?f_ri=1660"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=1660"},{"id":931,"name":"Interpersonal Communication","url":"https://www.academia.edu/Documents/in/Interpersonal_Communication?f_ri=1660"},{"id":940,"name":"Social Work","url":"https://www.academia.edu/Documents/in/Social_Work?f_ri=1660"},{"id":953,"name":"Rhetoric","url":"https://www.academia.edu/Documents/in/Rhetoric?f_ri=1660"},{"id":956,"name":"Organizational Communication","url":"https://www.academia.edu/Documents/in/Organizational_Communication?f_ri=1660"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=1660"},{"id":961,"name":"Health Communication","url":"https://www.academia.edu/Documents/in/Health_Communication?f_ri=1660"},{"id":981,"name":"Health Promotion","url":"https://www.academia.edu/Documents/in/Health_Promotion?f_ri=1660"},{"id":1011,"name":"Library Science","url":"https://www.academia.edu/Documents/in/Library_Science?f_ri=1660"},{"id":1052,"name":"Atheism","url":"https://www.academia.edu/Documents/in/Atheism?f_ri=1660"},{"id":1060,"name":"Legal Education","url":"https://www.academia.edu/Documents/in/Legal_Education?f_ri=1660"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=1660"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1660"},{"id":1302,"name":"Theology","url":"https://www.academia.edu/Documents/in/Theology?f_ri=1660"},{"id":1320,"name":"Marital Dysfunction","url":"https://www.academia.edu/Documents/in/Marital_Dysfunction?f_ri=1660"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=1660"},{"id":2065,"name":"Research Methodology","url":"https://www.academia.edu/Documents/in/Research_Methodology?f_ri=1660"},{"id":2073,"name":"Anger","url":"https://www.academia.edu/Documents/in/Anger?f_ri=1660"},{"id":2722,"name":"Arabic Language and Linguistics","url":"https://www.academia.edu/Documents/in/Arabic_Language_and_Linguistics?f_ri=1660"},{"id":2827,"name":"Mental Health","url":"https://www.academia.edu/Documents/in/Mental_Health?f_ri=1660"},{"id":2919,"name":"Organizational Culture","url":"https://www.academia.edu/Documents/in/Organizational_Culture?f_ri=1660"},{"id":2969,"name":"Leadership","url":"https://www.academia.edu/Documents/in/Leadership?f_ri=1660"},{"id":3127,"name":"Industrial and Organizational Psychology","url":"https://www.academia.edu/Documents/in/Industrial_and_Organizational_Psychology?f_ri=1660"},{"id":3815,"name":"Spirituality","url":"https://www.academia.edu/Documents/in/Spirituality?f_ri=1660"},{"id":4175,"name":"Talmud","url":"https://www.academia.edu/Documents/in/Talmud?f_ri=1660"},{"id":4455,"name":"Medical Education","url":"https://www.academia.edu/Documents/in/Medical_Education?f_ri=1660"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1660"},{"id":4713,"name":"Personal Relationships","url":"https://www.academia.edu/Documents/in/Personal_Relationships?f_ri=1660"},{"id":4941,"name":"Marriage \u0026 Family Therapy","url":"https://www.academia.edu/Documents/in/Marriage_and_Family_Therapy?f_ri=1660"},{"id":5659,"name":"Self Harm","url":"https://www.academia.edu/Documents/in/Self_Harm?f_ri=1660"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660"},{"id":5993,"name":"Bosnia","url":"https://www.academia.edu/Documents/in/Bosnia?f_ri=1660"},{"id":6021,"name":"Cancer","url":"https://www.academia.edu/Documents/in/Cancer?f_ri=1660"},{"id":6416,"name":"Human Resource Management","url":"https://www.academia.edu/Documents/in/Human_Resource_Management?f_ri=1660"},{"id":6535,"name":"Psychiatric \u0026 Mental Health Nursing","url":"https://www.academia.edu/Documents/in/Psychiatric_and_Mental_Health_Nursing?f_ri=1660"},{"id":6728,"name":"Philosophy Of Law","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Law?f_ri=1660"},{"id":6810,"name":"Public Health Policy","url":"https://www.academia.edu/Documents/in/Public_Health_Policy?f_ri=1660"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1660"},{"id":7535,"name":"Borderline Personality Disorder","url":"https://www.academia.edu/Documents/in/Borderline_Personality_Disorder?f_ri=1660"},{"id":8655,"name":"Psychopathology","url":"https://www.academia.edu/Documents/in/Psychopathology?f_ri=1660"},{"id":8981,"name":"Suicide","url":"https://www.academia.edu/Documents/in/Suicide?f_ri=1660"},{"id":8982,"name":"Suicide (Psychology)","url":"https://www.academia.edu/Documents/in/Suicide_Psychology_?f_ri=1660"},{"id":9040,"name":"Consciousness","url":"https://www.academia.edu/Documents/in/Consciousness?f_ri=1660"},{"id":9366,"name":"Spiritual Formation","url":"https://www.academia.edu/Documents/in/Spiritual_Formation?f_ri=1660"},{"id":9581,"name":"The Self","url":"https://www.academia.edu/Documents/in/The_Self?f_ri=1660"},{"id":9707,"name":"Diplomacy","url":"https://www.academia.edu/Documents/in/Diplomacy?f_ri=1660"},{"id":9729,"name":"Stress","url":"https://www.academia.edu/Documents/in/Stress?f_ri=1660"},{"id":9946,"name":"Stress Management","url":"https://www.academia.edu/Documents/in/Stress_Management?f_ri=1660"},{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=1660"},{"id":10666,"name":"Bullying","url":"https://www.academia.edu/Documents/in/Bullying?f_ri=1660"},{"id":10924,"name":"Optimization techniques","url":"https://www.academia.edu/Documents/in/Optimization_techniques?f_ri=1660"},{"id":11256,"name":"School Bullying","url":"https://www.academia.edu/Documents/in/School_Bullying?f_ri=1660"},{"id":12108,"name":"China","url":"https://www.academia.edu/Documents/in/China?f_ri=1660"},{"id":12890,"name":"Moral Development","url":"https://www.academia.edu/Documents/in/Moral_Development?f_ri=1660"},{"id":13222,"name":"Customer Relationship Management (CRM)","url":"https://www.academia.edu/Documents/in/Customer_Relationship_Management_CRM_?f_ri=1660"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution?f_ri=1660"},{"id":14305,"name":"Industrial Engineering","url":"https://www.academia.edu/Documents/in/Industrial_Engineering?f_ri=1660"},{"id":14406,"name":"Health","url":"https://www.academia.edu/Documents/in/Health?f_ri=1660"},{"id":15866,"name":"Islam","url":"https://www.academia.edu/Documents/in/Islam?f_ri=1660"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=1660"},{"id":16442,"name":"Sexual Assault","url":"https://www.academia.edu/Documents/in/Sexual_Assault?f_ri=1660"},{"id":17580,"name":"Human Resources","url":"https://www.academia.edu/Documents/in/Human_Resources?f_ri=1660"},{"id":17969,"name":"Health Policy","url":"https://www.academia.edu/Documents/in/Health_Policy?f_ri=1660"},{"id":18373,"name":"Moral Philosophy","url":"https://www.academia.edu/Documents/in/Moral_Philosophy?f_ri=1660"},{"id":19422,"name":"Social Work Education","url":"https://www.academia.edu/Documents/in/Social_Work_Education?f_ri=1660"},{"id":20013,"name":"Parent Child Relationships","url":"https://www.academia.edu/Documents/in/Parent_Child_Relationships?f_ri=1660"},{"id":20471,"name":"Leadership Development","url":"https://www.academia.edu/Documents/in/Leadership_Development?f_ri=1660"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3?f_ri=1660"},{"id":21360,"name":"Somalia","url":"https://www.academia.edu/Documents/in/Somalia?f_ri=1660"},{"id":21559,"name":"Health Care Management","url":"https://www.academia.edu/Documents/in/Health_Care_Management?f_ri=1660"},{"id":22198,"name":"Secondary Education","url":"https://www.academia.edu/Documents/in/Secondary_Education?f_ri=1660"},{"id":22221,"name":"Criminal Psychology","url":"https://www.academia.edu/Documents/in/Criminal_Psychology?f_ri=1660"},{"id":22237,"name":"Psychopathy","url":"https://www.academia.edu/Documents/in/Psychopathy?f_ri=1660"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=1660"},{"id":25411,"name":"Peace Education","url":"https://www.academia.edu/Documents/in/Peace_Education?f_ri=1660"},{"id":25992,"name":"Adolescent Education (Education)","url":"https://www.academia.edu/Documents/in/Adolescent_Education_Education_?f_ri=1660"},{"id":26445,"name":"Judaism","url":"https://www.academia.edu/Documents/in/Judaism?f_ri=1660"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1660"},{"id":28015,"name":"Couple Therapy","url":"https://www.academia.edu/Documents/in/Couple_Therapy?f_ri=1660"},{"id":29997,"name":"Organized Labor","url":"https://www.academia.edu/Documents/in/Organized_Labor?f_ri=1660"},{"id":31281,"name":"Debate","url":"https://www.academia.edu/Documents/in/Debate?f_ri=1660"},{"id":31848,"name":"Labor unions","url":"https://www.academia.edu/Documents/in/Labor_unions?f_ri=1660"},{"id":32572,"name":"Sudan","url":"https://www.academia.edu/Documents/in/Sudan?f_ri=1660"},{"id":35705,"name":"Social Networking Sites and Teenagers","url":"https://www.academia.edu/Documents/in/Social_Networking_Sites_and_Teenagers?f_ri=1660"},{"id":35960,"name":"Narcissistic Personality Disorder","url":"https://www.academia.edu/Documents/in/Narcissistic_Personality_Disorder?f_ri=1660"},{"id":37905,"name":"Counseling","url":"https://www.academia.edu/Documents/in/Counseling?f_ri=1660"},{"id":41734,"name":"Teenagers","url":"https://www.academia.edu/Documents/in/Teenagers?f_ri=1660"},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=1660"},{"id":42097,"name":"Customer Behaviour","url":"https://www.academia.edu/Documents/in/Customer_Behaviour?f_ri=1660"},{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=1660"},{"id":44273,"name":"Antisocial Personality Disorder","url":"https://www.academia.edu/Documents/in/Antisocial_Personality_Disorder?f_ri=1660"},{"id":44944,"name":"Death Penalty","url":"https://www.academia.edu/Documents/in/Death_Penalty?f_ri=1660"},{"id":45085,"name":"Anger Management","url":"https://www.academia.edu/Documents/in/Anger_Management?f_ri=1660"},{"id":45578,"name":"Peacebuilding","url":"https://www.academia.edu/Documents/in/Peacebuilding?f_ri=1660"},{"id":45739,"name":"Sales Management","url":"https://www.academia.edu/Documents/in/Sales_Management?f_ri=1660"},{"id":47098,"name":"Clinical Social Work","url":"https://www.academia.edu/Documents/in/Clinical_Social_Work?f_ri=1660"},{"id":48044,"name":"Greece","url":"https://www.academia.edu/Documents/in/Greece?f_ri=1660"},{"id":51618,"name":"Prisons","url":"https://www.academia.edu/Documents/in/Prisons?f_ri=1660"},{"id":53848,"name":"Social Control","url":"https://www.academia.edu/Documents/in/Social_Control?f_ri=1660"},{"id":53889,"name":"Industrial Psychology","url":"https://www.academia.edu/Documents/in/Industrial_Psychology?f_ri=1660"},{"id":54489,"name":"Newspapers","url":"https://www.academia.edu/Documents/in/Newspapers?f_ri=1660"},{"id":64633,"name":"Society","url":"https://www.academia.edu/Documents/in/Society?f_ri=1660"},{"id":75964,"name":"Boundaries","url":"https://www.academia.edu/Documents/in/Boundaries?f_ri=1660"},{"id":78630,"name":"Serbia","url":"https://www.academia.edu/Documents/in/Serbia?f_ri=1660"},{"id":82174,"name":"University","url":"https://www.academia.edu/Documents/in/University?f_ri=1660"},{"id":82732,"name":"Aggression","url":"https://www.academia.edu/Documents/in/Aggression?f_ri=1660"},{"id":85930,"name":"High School","url":"https://www.academia.edu/Documents/in/High_School?f_ri=1660"},{"id":86507,"name":"Nursing Education","url":"https://www.academia.edu/Documents/in/Nursing_Education?f_ri=1660"},{"id":94901,"name":"Health and Social Care","url":"https://www.academia.edu/Documents/in/Health_and_Social_Care?f_ri=1660"},{"id":97763,"name":"Cognitive Behavioural therapy","url":"https://www.academia.edu/Documents/in/Cognitive_Behavioural_therapy?f_ri=1660"},{"id":102300,"name":"Debates","url":"https://www.academia.edu/Documents/in/Debates?f_ri=1660"},{"id":120607,"name":"Non violence","url":"https://www.academia.edu/Documents/in/Non_violence?f_ri=1660"},{"id":136928,"name":"Criminal profiling","url":"https://www.academia.edu/Documents/in/Criminal_profiling?f_ri=1660"},{"id":141325,"name":"Industrial and LAbour relations","url":"https://www.academia.edu/Documents/in/Industrial_and_LAbour_relations?f_ri=1660"},{"id":154791,"name":"Rabbinic Judaism","url":"https://www.academia.edu/Documents/in/Rabbinic_Judaism?f_ri=1660"},{"id":159607,"name":"Riots","url":"https://www.academia.edu/Documents/in/Riots?f_ri=1660"},{"id":163068,"name":"Cognitive-Behavioral Therapy","url":"https://www.academia.edu/Documents/in/Cognitive-Behavioral_Therapy?f_ri=1660"},{"id":179010,"name":"Natural Sciences","url":"https://www.academia.edu/Documents/in/Natural_Sciences?f_ri=1660"},{"id":200264,"name":"South Sudan","url":"https://www.academia.edu/Documents/in/South_Sudan?f_ri=1660"},{"id":235465,"name":"Guidelines","url":"https://www.academia.edu/Documents/in/Guidelines?f_ri=1660"},{"id":241361,"name":"Social Issues","url":"https://www.academia.edu/Documents/in/Social_Issues?f_ri=1660"},{"id":303009,"name":"Antifascism","url":"https://www.academia.edu/Documents/in/Antifascism?f_ri=1660"},{"id":330431,"name":"Incarceration","url":"https://www.academia.edu/Documents/in/Incarceration?f_ri=1660"},{"id":368373,"name":"Employee Relations","url":"https://www.academia.edu/Documents/in/Employee_Relations?f_ri=1660"},{"id":369326,"name":"Anger Expression","url":"https://www.academia.edu/Documents/in/Anger_Expression?f_ri=1660"},{"id":384208,"name":"Breaking News","url":"https://www.academia.edu/Documents/in/Breaking_News?f_ri=1660"},{"id":399111,"name":"Anger Expression Styles","url":"https://www.academia.edu/Documents/in/Anger_Expression_Styles?f_ri=1660"},{"id":516321,"name":"Marrital conflict in Todays family","url":"https://www.academia.edu/Documents/in/Marrital_conflict_in_Todays_family?f_ri=1660"},{"id":516948,"name":"DSM-5","url":"https://www.academia.edu/Documents/in/DSM-5?f_ri=1660"},{"id":582257,"name":"Hostility","url":"https://www.academia.edu/Documents/in/Hostility?f_ri=1660"},{"id":601581,"name":"News Analysis","url":"https://www.academia.edu/Documents/in/News_Analysis?f_ri=1660"},{"id":700977,"name":"Inpatient Psychiatric Hospitals","url":"https://www.academia.edu/Documents/in/Inpatient_Psychiatric_Hospitals?f_ri=1660"},{"id":838783,"name":"Rehabilitating Offenders","url":"https://www.academia.edu/Documents/in/Rehabilitating_Offenders?f_ri=1660"},{"id":976222,"name":"Acute Inpatient Psychiatric Units","url":"https://www.academia.edu/Documents/in/Acute_Inpatient_Psychiatric_Units?f_ri=1660"},{"id":977581,"name":"Inpatient Psychiatry","url":"https://www.academia.edu/Documents/in/Inpatient_Psychiatry?f_ri=1660"},{"id":993689,"name":"Teen Suicide","url":"https://www.academia.edu/Documents/in/Teen_Suicide?f_ri=1660"},{"id":1232254,"name":"Obviousness","url":"https://www.academia.edu/Documents/in/Obviousness?f_ri=1660"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1470841" data-work_id="1470841" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1470841/Detecting_local_regions_of_change_in_high_dimensional_criminal_or_terrorist_point_processes">Detecting local regions of change in high-dimensional criminal or terrorist point processes</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">A method is presented for detecting changes to the distribution of a criminal or terrorist point process between two time periods using a non-model-based approach. By treating the criminal/terrorist point process as an intelligent site... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1470841" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">A method is presented for detecting changes to the distribution of a criminal or terrorist point process between two time periods using a non-model-based approach. By treating the criminal/terrorist point process as an intelligent site selection problem, changes to the process can signify changes in the behavior or activity level of the criminals/terrorists. The locations of past events and an associated vector of geographic, environmental, and socio-economic feature values are employed in the analysis. By modeling the locations of events in each time period as a marked point process, we can then detect differences in the intensity of each component process. A modified PRIM (patient rule induction method) is implemented to partition the high-dimensional feature space, which can include mixed variables, into the most likely change regions. Monte Carlo simulations are easily and quickly generated under random relabeling to test a scan statistic for significance. By detecting local regions of change, not only can it be determined if change has occurred in the study area, but the specific spatial regions where change occurs is also identified. An example is provided of breaking and entering crimes over two-time periods to demonstrate the use of this technique for detecting local regions of change. This methodology also applies to detecting regions of differences between two types of events such as in case–control data.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1470841" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7a257c047698bedbccc650084f5c5888" rel="nofollow" data-download="{&quot;attachment_id&quot;:11522524,&quot;asset_id&quot;:1470841,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/11522524/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1291984" href="https://virginia.academia.edu/MichaelDPorter">Michael D. Porter</a><script data-card-contents-for-user="1291984" type="text/json">{"id":1291984,"first_name":"Michael D.","last_name":"Porter","domain_name":"virginia","page_name":"MichaelDPorter","display_name":"Michael D. Porter","profile_url":"https://virginia.academia.edu/MichaelDPorter?f_ri=1660","photo":"https://0.academia-photos.com/1291984/475471/599034/s65_michael.porter.png"}</script></span></span></li><li class="js-paper-rank-work_1470841 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1470841"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1470841, container: ".js-paper-rank-work_1470841", }); });</script></li><li class="js-percentile-work_1470841 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1470841; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1470841"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1470841 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1470841"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1470841; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1470841]").text(description); $(".js-view-count-work_1470841").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1470841").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1470841"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1352" rel="nofollow" href="https://www.academia.edu/Documents/in/Multivariate_Statistics">Multivariate Statistics</a>,&nbsp;<script data-card-contents-for-ri="1352" type="text/json">{"id":1352,"name":"Multivariate Statistics","url":"https://www.academia.edu/Documents/in/Multivariate_Statistics?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9262" rel="nofollow" href="https://www.academia.edu/Documents/in/Crime_Science">Crime Science</a>,&nbsp;<script data-card-contents-for-ri="9262" type="text/json">{"id":9262,"name":"Crime Science","url":"https://www.academia.edu/Documents/in/Crime_Science?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="15397" rel="nofollow" href="https://www.academia.edu/Documents/in/Space-Time_Point_Processes">Space-Time Point Processes</a><script data-card-contents-for-ri="15397" type="text/json">{"id":15397,"name":"Space-Time Point Processes","url":"https://www.academia.edu/Documents/in/Space-Time_Point_Processes?f_ri=1660","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1470841]'), work: {"id":1470841,"title":"Detecting local regions of change in high-dimensional criminal or terrorist point processes","created_at":"2012-03-12T00:42:40.718-07:00","url":"https://www.academia.edu/1470841/Detecting_local_regions_of_change_in_high_dimensional_criminal_or_terrorist_point_processes?f_ri=1660","dom_id":"work_1470841","summary":"A method is presented for detecting changes to the distribution of a criminal or terrorist point process between two time periods using a non-model-based approach. By treating the criminal/terrorist point process as an intelligent site selection problem, changes to the process can signify changes in the behavior or activity level of the criminals/terrorists. The locations of past events and an associated vector of geographic, environmental, and socio-economic feature values are employed in the analysis. By modeling the locations of events in each time period as a marked point process, we can then detect differences in the intensity of each component process. A modified PRIM (patient rule induction method) is implemented to partition the high-dimensional feature space, which can include mixed variables, into the most likely change regions. Monte Carlo simulations are easily and quickly generated under random relabeling to test a scan statistic for significance. By detecting local regions of change, not only can it be determined if change has occurred in the study area, but the specific spatial regions where change occurs is also identified. An example is provided of breaking and entering crimes over two-time periods to demonstrate the use of this technique for detecting local regions of change. This methodology also applies to detecting regions of differences between two types of events such as in case–control data.","downloadable_attachments":[{"id":11522524,"asset_id":1470841,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1291984,"first_name":"Michael D.","last_name":"Porter","domain_name":"virginia","page_name":"MichaelDPorter","display_name":"Michael D. Porter","profile_url":"https://virginia.academia.edu/MichaelDPorter?f_ri=1660","photo":"https://0.academia-photos.com/1291984/475471/599034/s65_michael.porter.png"}],"research_interests":[{"id":1352,"name":"Multivariate Statistics","url":"https://www.academia.edu/Documents/in/Multivariate_Statistics?f_ri=1660","nofollow":true},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":9262,"name":"Crime Science","url":"https://www.academia.edu/Documents/in/Crime_Science?f_ri=1660","nofollow":true},{"id":15397,"name":"Space-Time Point Processes","url":"https://www.academia.edu/Documents/in/Space-Time_Point_Processes?f_ri=1660","nofollow":true},{"id":31349,"name":"Anomaly Detection","url":"https://www.academia.edu/Documents/in/Anomaly_Detection?f_ri=1660"},{"id":84291,"name":"Change detection","url":"https://www.academia.edu/Documents/in/Change_detection?f_ri=1660"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_28822733" data-work_id="28822733" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/28822733/MH370_THE_MALAYSIAN_AIRLINER_DUMP_docx">MH370 THE MALAYSIAN AIRLINER DUMP.docx</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Theory that the pilot did it.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/28822733" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="03ee728d9f51ec48e37ae30f8f6fd2f4" rel="nofollow" data-download="{&quot;attachment_id&quot;:49242572,&quot;asset_id&quot;:28822733,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/49242572/download_file?st=MTc0MDU5NjU2NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="30940600" href="https://independent.academia.edu/AJWeberman">AJ Weberman</a><script data-card-contents-for-user="30940600" type="text/json">{"id":30940600,"first_name":"AJ","last_name":"Weberman","domain_name":"independent","page_name":"AJWeberman","display_name":"AJ Weberman","profile_url":"https://independent.academia.edu/AJWeberman?f_ri=1660","photo":"https://gravatar.com/avatar/63eafec2a62b249cdb1a2339611f274a?s=65"}</script></span></span></li><li class="js-paper-rank-work_28822733 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="28822733"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 28822733, container: ".js-paper-rank-work_28822733", }); });</script></li><li class="js-percentile-work_28822733 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28822733; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_28822733"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_28822733 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="28822733"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28822733; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28822733]").text(description); $(".js-view-count-work_28822733").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_28822733").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="28822733"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1660" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>,&nbsp;<script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6818" rel="nofollow" href="https://www.academia.edu/Documents/in/Malaysia">Malaysia</a>,&nbsp;<script data-card-contents-for-ri="6818" type="text/json">{"id":6818,"name":"Malaysia","url":"https://www.academia.edu/Documents/in/Malaysia?f_ri=1660","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1436403" href="https://www.academia.edu/Documents/in/Mh370">Mh370</a><script data-card-contents-for-ri="1436403" type="text/json">{"id":1436403,"name":"Mh370","url":"https://www.academia.edu/Documents/in/Mh370?f_ri=1660","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=28822733]'), work: {"id":28822733,"title":"MH370 THE MALAYSIAN AIRLINER DUMP.docx","created_at":"2016-09-30T08:39:34.106-07:00","url":"https://www.academia.edu/28822733/MH370_THE_MALAYSIAN_AIRLINER_DUMP_docx?f_ri=1660","dom_id":"work_28822733","summary":"Theory that the pilot did it.","downloadable_attachments":[{"id":49242572,"asset_id":28822733,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":30940600,"first_name":"AJ","last_name":"Weberman","domain_name":"independent","page_name":"AJWeberman","display_name":"AJ Weberman","profile_url":"https://independent.academia.edu/AJWeberman?f_ri=1660","photo":"https://gravatar.com/avatar/63eafec2a62b249cdb1a2339611f274a?s=65"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1660","nofollow":true},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1660","nofollow":true},{"id":6818,"name":"Malaysia","url":"https://www.academia.edu/Documents/in/Malaysia?f_ri=1660","nofollow":true},{"id":1436403,"name":"Mh370","url":"https://www.academia.edu/Documents/in/Mh370?f_ri=1660","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Terrorism?after=50%2C28822733" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Terrorism?page=last">Last &raquo;</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="5686">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="5686">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Counter_terrorism">Counter terrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="26669">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="26669">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1720">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1720">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Middle_East_Studies">Middle East Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2015">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2015">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Violence">Political Violence</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="10342">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="10342">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Middle_East_Politics">Middle East Politics</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="18623">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="18623">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Security">International Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3705">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3705">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism">Political Extremism/Radicalism/Populism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="5847">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="5847">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Radicalization">Radicalization</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="9450">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="9450">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism">Terrorism and Counterterrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="761870">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="761870">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Terrorism" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "059b6fc9ea78412f6a2afa1b5dc5020c1c532264c625a14857a8b88607d5d4b5", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="zpLE-RTPGXoXiiqtrz6f3doTktza0OSH6eMEB74kj6aLdXCm-2vP6olxPJMbE7Wl0x1qqzcdRqzCiFT79eYY2Q" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Terrorism" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="19hjLZ8hwOQ3PPK_BUE8p3EhdwSd3_Lmzbq_qlnpVwqSP9dycIUWdKnH5IGxbBbfeC-Pc3ASUM3m0e9WEivAdQ" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10