語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Timelines and Indicators in Lone Wol...
~
Murphy, Billy J.
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization./
作者:
Murphy, Billy J.
面頁冊數:
1 online resource (92 pages)
附註:
Source: Masters Abstracts International, Volume: 57-05.
Contained By:
Masters Abstracts International57-05(E).
標題:
Criminology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355929041
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization.
Murphy, Billy J.
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization.
- 1 online resource (92 pages)
Source: Masters Abstracts International, Volume: 57-05.
Thesis (M.P.A.)--University of Colorado Colorado Springs, 2018.
Includes bibliographical references
Lacking the resources, reach and influence of organized extremist groups, lone wolf terrorist attacks should be less impactful than the spectacular attacks of larger and more organized groups. How can lone actors compare to a vast, globally resourced, network of large terrorist organizations such as ISIS or Al-Qaeda? This study sought to study the methodology of lone wolf terrorism by analyzing select cases for commonalities in attack mobilization durations and indicators. This was done by developing common terminology, outlining a method for comparing the cases, discussing the cases selected, and then comparing them in a case study text analysis. This study found that there were commonalities in both mobilization durations and indicators displayed. Mobilization durations general fell into three categories, immediate, short and long-term durations. Mobilization indicators displayed saw commonalities in attack means acquisition that was outside the norm, making statements justifying violence, supporting extremist ideologies, and training to higher proficiency in weapons. There were also commonalities in indicators not displayed such as limited to no displays of operational security, counter-surveillance, communications encryption, seeking access through employment, and the conduct of rehearsals.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355929041Subjects--Topical Terms:
563146
Criminology.
Index Terms--Genre/Form:
554714
Electronic books.
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization.
LDR
:02543ntm a2200349Ki 4500
001
916190
005
20180917084247.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355929041
035
$a
(MiAaPQ)AAI10812589
035
$a
(MiAaPQ)uccs:10370
035
$a
AAI10812589
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Murphy, Billy J.
$3
1189823
245
1 0
$a
Timelines and Indicators in Lone Wolf Terrorism Attack Mobilization.
264
0
$c
2018
300
$a
1 online resource (92 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-05.
500
$a
Adviser: Edin Mujkic.
502
$a
Thesis (M.P.A.)--University of Colorado Colorado Springs, 2018.
504
$a
Includes bibliographical references
520
$a
Lacking the resources, reach and influence of organized extremist groups, lone wolf terrorist attacks should be less impactful than the spectacular attacks of larger and more organized groups. How can lone actors compare to a vast, globally resourced, network of large terrorist organizations such as ISIS or Al-Qaeda? This study sought to study the methodology of lone wolf terrorism by analyzing select cases for commonalities in attack mobilization durations and indicators. This was done by developing common terminology, outlining a method for comparing the cases, discussing the cases selected, and then comparing them in a case study text analysis. This study found that there were commonalities in both mobilization durations and indicators displayed. Mobilization durations general fell into three categories, immediate, short and long-term durations. Mobilization indicators displayed saw commonalities in attack means acquisition that was outside the norm, making statements justifying violence, supporting extremist ideologies, and training to higher proficiency in weapons. There were also commonalities in indicators not displayed such as limited to no displays of operational security, counter-surveillance, communications encryption, seeking access through employment, and the conduct of rehearsals.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Criminology.
$3
563146
650
4
$a
Public policy.
$3
1002398
650
4
$a
Public administration.
$3
562473
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0627
690
$a
0630
690
$a
0617
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
University of Colorado Colorado Springs.
$b
Public Affairs-Public Administration.
$3
1189824
773
0
$t
Masters Abstracts International
$g
57-05(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10812589
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入