Search results

1 – 10 of over 6000
Book part
Publication date: 21 June 2014

Kaisa Hinkkainen

An investigation of parallels between homegrown, international, and domestic terrorism.

Abstract

Purpose

An investigation of parallels between homegrown, international, and domestic terrorism.

Methodology/approach

A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.

Findings

Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.

Research limitations/implications

Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.

Originality/value

Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.

Article
Publication date: 9 January 2024

Kaitlyn DeGhetto

There is an extensive research stream devoted to evaluating host country political risk as it relates to foreign investment decisions, and in today’s geopolitical climate, this…

Abstract

Purpose

There is an extensive research stream devoted to evaluating host country political risk as it relates to foreign investment decisions, and in today’s geopolitical climate, this type of risk is becoming increasingly salient to business leaders. Despite notable advancements related to understanding the importance of government-related risk, inconsistent conceptualizations and findings remain. Thus, the purpose of this paper is to offer a comprehensive overview of how host country political risk has been conceptualized, measured and studied in relation to multinational enterprises' (MNEs’) investment decisions. After reviewing the relevant literature, five major aspects of non-violent (government type, public corruption, leadership change) and violent (armed conflict, terrorism) political risk were identified. The organization and review of each aspect of political risk provide insights on fruitful directions for future research, which are discussed.

Design/methodology/approach

To identify research articles on political risk and foreign investment, 13 leading management and international business journals were searched using relevant keywords (January 2000 to January 2023). Moreover, reviewing articles from these journals led to locating and reviewing additional relevant articles that the authors cited. Keyword searches were also conducted on Google Scholar and Web of Science in an effort to identify relevant articles outside of the 13 targeted journals.

Findings

Both violent and non-violent aspects of host country political risk have been studied in relation to MNEs' investment decisions. Specifically, five major aspects of host country political risk were identified (government type, public corruption, leadership change, armed conflict and terrorism). Although the general consensus is that risk related to the government often creates obstacles for MNEs, conceptualizations, measures and findings in prior research are not uniform.

Originality/value

This paper provides a comprehensive overview of host country political risk and foreign investment. In doing so, the aspects of political risk are identified, organized and overviewed.

Details

Cross Cultural & Strategic Management, vol. 31 no. 1
Type: Research Article
ISSN: 2059-5794

Keywords

Article
Publication date: 18 September 2017

Marissa Mandala and Joshua D. Freilich

The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The…

Abstract

Purpose

The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The authors set forth a series of hypotheses to explain successful and unsuccessful assassination incidents.

Design/methodology/approach

The authors use assassination data from the Global Terrorism Database from 1970 to 2014 to estimate a series binary logistic regression models.

Findings

Results indicate that various situational factors contribute to successful assassinations, such as target types, weapon types, total fatalities, and injuries.

Practical implications

These findings suggest that environmental criminology and SCP are valuable in developing prevention measures that thwart and disrupt attempted assassinations by terrorists.

Originality/value

Criminology has yet to apply environmental criminology and SCP to assassinations, a tactic often used by terrorists. This paper thus extends the existing assassination, terrorism, and criminology literature by applying this framework to assassinations performed by terrorists.

Details

Journal of Criminological Research, Policy and Practice, vol. 3 no. 3
Type: Research Article
ISSN: 2056-3841

Keywords

Book part
Publication date: 21 June 2014

Andrea Locatelli

The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the…

Abstract

Purpose

The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the necessity of developing definitions and classifications of this phenomenon.

Design methodology/approach

This chapter provides an overview of the literature on terrorism as a social/political phenomenon. It is therefore based on secondary sources.

Findings

While most literature on the topic finds it pointless or impossible to define terrorism, here we argue just the opposite. Common critiques of current definitions may be overcome by using multiple definitions and classifications.

Research limitations/implications

The chapter provides the methodological foundations for a comprehensive theoretical analysis of terrorism.

Originality/value of the chapter

The chapter applies insights from methodology of social sciences to the problem of defining terrorism.

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Keywords

Book part
Publication date: 11 September 2015

Brent L. Smith, Jeff Gruenewald, Paxton Roberts and Kelly R. Damphousse

In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how…

Abstract

Purpose

In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how precursor behaviors and attack characteristics of lone wolves are similar and different compared to those of group-based terrorists.

Methodology/approach

Based on data drawn from the American Terrorism Study (ATS), we examine 268 federal terrorism “indictees” linked to 264 incidents. Three types of loners are identified based on group affiliations and levels of assistance in preparing for and executing terrorist attacks. A series of analyses comparatively examine loners who had no assistance and those actors that did.

Findings

The results of this study suggest that lone wolf terrorists are more educated and socially isolated than group-based actors. Lone wolves also engage in less precursor activities than group actors, but are willing to travel greater distances to prepare for and execute attacks. Explanations for why lone wolves are able to “survive” longer than terrorist groups by avoiding arrest may in part stem from their ability to temporally and geospatially position their planning and preparatory activities.

Originality/value

Studies on lone wolf terrorism remain few and many are plagued by methodological and conceptual limitations. The current study adds to this growing literature by relying on lone wolf terrorism data recently made available by the American Terrorism Study (ATS). Our findings are valuable for members of the law enforcement and intelligence communities responsible for the early detection and prevention of lone wolf terrorism in the United States.

Details

Terrorism and Counterterrorism Today
Type: Book
ISBN: 978-1-78560-191-0

Keywords

Article
Publication date: 1 October 2002

Stephen Mixter and Michael Owendoff

The 11th September terrorist attacks on America continue to affect the corporate real estate industry, and this paper is intended to address a number of those ongoing effects. It…

Abstract

The 11th September terrorist attacks on America continue to affect the corporate real estate industry, and this paper is intended to address a number of those ongoing effects. It first discusses property insurance coverage in general and then proceeds to analyse whether damage from acts of terrorism is covered under pre‐11th September and post‐11th September property insurance polices. It also addresses the current status of proposed US Government intervention as a terrorism insurance backstop. It then describes the strategies which certain clients located within the areas directly affected by the terrorist attacks implemented in order to be able to gain immediate access to alternative space. Finally it examines selected lease clauses to which landlords and tenants should pay closer attention in light of the terrorist attacks, including operating expense provisions, force majeure provisions, waiver of subrogation provisions, use prohibitions and alteration provisions.

Article
Publication date: 6 November 2018

Jeff Gruenewald, Brent R. Klein, Grant Drawve, Brent L. Smith and Katie Ratcliff

The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is…

Abstract

Purpose

The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is designed to guide law enforcement in the collection and analysis of suspicious behaviors preceding serious crimes, including terrorist attacks.

Design/methodology/approach

Data on suspicious preoperational activities and terrorism incident outcomes in the USA between 1972 and 2013 come from the American Terrorism Study (ATS). Using a mixed-method approach, the authors conduct descriptive and multivariate analyses to examine the frequencies of the least and most prevalent suspicious activities (or SAR indicators) and how they predict the likelihood of terrorism prevention. In addition, the authors contextualize how configurations of SAR indicators are associated with the successful thwarting of terrorism incidents by law enforcement using an analytical method known as conjunctive analysis of case configurations (CACC).

Findings

The study reveals several key findings. First, certain behaviors categorized as suspicious, such as making threats, occur more frequently than others. Second, making threats, conducting surveillance and terrorist recruitment/financing predict law enforcement interdiction in terrorism plots, while misrepresentation (or the manufacturing and use of false documents) is more associated with terrorist success. Third, prevalent SAR indicators operate differently in the context of various combinations of suspicious activities to shape the likelihood for law enforcement interdiction.

Research limitations/implications

The current study’s findings may not be generalizable to other forms of violent extremism and terrorism outside of the USA.

Practical implications

This study illuminates opportunities for the NSI to provide law enforcement with the necessary tools to reduce terrorism risk and prevent future attacks.

Originality/value

To our knowledge, no scholarly work to date has assessed how observable behavioral indicators of suspicious preoperational activities affect the outcomes of terrorist plots.

Details

Policing: An International Journal, vol. 42 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 16 November 2012

D. Elaine Pressman and John Flockton

The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach…

3298

Abstract

Purpose

The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach proposed is referred to as the VERA 2 or violent extremism risk assessment protocol (Consultative Version 2).

Design/methodology/approach

A review of the knowledge base relating to risk assessment and risk assessment methodology was undertaken with a focus on relevance to individual terrorists and violent extremists. The need for a specific approach for the risk assessment of terrorists that differs from approaches used for ordinary violent criminals was identified. A model that could be used for the risk assessment of terrorists was identified with pertinent risk indicators. This was structured into a protocol referred to as the VERA (Consultative Version 2). The approach is intended to be applied to different types of violent extremists, terrorists and unlawful violent offenders motivated by religious, political or social ideologies.

Findings

First, risk assessments of adjudicated terrorists and violent extremists should be undertaken with risk indicators that are relevant to ideological motivated violence. Indicators used for ordinary common violence differ in substantive ways from those relevant to terrorists and therefore may have questionable relevance for the assessment of risk in terrorists. Second, it is possible to construct an evidence‐based risk assessment approach for the range of violent extremists and terrorists using a structured professional judgment approach with pertinent risk indicators. The VERA 2 is an example of this type of risk assessment protocol for terrorists and unlawful violent extremists.

Research limitations/implications

Risk assessment tools that have been developed for ordinary violent criminals and members of organised criminal gangs should be used with caution with terrorists, violent extremists and other perpetrators of ideologically motivated unlawful violence. Specific risk assessment approaches for terrorists with relevant indicators should be used. At this time, terrorist oriented approaches such as the VERA 2 are to be considered consultative and used as an add‐on to other established approaches.

Originality/value

There are few transparent, structured risk assessment approaches that use indicators specifically relevant to violent political extremists and terrorists. One new approach, the VERA 2 is outlined in the paper using risk indicators that differ in substantive ways from those used for other ordinary violent criminals.

Article
Publication date: 18 March 2024

Martin David Owens and Elizabeth Johnson

The paper aims to understand how state and non-state domestic terrorism impacts MNEs in foreign markets. Despite the burgeoning literature on terrorism within international…

Abstract

Purpose

The paper aims to understand how state and non-state domestic terrorism impacts MNEs in foreign markets. Despite the burgeoning literature on terrorism within international business (IB), most research has focused on international terrorism, or terrorism generally. Consequently, there has been limited research examining how domestic or local based terrorism impacts foreign firms.

Design/methodology/approach

This is a conceptual paper.

Findings

Domestic terrorism is the most common form of terrorism in the world today and involves the state and non-state actors. Non-state domestic terrorism can be low intensity or high intensity. High intensity non-state-domestic terrorism typically involves regular and protracted political violence, along with inter-communal violence. This can expose MNEs to considerable operational, governance and legitimacy pressures.

Originality/value

The paper contributes to the gap in IB terrorism research with regards domestic or local based terrorism. Drawing on IB theory and critical terrorism research, the paper addresses the nature and impact of domestic terrorism within IB. The authors’ paper shows the operational, governance and legitimacy pressures of both state and non-state domestic terrorism for MNEs in host markets. While most IB scholars consider the threat of non-state terrorism for international firms, this study shows how domestic state terrorism benefits and constrains foreign firms.

Details

Critical Perspectives on International Business, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-2043

Keywords

Open Access
Article
Publication date: 12 November 2018

Heba Zahra

The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the…

2655

Abstract

Purpose

The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the USA and the principles it upholds or the policies it embraces in its interaction with the outside world.

Design/methodology/approach

This study adopts both the “American Primacy” theory and the “anti-Americanism” theory in its effort to reach a conclusion concerning this issue. This study aims to examine previous research that linked international terrorism to the US hegemony and the principles it abides by and showed the relevance of this perception to the “American Primacy” theory. It also examines the research that considered international/transnational terrorism as a result of the American foreign policy in its various aspects (economic, military, assistance or a whole combination of policies).

Findings

This literature on the American foreign policy and international/transnational terrorism was extensive and manifested the explanatory power of the “anti-Americanism” theory, especially in its three variants: issue-oriented, ideological and instrumental. While examining the foreign policy terrorism studies, the relevance of the “American Primacy” theory appeared at very few instances.

Originality/value

The study was able to prove that explaining the international/transnational terrorism is related to the foreign policy decisions taken by the American policymakers and cause harm to the outside world. The envy of “American Primacy” is of secondary importance.

Details

Review of Economics and Political Science, vol. 3 no. 3/4
Type: Research Article
ISSN: 2631-3561

Keywords

1 – 10 of over 6000