67 research outputs found
An Analysis of the Rights-Based Justification for Federal Intervention in Environmental Regulation
No Other Gods before Me: Spheres of Influence in the Relationship between Christianity and Islam
Assessing the Benefits of Simulations and War Games for Homeland Security Enterprise Workforce Development
Slides for the presentation presented at the ENVISION24 Conference Session 8: Lighting Talks: Transformative Workforce Developmen
Impact Assessment: National Security Simulation Course at Duke University
This report provides background information and some preliminary results on a National Security Simulation course offered at Duke University in Spring 2024. This project is designed to assess the benefits that students accrue from participating in a seven-week, active learning course, the main part of which is a national security-related simulation exercise or war-game called Acceleration. Designed and executed by Valens Global, the project also collected data from participants in shorter exercises at other universities
Toward a constructivist model of radicalization and deradicalization: a conceptual and methodological proposal.
© 2019 Feixas and Winter.This article identifies common features of existing models of radicalization and deradicalization, such as the transition from uncertainty to certainty, before integrating these in a model based upon personal construct theory. It is proposed that the personal construct concepts of validation and invalidation are particularly relevant to processes of identity change such as radicalization and deradicalization. Thus, it is argued that radicalization occurs when major invalidation of an individual’s construing is followed by the development of a new radicalized view of the world that provides a turning point in his or her sense of identity and a more structured and certain view of the world. There is likely to be seeking out of validation for this view in interactions with others who share similar views or by extorting evidence for the individual’s radical constructions. These constructions are likely to involve extreme negative views of another group, by contrast to members of which, and possibly by taking extreme action against this group, the individual’s new self-construction may become further defined. These same processes can be seen to operate in deradicalization, and it will therefore be argued that the model has implications for the development of deradicalization programs. A further advantage of the model is that it has an associated personal construct methodology, particularly repertory grid technique, that may be used to investigate processes of radicalization and deradicalization. As illustrations of such investigations, results will be summarized from a repertory grid study of Salafist Muslims in Tunisia, some of whom had returned from fighting in Syria, and an analysis of the writings of the Norwegian mass murderer Anders Breivik. The findings of these investigations are argued to be consistent with the personal construct model of radicalization and deradicalization.Peer reviewe
Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis
This article provides an in‐depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre‐attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open‐source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the “loneness” thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re‐evaluation of the “lone actor” concept
Jacob N. Shapiro.<i>The Terrorist's Dilemma: Managing Violent Covert Organizations</i>
- …
