Search results
1 – 10 of over 6000
An investigation of parallels between homegrown, international, and domestic terrorism.
Abstract
Purpose
An investigation of parallels between homegrown, international, and domestic terrorism.
Methodology/approach
A comparative method is used to analyze data from two main sources, ITERATE data on international and the TWEED data on domestic terrorism. The similarities are tested in various dimensions – target types, severity, and the method of the attacks.
Findings
Homegrown terrorism is inherently motivated by domestic issues. Moreover, variables of ethnic heterogeneity, political inclusiveness of fringe groups, and problems in the democratization process are good predictors of the occurrence of other forms of domestic and homegrown terrorism alike.
Research limitations/implications
Number of observable cases of homegrown terrorism are low. The two main datasets have potentially overlapping incidents.
Originality/value
Provides and operational definition of homegrown terrorism and test empirically the similarity between homegrown and other types of terrorisms.
Details
Keywords
There is an extensive research stream devoted to evaluating host country political risk as it relates to foreign investment decisions, and in today’s geopolitical climate, this…
Abstract
Purpose
There is an extensive research stream devoted to evaluating host country political risk as it relates to foreign investment decisions, and in today’s geopolitical climate, this type of risk is becoming increasingly salient to business leaders. Despite notable advancements related to understanding the importance of government-related risk, inconsistent conceptualizations and findings remain. Thus, the purpose of this paper is to offer a comprehensive overview of how host country political risk has been conceptualized, measured and studied in relation to multinational enterprises' (MNEs’) investment decisions. After reviewing the relevant literature, five major aspects of non-violent (government type, public corruption, leadership change) and violent (armed conflict, terrorism) political risk were identified. The organization and review of each aspect of political risk provide insights on fruitful directions for future research, which are discussed.
Design/methodology/approach
To identify research articles on political risk and foreign investment, 13 leading management and international business journals were searched using relevant keywords (January 2000 to January 2023). Moreover, reviewing articles from these journals led to locating and reviewing additional relevant articles that the authors cited. Keyword searches were also conducted on Google Scholar and Web of Science in an effort to identify relevant articles outside of the 13 targeted journals.
Findings
Both violent and non-violent aspects of host country political risk have been studied in relation to MNEs' investment decisions. Specifically, five major aspects of host country political risk were identified (government type, public corruption, leadership change, armed conflict and terrorism). Although the general consensus is that risk related to the government often creates obstacles for MNEs, conceptualizations, measures and findings in prior research are not uniform.
Originality/value
This paper provides a comprehensive overview of host country political risk and foreign investment. In doing so, the aspects of political risk are identified, organized and overviewed.
Details
Keywords
Marissa Mandala and Joshua D. Freilich
The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The…
Abstract
Purpose
The purpose of this paper is to use an environmental criminology and situational crime prevention (SCP) framework to study global assassinations carried out by terrorists. The authors set forth a series of hypotheses to explain successful and unsuccessful assassination incidents.
Design/methodology/approach
The authors use assassination data from the Global Terrorism Database from 1970 to 2014 to estimate a series binary logistic regression models.
Findings
Results indicate that various situational factors contribute to successful assassinations, such as target types, weapon types, total fatalities, and injuries.
Practical implications
These findings suggest that environmental criminology and SCP are valuable in developing prevention measures that thwart and disrupt attempted assassinations by terrorists.
Originality/value
Criminology has yet to apply environmental criminology and SCP to assassinations, a tactic often used by terrorists. This paper thus extends the existing assassination, terrorism, and criminology literature by applying this framework to assassinations performed by terrorists.
Details
Keywords
The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the…
Abstract
Purpose
The aim of this chapter is to investigate the meaning of terrorism, with a view to highlighting the main hurdles in the way of creating a working definition, as well as the necessity of developing definitions and classifications of this phenomenon.
Design methodology/approach
This chapter provides an overview of the literature on terrorism as a social/political phenomenon. It is therefore based on secondary sources.
Findings
While most literature on the topic finds it pointless or impossible to define terrorism, here we argue just the opposite. Common critiques of current definitions may be overcome by using multiple definitions and classifications.
Research limitations/implications
The chapter provides the methodological foundations for a comprehensive theoretical analysis of terrorism.
Originality/value of the chapter
The chapter applies insights from methodology of social sciences to the problem of defining terrorism.
Details
Keywords
Brent L. Smith, Jeff Gruenewald, Paxton Roberts and Kelly R. Damphousse
In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how…
Abstract
Purpose
In this chapter, we examine several attributes of lone wolf terrorists and how their activities are temporally and geospatially patterned. In particular, we demonstrate how precursor behaviors and attack characteristics of lone wolves are similar and different compared to those of group-based terrorists.
Methodology/approach
Based on data drawn from the American Terrorism Study (ATS), we examine 268 federal terrorism “indictees” linked to 264 incidents. Three types of loners are identified based on group affiliations and levels of assistance in preparing for and executing terrorist attacks. A series of analyses comparatively examine loners who had no assistance and those actors that did.
Findings
The results of this study suggest that lone wolf terrorists are more educated and socially isolated than group-based actors. Lone wolves also engage in less precursor activities than group actors, but are willing to travel greater distances to prepare for and execute attacks. Explanations for why lone wolves are able to “survive” longer than terrorist groups by avoiding arrest may in part stem from their ability to temporally and geospatially position their planning and preparatory activities.
Originality/value
Studies on lone wolf terrorism remain few and many are plagued by methodological and conceptual limitations. The current study adds to this growing literature by relying on lone wolf terrorism data recently made available by the American Terrorism Study (ATS). Our findings are valuable for members of the law enforcement and intelligence communities responsible for the early detection and prevention of lone wolf terrorism in the United States.
Details
Keywords
Stephen Mixter and Michael Owendoff
The 11th September terrorist attacks on America continue to affect the corporate real estate industry, and this paper is intended to address a number of those ongoing effects. It…
Abstract
The 11th September terrorist attacks on America continue to affect the corporate real estate industry, and this paper is intended to address a number of those ongoing effects. It first discusses property insurance coverage in general and then proceeds to analyse whether damage from acts of terrorism is covered under pre‐11th September and post‐11th September property insurance polices. It also addresses the current status of proposed US Government intervention as a terrorism insurance backstop. It then describes the strategies which certain clients located within the areas directly affected by the terrorist attacks implemented in order to be able to gain immediate access to alternative space. Finally it examines selected lease clauses to which landlords and tenants should pay closer attention in light of the terrorist attacks, including operating expense provisions, force majeure provisions, waiver of subrogation provisions, use prohibitions and alteration provisions.
Details
Keywords
Jeff Gruenewald, Brent R. Klein, Grant Drawve, Brent L. Smith and Katie Ratcliff
The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is…
Abstract
Purpose
The purpose of this paper is to provide a metric for validating the Nationwide Suspicious Activity Reporting (SAR) Initiative’s (NSI) sixteen-category instrument, which is designed to guide law enforcement in the collection and analysis of suspicious behaviors preceding serious crimes, including terrorist attacks.
Design/methodology/approach
Data on suspicious preoperational activities and terrorism incident outcomes in the USA between 1972 and 2013 come from the American Terrorism Study (ATS). Using a mixed-method approach, the authors conduct descriptive and multivariate analyses to examine the frequencies of the least and most prevalent suspicious activities (or SAR indicators) and how they predict the likelihood of terrorism prevention. In addition, the authors contextualize how configurations of SAR indicators are associated with the successful thwarting of terrorism incidents by law enforcement using an analytical method known as conjunctive analysis of case configurations (CACC).
Findings
The study reveals several key findings. First, certain behaviors categorized as suspicious, such as making threats, occur more frequently than others. Second, making threats, conducting surveillance and terrorist recruitment/financing predict law enforcement interdiction in terrorism plots, while misrepresentation (or the manufacturing and use of false documents) is more associated with terrorist success. Third, prevalent SAR indicators operate differently in the context of various combinations of suspicious activities to shape the likelihood for law enforcement interdiction.
Research limitations/implications
The current study’s findings may not be generalizable to other forms of violent extremism and terrorism outside of the USA.
Practical implications
This study illuminates opportunities for the NSI to provide law enforcement with the necessary tools to reduce terrorism risk and prevent future attacks.
Originality/value
To our knowledge, no scholarly work to date has assessed how observable behavioral indicators of suspicious preoperational activities affect the outcomes of terrorist plots.
Details
Keywords
D. Elaine Pressman and John Flockton
The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach…
Abstract
Purpose
The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach proposed is referred to as the VERA 2 or violent extremism risk assessment protocol (Consultative Version 2).
Design/methodology/approach
A review of the knowledge base relating to risk assessment and risk assessment methodology was undertaken with a focus on relevance to individual terrorists and violent extremists. The need for a specific approach for the risk assessment of terrorists that differs from approaches used for ordinary violent criminals was identified. A model that could be used for the risk assessment of terrorists was identified with pertinent risk indicators. This was structured into a protocol referred to as the VERA (Consultative Version 2). The approach is intended to be applied to different types of violent extremists, terrorists and unlawful violent offenders motivated by religious, political or social ideologies.
Findings
First, risk assessments of adjudicated terrorists and violent extremists should be undertaken with risk indicators that are relevant to ideological motivated violence. Indicators used for ordinary common violence differ in substantive ways from those relevant to terrorists and therefore may have questionable relevance for the assessment of risk in terrorists. Second, it is possible to construct an evidence‐based risk assessment approach for the range of violent extremists and terrorists using a structured professional judgment approach with pertinent risk indicators. The VERA 2 is an example of this type of risk assessment protocol for terrorists and unlawful violent extremists.
Research limitations/implications
Risk assessment tools that have been developed for ordinary violent criminals and members of organised criminal gangs should be used with caution with terrorists, violent extremists and other perpetrators of ideologically motivated unlawful violence. Specific risk assessment approaches for terrorists with relevant indicators should be used. At this time, terrorist oriented approaches such as the VERA 2 are to be considered consultative and used as an add‐on to other established approaches.
Originality/value
There are few transparent, structured risk assessment approaches that use indicators specifically relevant to violent political extremists and terrorists. One new approach, the VERA 2 is outlined in the paper using risk indicators that differ in substantive ways from those used for other ordinary violent criminals.
Details
Keywords
Martin David Owens and Elizabeth Johnson
The paper aims to understand how state and non-state domestic terrorism impacts MNEs in foreign markets. Despite the burgeoning literature on terrorism within international…
Abstract
Purpose
The paper aims to understand how state and non-state domestic terrorism impacts MNEs in foreign markets. Despite the burgeoning literature on terrorism within international business (IB), most research has focused on international terrorism, or terrorism generally. Consequently, there has been limited research examining how domestic or local based terrorism impacts foreign firms.
Design/methodology/approach
This is a conceptual paper.
Findings
Domestic terrorism is the most common form of terrorism in the world today and involves the state and non-state actors. Non-state domestic terrorism can be low intensity or high intensity. High intensity non-state-domestic terrorism typically involves regular and protracted political violence, along with inter-communal violence. This can expose MNEs to considerable operational, governance and legitimacy pressures.
Originality/value
The paper contributes to the gap in IB terrorism research with regards domestic or local based terrorism. Drawing on IB theory and critical terrorism research, the paper addresses the nature and impact of domestic terrorism within IB. The authors’ paper shows the operational, governance and legitimacy pressures of both state and non-state domestic terrorism for MNEs in host markets. While most IB scholars consider the threat of non-state terrorism for international firms, this study shows how domestic state terrorism benefits and constrains foreign firms.
Details
Keywords
The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the…
Abstract
Purpose
The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the USA and the principles it upholds or the policies it embraces in its interaction with the outside world.
Design/methodology/approach
This study adopts both the “American Primacy” theory and the “anti-Americanism” theory in its effort to reach a conclusion concerning this issue. This study aims to examine previous research that linked international terrorism to the US hegemony and the principles it abides by and showed the relevance of this perception to the “American Primacy” theory. It also examines the research that considered international/transnational terrorism as a result of the American foreign policy in its various aspects (economic, military, assistance or a whole combination of policies).
Findings
This literature on the American foreign policy and international/transnational terrorism was extensive and manifested the explanatory power of the “anti-Americanism” theory, especially in its three variants: issue-oriented, ideological and instrumental. While examining the foreign policy terrorism studies, the relevance of the “American Primacy” theory appeared at very few instances.
Originality/value
The study was able to prove that explaining the international/transnational terrorism is related to the foreign policy decisions taken by the American policymakers and cause harm to the outside world. The envy of “American Primacy” is of secondary importance.
Details