Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
In recent years, thousands of foreign fighters have left over 100 countries to join armed groups, especially jihadist groups, in Syria and Iraq and in other theaters of war. The phenomenon has also affected Italy, although to a much lesser extent than in other European countries. The foreign fighters of Italy are, in fact, about 130. What are the socio-demographic characteristics of these individuals? Where did they live before they left? Were they part of extremist networks in Italy and in Europe? What role did they play in the conflict area? How many have already returned? Are there common profiles? These are just some of the questions that this ISPI Report tries to answer. Through a detailed analysis of the profiles of foreign fighters linked to Italy, on the basis of original data, the peculiarities of the entire national contingent are highlighted for the first time, also thanks to the comparison with other Western countries.
Choose an application
Cet ouvrage porte sur la période de révolution, du renversement de Hayle Sïllasé à la mise en place d’une dictature militaire d’inspiration marxiste. L’auteur examine les causes et les conséquences de ce changement de régime à travers le cas des Afar, un peuple semi-nomade transfrontalier de basses terres. Les possibilités d’investissement agricole sur le cours de l’Awash, fleuve qui traverse le territoire Afar, les ressources minières ainsi que la protection des frontières nationales représentaient des enjeux importants pour intégrer à l’État éthiopien cet espace historiquement hors de sa domination. En réponse aux excès de l’administration impériale éthiopienne du temps de Hayle Sïllasé, notamment la confiscation des terres communales fertiles, la révolution éthiopienne proposait une réallocation des ressources au peuple par l’État et une plus grande autonomie de chaque territoire, impliquant des structures administratives nouvelles. Les hommes politiques représentant les Afar, soit par leurs statuts de chefs traditionnels soit par leurs qualités personnelles révélées par les bouleversements de l’époque, ont tenté de se saisir les opportunités offertes par la situation révolutionnaire. Ils ont dû faire face à plusieurs options qui les ont unis ou divisés. Ce sont ces choix politiques, les raisons qui les ont motivés, les incohérences qui n’ont pas été évitées, les dissidences qu’ils ont entrainées, les objectifs qui n’ont pas été atteints, et les conséquences économiques, écologiques et sociales, qui sont l’objet de cet ouvrage. L’auteur y décortique également les rapports complexes des Afar avec la Junte militaire au pouvoir et les mouvements de guérilla qui s’opposaient à celle-ci, surtout les mouvements érythréens et le Front de libération des peuples du Tigray (FLPT).
History --- Political Science --- histoire --- Afar --- Derg --- nationalisme --- lutte armée --- révolution éthiopienne --- history --- Ethiopian Revolution --- nationalism --- armed struggle --- land issues
Choose an application
This open access book explains how PRIO, the world’s oldest peace research institute, was founded and how it survived through crises. In this book, twenty-four of its researchers and associates, including Johan Galtung, Ingrid Eide, and Mari Holmboe Ruge, who founded the institute back in 1959, tell the stories of their roles in inventing and developing peace research. They reflect on their personal experiences with peace and conflict, tell what drove their peace engagement, and discuss the balance sought in the field between the cold dictates from academic rigor and the hot pursuit of peace, a desire for research to make a positive difference. Most of the chapters are interviews where one colleague interviews another. Some are self-reflective essays, while others are memorial essays written about a peace researcher who has passed away. Taken together, the book presents a lively picture of a thriving world-leading research environment and a wealth of conflicting or mutually reinforcing perspectives on war, violence, conflict, conflict management and resolution, negotiations and mediation, peacemaking, peace building, and the contested concept of peace. “The Oslo Stories is an indispensable source to the history of peace research.” Dr. Olav Njølstad, Director, Nobel Institute, Oslo
International relations --- International institutions --- Terrorism, armed struggle --- Peace research --- War and violence --- Peace building --- Conflict resolution --- PRIO --- PLO --- Oslo --- Life Stories --- Stein Tønnesson --- Stein Toennesson --- Stein Tonnesson
Choose an application
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
Terrorism, armed struggle --- Ethics & moral philosophy --- Media studies --- Interdisciplinary studies --- Philosophy --- Terrorism and Technology --- Counter-terrorism Ethics --- Social Media and Terrorism --- Artificial Intelligence and Counter-terrorism --- Bulk Data Collection Terrorism --- Ethics of Technology --- Open Access
Choose an application
"Historically, countering terrorism has been something that security services have carried out on behalf of the state, without community consultation or consent. Since 9/11 however, this tradition has increasingly been questioned and the idea that communities have the potential to defeat al Qaeda - related or influenced terrorism has gained ascendency across policy, security and other contexts. Based on research in the US, Britain and Northern Ireland, this book examines the involvement of Muslim and other communities in terror crime prevention work, exploring the complexities of community involvement as well as its advantages and examining how trusting relationships between police, security services and communities can be built."--Bloomsbury Publishing.
Political participation. --- Terrorism --- Prevention. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Citizen participation --- Community action --- Community involvement --- Community participation --- Involvement, Community --- Mass political behavior --- Participation, Citizen --- Participation, Community --- Participation, Political --- Political activity --- Political behavior --- Political rights --- Social participation --- Political activists --- Politics, Practical --- Urban communities --- Crime and criminology --- Terrorism, armed struggle
Choose an application
Die militärische Terrorismusbekämpfung der letzten eineinhalb Jahrzehnte gilt heute als kontraproduktiv. Hat der »War on Terror« die dschihadistischen Bewegungen tatsächlich gestärkt und ist er der Grund für ihre wachsende Anhängerzahl? Sebastian Langes kommunikations- und organisationstheoretischen Analysen gehen den Eskalationsmechanismen im Verhältnis von transnationalem Terrorismus und staatlicher Terrorismusbekämpfung nach. Die Studie zeigt: Der Identitätskonflikt zwischen modernen Gesellschaften und fundamentalistischer Weltanschauung lässt sich nur dann entschärfen, wenn sicherheitspolitische Überreaktionen vermieden werden. Besprochen in: Portal für Politikwissenschaft, 06.05.2020, Volker Stümke
Terrorism, armed struggle --- Al-Qaeda. --- Communication. --- Constructivism. --- Fundamentalism. --- Globalization. --- Islamic State. --- Jihadism. --- Policy. --- Political Science. --- Political Theory. --- Politics. --- Systems Theory. --- Violence. --- War on Terror. --- Terrorismus; War on Terror; Terrorismusbekämpfung; Dschihadismus; Fundamentalismus; Al-Qaida; Islamischer Staat; Sicherheitspolitik; Kommunikation; Systemtheorie; Konstruktivismus; Politik; Gewalt; Globalisierung; Policy; Politische Theorie; Politikwissenschaft; Terrorism; Jihadism; Fundamentalism; Al-Qaeda; Islamic State; Communication; Systems Theory; Constructivism; Politics; Violence; Globalization; Political Theory; Political Science
Choose an application
This handbook comprises essays by leading scholars and practitioners on the topic of U.S. counterterrorism and irregular warfare campaigns and operations around the globe. Terrorist groups have evolved substantially since 9/11, with the Islamic State often described as a pseudo-state, a terrorist group, and insurgency all at the same time. While researchers', analysts', and policymakers’ understanding of terrorism has grown immensely over the past two decades, similar advancements in the understanding of counterterrorism lag. As such, this handbook explains why it is necessary to take a broader view of counterterrorism which can, and often does, include irregular warfare. The volume is divided into three thematic sections: Part I examines modern terrorism in the Islamic world and gives an overview of the major terrorist groups from the past three decades; Part II provides a wide variety of case studies of counterterrorism and irregular warfare operations, spanning from the 1980s to the irregular warfare campaign against the Islamic State in northern Syria in 2018; Part III examines the government instruments used to combat terrorism and wage irregular warfare, such as drones, Theater Special Operations Commands, and Theater Commands. The handbook fills a gap in the traditional counterterrorism literature by its inclusion of irregular warfare and by providing analyses from academic experts as well as practitioners. It will be of much interest to students of counterterrorism, counterinsurgency, U.S. national security, military affairs, and International Relations. The Open Access version of this book, available at https://www.routledge.com/Routledge-Handbook-of-US-Counterterrorism-and-Irregular-Warfare-Operations/Sheehan-Marquardt-Collins/p/book/9780367758363, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Terrorism --- Irregular warfare --- Military policy --- Prevention. --- Defense policy --- Military readiness --- Military history --- Sociology, Military --- War --- National security --- IW (Irregular warfare) --- Unconventional warfare --- Guerrilla warfare --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Political aspects --- Warfare & defence --- Terrorism, armed struggle --- Defence strategy, planning & research --- Military history: post WW2 conflicts --- Middle Eastern history --- Afghanistan --- al Qaeda --- drones --- Iraq --- ISIS --- irregular warfare --- jihadist groups --- special operations forces --- The Long War --- United States --- Military policy. --- TERRORISM--USA--PREVENTION --- IRREGULAR WARFARE--USA --- MILITARY POLICY--USA
Choose an application
"This book examines why the US has introduced safeguards that are designed to prevent their counterterrorism policies from causing harm to non-US citizens beyond US territory. It investigates what made US policymakers take steps to 'put the gloves back on' through five case studies on the emergence of such safeguards related to the right not to be tortured, the right not to be arbitrarily detained, the right to life (in connection with targeted killing operations), the right to seek asylum (in connection with refugee resettlement) and the right to privacy (in connection with foreign mass surveillance). The book exposes two mechanisms - coercion and strategic learning - which explain why the US has introduced, what the authors refer to as, 'extraterritorial human rights safeguards', thus demonstrating that the emerging norm that states have human rights obligations towards foreigners beyond their borders constrains policy choices. This book will be of key interest to scholars and students of human rights, counterterrorism, US foreign policy, human rights law, and more broadly to political science and international relations"--
Terrorism --- International law and human rights --- POLITICAL SCIENCE / Political Freedom & Security / Human Rights --- POLITICAL SCIENCE / Political Freedom & Security / Terrorism --- Prevention --- Moral and ethical aspects --- Law and legislation --- United States --- Foreign relations --- Human rights and international law --- Human rights --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Human rights, civil rights --- Terrorism, armed struggle --- FISA Surveillance
Choose an application
The first major study of one of the most influential periodicals of the eighteenth and nineteenth centuriesProvides the first major study of one of the most influential periodicals of the eighteenth and nineteenth centuriesInterrogates and revises critical commonplaces and narratives about form, authorship, reading and gender through rigorous archival research on the magazine's authors, readers, printers and publishersMaps new directions in eighteenth-century and Romantic studies, women's writing, and media and cultural history by modelling innovative and interdisciplinary methodologies for historical periodical studiesMoves the women's magazine from the periphery to the centre of eighteenth-century and Romantic print cultureIn December 1840, Charlotte Brontë wrote in a letter to Hartley Coleridge that she wished 'with all [her] heart' that she 'had been born in time to contribute to the Lady's magazine'. Nearly two centuries later, the cultural and literary importance of a monthly publication that for six decades championed women's reading and women's writing has yet to be documented. This book offers the first sustained account of The Lady's Magazine. Across six chapters devoted to the publication's eclectic and evolving contents, as well as its readers and contributors, The Lady's Magazine (1770-1832) and the Making of Literary History illuminates the periodical's achievements and influence, and reveals what this vital period of literary history looks like when we see it anew through the lens of one of its most long-lived and popular publications.
Political violence --- Radicalization --- Radicalism --- Extremism, Political --- Ideological extremism --- Political extremism --- Political science --- Radicalisation --- Violence --- Political crimes and offenses --- Terrorism --- Terrorism, armed struggle;Violence and abuse in society;Politics and government --- Political violence. --- Radicalism. --- Radicalization. --- Education --- Educational sociology. --- Social aspects. --- Cezelle, Guido, --- Netherlands --- History. --- Migration, immigration & emigration --- Interior decoration --- History --- United Kingdom, Great Britain --- English --- c 1980 to c 1990 --- c 1990 to c 2000 --- European history --- Science funding & policy --- Impact of science & technology on society --- History of science --- Thatcher --- science policy --- technology --- Conservative administration --- Astronomy, space & time --- Astrophysics --- Popular astronomy & space --- galaxy formation --- astrophysics --- galaxy clusters --- International relations. --- Literature --- History and criticism. --- Historic preservation. --- empire --- east india company --- asia --- britain --- English country house
Choose an application
This open access book brings together a set of original studies that use cutting-edge computational methods to investigate conflict at various geographic scales and degrees of intensity and violence. Methodologically, this book covers a variety of computational approaches from text mining and machine learning to agent-based modelling and social network analysis. Empirical cases range from migration policy framing in North America and street protests in Iran to violence against civilians in Congo and food riots world-wide. Supplementary materials in the book include a comprehensive list of the datasets on conflict and dissent, as well as resources to online repositories where the annotated code and data of individual chapters can be found and where (agent-based) models can be re-produced and altered. These materials are a valuable resource for those wishing to retrace and learn from the analyses described in this volume and adapt and apply them to their own research interests. By bringing together novel research through an international team of scholars from a range of disciplines, Computational Conflict Research pioneers and maps this emerging field. The book will appeal to students, scholars, and anyone interested in the prospects of using computational social sciences to advance our understanding of conflict dynamics.
Peace studies & conflict resolution --- Society & social sciences --- Terrorism, armed struggle --- Data mining --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Peace. --- Terrorism. --- Political violence. --- Data mining. --- Computational Social Sciences. --- Conflict Studies. --- Terrorism and Political Violence. --- Data Mining and Knowledge Discovery. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Violence --- Political crimes and offenses --- Terrorism --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Subversive activities --- Political violence --- Terror --- Coexistence, Peaceful --- Peaceful coexistence --- International relations --- Disarmament --- Peace-building --- Security, International --- Social sciences --- Social sciences—Data processing --- Social sciences—Computer programs --- Peace
Listing 1 - 10 of 12 | << page >> |
Sort by
|