Search results

1 – 10 of over 2000
Book part
Publication date: 11 September 2015

Jason Manning

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Abstract

Purpose

In this chapter, I apply theories of conflict and social control derived from the work of Donald Black to explain when suicide attacks will occur and who will carry them out.

Methodology/approach

Drawing on the published literature on suicide, suicide terrorism, and social control, I present a structural analysis of suicide attacks that specifies which configurations of social space and social time are most likely to produce them.

Findings

I propose that suicide attacks can be explained by structural patterns such as social distance, status inferiority, organization, and large movements of social time. Furthermore, sacrifice is greater among those who are socially marginal individuals whose locations are otherwise conducive to both partisanship and self-destruction.

Originality/value

I highlight structural similarities between suicide attacks and other forms of violence, social control, and suicide, thus contributing to the systemization of structural theories of human behavior and suggesting avenues for further study.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Article
Publication date: 16 August 2021

Ahmet Guler and Mustafa Demir

This study aims to examine the effect of the 9/11 terrorist attacks on suicide terrorism in different regions of the world and changes in the trends in suicide terrorism according…

Abstract

Purpose

This study aims to examine the effect of the 9/11 terrorist attacks on suicide terrorism in different regions of the world and changes in the trends in suicide terrorism according to regions before and after 9/11.

Design/methodology/approach

Using the data obtained from the Global Terrorism Database from 1981 to 2019, the descriptive statistics were computed first and then, independent samples t-tests were run to compare the monthly mean percentage of suicide-terrorism incidents that occurred in each region between the pre-9/11 and the post-9/11 periods. Finally, to statistically assess the effect of the 9/11 attacks and changes in the trends for the dependent variables over time, monthly interrupted time-series analyzes were conducted.

Findings

The results of monthly interrupted time series analyzes showed that after the 9/11 attacks, the trends for suicide-terrorism rates decreased significantly in three regions including South Asia, the Middle East and North Africa and Europe, while the trend for suicide-terrorism rates increased significantly in Sub-Saharan Africa. However, no statistically significant changes in the trends in suicide-terrorism rates occurred in three regions including North America, East Asia and Central Asia and Southeast Asia before 9/11, during November 2001 or after 9/11.

Originality/value

This study indicates the critical importance of the 9/11 terrorist attacks in suicide terrorism and its impact on these events in different regions of the world. The research also provides some recommendations concerning the effectiveness of defensive and offensive counterterrorism policies against suicide terrorism.

Details

Journal of Aggression, Conflict and Peace Research, vol. 13 no. 4
Type: Research Article
ISSN: 1759-6599

Keywords

Article
Publication date: 18 September 2017

Marissa Mandala and Joshua D. Freilich

The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The…

Abstract

Purpose

The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The authors set forth a series of hypotheses to explain successful and unsuccessful assassination incidents.

Design/methodology/approach

The authors use assassination data from the Global Terrorism Database from 1970 to 2014 to estimate a series binary logistic regression models.

Findings

Results indicate that various situational factors contribute to successful assassinations, such as target types, weapon types, total fatalities, and injuries.

Practical implications

These findings suggest that environmental criminology and SCP are valuable in developing prevention measures that thwart and disrupt attempted assassinations by terrorists.

Originality/value

Criminology has yet to apply environmental criminology and SCP to assassinations, a tactic often used by terrorists. This paper thus extends the existing assassination, terrorism, and criminology literature by applying this framework to assassinations performed by terrorists.

Details

Journal of Criminological Research, Policy and Practice, vol. 3 no. 3
Type: Research Article
ISSN: 2056-3841

Keywords

Article
Publication date: 1 April 2006

Sally Leivesley

To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.

510

Abstract

Purpose

To describe anticipatory risk as a fundamental pillar for a framework of international law in relation to global terrorism.

Design/methodology/approach

Economic terrorism and global terrorist transactions are used as a case study to demonstrate asymmetric financial crime and vulnerabilities of financial districts, economies and populations.

Findings

The act of anticipation of risk is quantifiable and imposes a duty to manage foreseeable catastrophic consequences. Such a duty in turn creates a proportionate reaction that can be recognised in law.

Practical implications

Recommendations are made for international discussions by jurists, global agreements through the United Nations and the G8 and for national laws, corporate governance standards and regulatory measures to become a seamless extension of the international framework.

Originality/value

Commercial law, criminal law and the international laws and conventions of war require a framework that defines foreseeability, catastrophic risk, uncertainty, adequacy and proportionality.

Details

Journal of Money Laundering Control, vol. 9 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 25 November 2014

Eric K. Stern, Edward Deverell, Fredrik Fors and Lindy Newlove-Eriksson

Taming the complexity of crisis and integrating diverse narratives and sources regarding crisis events is a serious challenge. The purpose of this paper is to present a…

Abstract

Purpose

Taming the complexity of crisis and integrating diverse narratives and sources regarding crisis events is a serious challenge. The purpose of this paper is to present a methodology for reconstructing, dissecting, and thematically comparing crisis experiences, using the 7/7 London bombings of 2005 as an illustrative empirical application.

Design/methodology/approach

A cognitive-institutional process-tracing methodology suitable compatible with structured focussed comparison of crisis cases (Stern and Sundelius, 2002; cf. George and Bennett, 2005) is used. This cognitive-institutional process tracing and analysis strategy consists of four steps: contextualization, development of a synthetic chronological narrative, identification and reconstruction of decision occasions, and (comparative) thematic analysis.

Findings

The paper demonstrates the feasibility of applying the methodology to real-world cases in the UK and concludes with reflections about the need for contextualized, systematic post mortem crisis analysis taking into account problem and process complexity, differential crisis performances of individuals and organizations under adverse conditions, and the increasing importance of social media and personal communications devices for crisis research and practice.

Practical implications

The methodology used in this paper has the potential to improve the effectiveness of organizational learning and reform efforts in the wake of crisis experiences.

Social implications

Insights associated with the application of this methodology can lead to improved post-crisis learning and fairer accountability processes, and thus contribute to enhancing societal resilience.

Originality/value

The study not only presents an original methodology developed by one of the authors, but also provides a systematic, relatively comprehensive and theoretically informed analysis of the July 7 London bombings based not only upon the documentary record, but also upon a substantial number of interviews.

Details

Journal of Organizational Effectiveness: People and Performance, vol. 1 no. 4
Type: Research Article
ISSN: 2051-6614

Keywords

Article
Publication date: 1 February 2013

Alexandros Paraskevas

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The…

4410

Abstract

Purpose

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The purpose of this paper is to propose a baseline strategy to address this threat.

Design/methodology/approach

Using the terrorist attack cycle and the security function models introduced in this paper, 19 hotel security experts, members of an international working group on terrorism, were tasked to reach consensus on a baseline anti‐terrorist strategy for a hotel. To reach this consensus, the study employed the Nominal Group Technique.

Findings

The study presents a six‐step baseline anti‐terrorism strategy and a series of measures and actions under each step. In the centre of this strategy lies the disruption of the terrorist attack cycle.

Research limitations/implications

There are limitations inherent to the Nominal Group Technique which may not allow the generalizability of the findings. However, every effort was made to ensure the reliability and validity of the study.

Practical implications

The study suggests a shift from physical protection alone to a more intelligence‐led approach. Counter‐surveillance, terrorist behavioral analysis, higher visibility of security measures, stronger relationships with local community leaders, collaborative relationships with emergency response agencies and strategic use of risk intelligence providers will have to take a higher place in the agendas of hotel security departments.

Originality/value

The paper presents, for the first time, two models that industry practitioners will find useful when designing security policies: the terrorist attack cycle and the security function model. Each component of the proposed strategy provides a starting point for the design of security strategies tailored on the security needs and budget of any hotel property.

Details

International Journal of Contemporary Hospitality Management, vol. 25 no. 1
Type: Research Article
ISSN: 0959-6119

Keywords

Abstract

Details

Police Responses to Islamist Violent Extremism and Terrorism
Type: Book
ISBN: 978-1-83797-845-8

Abstract

Details

Drones and the Law
Type: Book
ISBN: 978-1-80043-249-9

Book part
Publication date: 15 October 2005

Mark Juergensmeyer

All religious activists appear to look alike, and indeed are treated by the news media as one in the same. However, many variations exist. On one level, different activists choose…

Abstract

All religious activists appear to look alike, and indeed are treated by the news media as one in the same. However, many variations exist. On one level, different activists choose different tactics. Terrorism is only the most extreme (and the rarest) form of public action. Other activists utilize media campaigns, public intimidation and democratic choice (by putting forward candidates in elections). On a more basic level, great differences exist in the desired outcome of the struggle itself and in the degree to which religion is central to the conflict.

Details

Eurasia
Type: Book
ISBN: 978-1-84950-011-1

Expert briefing
Publication date: 1 March 2017

The militancy phenomenon.

1 – 10 of over 2000