Criminologists on Terrorism and Homeland Security.

By: Forst, BrianContributor(s): Greene, Jack R | Lynch, James PMaterial type: TextTextSeries: Cambridge Studies in CriminologyPublisher: New York : Cambridge University Press, 2011Copyright date: ©2011Description: 1 online resource (496 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781139007931Subject(s): Internal security | National security | Terrorism -- Prevention | TerrorismGenre/Form: Electronic books.Additional physical formats: Print version:: Criminologists on Terrorism and Homeland SecurityDDC classification: 363.325 LOC classification: HV6431 .C7624 2011Online resources: Click to View
Contents:
Cover -- Half-title -- Series-title -- Title -- Copyright -- Contents -- About the authors -- Preface -- DESCRIPTION, RATIONALE, AND SCOPE -- HOW THIS BOOK ADVANCES THINKING ABOUT TERORISM -- Chapter One: Introduction and Overview -- INTRODUCTION -- OVERVIEW -- CONCLUDING THOUGHTS -- Part One: Nature of the Problem -- Chapter Two: Manifestations of Aggression: Terrorism, Crime, and War -- INTRODUCTION -- TERRORISM AS CRIME -- State Laws -- Federal Law -- TERRORISM AS WAR -- IMPLICATIONS OF CONCEPTUAL APPROACHES FOR DEALING WITH TERRORISM -- CONCLUSION -- REFERENCES -- CASES CITED -- Chapter Three: The Etiology of Terrorism: Identifying, Defining, and Studying Terrorists -- DEFINING TERRORISM -- TERRORIST ACTORS -- MYTHS BROUGHT ABOUT FROM PROBLEMS WITH DEFINITION AND TYPOLOGY -- DATA ISSUES -- CONCLUSION -- REFERENCES -- Chapter Four: Balancing Counterterrorism Strategies: Lessons from Evolutionary Ecology -- INTRODUCTION -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE -- EVOLUTIONARY ECOLOGY AND TERRORIST ACTS -- THE INDIVIDUAL: RISK FACTORS FOR TERRORISM -- MOTIVATION FOR TERRORISM -- SITUATION, OPPORTUNITY, AND TERRORISM -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE ON COUNTERTERRORISM -- MODELING COUNTER-STRATEGIC BALANCE -- IMPROVED COUNTERTERRORIST STRATEGIES -- DETERRENCE -- ALTERNATIVE BEHAVIORS -- CONCLUSION -- REFERENCES -- Chapter Five: Gangs, Crime, and Terrorism -- THEORETICAL PERSPECTIVES -- THE ALLIANCE MODEL OF TERRORIST AND GANGS RELATIONS -- Gang Organization -- Gang Access to Resources from Drug Sales -- Global Interconnectivity of Gangs -- THE EL RUKN STREET GANG-LIBYA ALLIANCE -- A RECRUITMENT MODEL -- THE CRIMINAL JUSTICE SYSTEM RESPONSE -- REFERENCES -- Chapter Six: Women Terrorists -- INTRODUCTION -- A Brief History of the Role of Women in Terrorism -- Importance of Women in Terrorism Today.
CASE STUDIES: THE WOMEN WHO JOIN TERRORIST ORGANIZATIONS -- The Roles Women Assume in Terrorist Organizations -- Demographic Characteristics of Women in Terrorist Organizations -- CONCLUSIONS: THE REASONS WHY WOMEN JOIN TERRORIST ORGANIZATIONS -- BIBLIOGRAPHY -- Part Two: Strategies for Intervention -- Chapter Seven: Is Crime Prevention Relevant to Counterterrorism? -- INTRODUCTION -- A FRAMEWORK FOR CRIME PREVENTION -- THE RELEVANCE OF THE MATRIX TO COUNTERTERRORISM INTERVENTIONS -- GUIDANCE IN USING CRIME PREVENTION CONCEPTS FOR COUNTERTERRORISM INTERVENTIONS -- HOW CAN CRIMINOLOGISTS CONTRIBUTE? -- REFERENCES -- Chapter Eight: Implications of Opportunity Theory for Combating Terrorism -- INTRODUCTION -- OPPORTUNITY THEORY -- Defining Opportunity -- TESTING OPPORTUNITY THEORY -- Evaluations of Interventions -- Naturally and Routinely Occurring Variation in Opportunity -- Addressing Displacement and Substitution -- Summary -- CAN OPPORTUNITY THEORY BE USED TO UNDERSTAND AND COMBAT TERRORISM? -- Terrorism and Ordinary Street Crime -- Building a Theory of Opportunity for Terrorism -- Summary -- OPPORTUNITY REDUCTION TO REDUCE FEAR, NOT TERRORISM -- Why Study the Opportunity-Fear Relationship? -- Opportunity Reduction and Fear of Ordinary Street Crime -- Communities and Crime -- Evaluation of Specific Opportunity Reduction Initiatives -- CONCLUSION -- REFERENCES -- Chapter Nine: Soldiers and Spies, Police and Detectives -- INTRODUCTION -- CHANGES IN THE EXTERNAL ENVIRONMENT -- Military -- Police -- ADJUSTMENTS TO THE CHANGES -- Military -- Police -- CONCLUSIONS -- REFERENCES -- Chapter Ten: Community Policing and Terrorism: Problems and Prospects for Local Community Security -- INTRODUCTION -- DEMOCRATIC POLICING AND COMMUNITY TOLERANCE FOR POLICE INTERVENTION -- THE RISE OF COMMUNITY- AND PROBLEM-ORIENTED POLICING.
PROBLEM-ORIENTED POLICING: AN APPLICATION -- ZERO-TOLERANCE POLICING -- EXTENDING COMMUNITY-, PROBLEM-ORIENTED, AND ZERO-TOLERANCE POLICING TO TERRORISM - THE PROBLEMS -- MAPPING COP/POP TO TERRORISM PREVENTION, CONTROL, AND RESPONSE -- CAN COP/POP BE MADE TO WORK FOR TERRORISM? -- ARE COP/POP INFORMATION AND ANALYTICS USEFUL TO UNDERSTANDING TERRORISM? -- CAN COP/POP STRATEGIES AND TACTICS INFORM TERRORISM RESPONSES? -- CAN PARTNERSHIPS BE EXTENDED TO TERRORISM PREVENTION? -- WHAT ABOUT INSTITUTIONAL LEGITIMACY? -- THE PROSPECTS FOR COP AND POP AS TERRORISM RESPONSES -- CONCLUSION -- REFERENCES -- Chapter Eleven: Go Analyze!: (Connecting the Dots) -- FIRST COUNTEREXAMPLE: THE CASE OF AL-MIHDHAR AND AL-HAZMI -- A Lapse of Surveillance -- What Went Wrong? -- SECOND COUNTEREXAMPLE: GENESIS OF THE 9/11 ATTACKS -- The Looming 9/11 Attacks -- What Went Wrong? -- THE ROLE OF POLICE IN COUNTERTERRORISM -- The Police and the Cult of Evidence -- New Police Cultures -- THE LOGIC OF CONNECTING THE DOTS -- PROPOSED REFORMS -- CONCLUSION -- REFERENCES -- Chapter Twelve: Managing the Fear of Terrorism -- THE PROBLEM OF FEAR IN THE ERA OF TERRORISM -- FEAR AND RISK OF TERRORIST ACTS -- The Nature and Sources of Fear -- Fear and Risk -- THE ROLE OF THE MEDIA -- THE ROLE OF POLITICS -- FEAR AND PUBLIC POLICY -- AN AGENDA FOR REDUCING THE SOCIAL COSTS OF FEAR -- REFERENCES -- Chapter Thirteen: Should Profiling Be Used to Prevent Terrorism? -- INTRODUCTION -- WHAT IS RACIAL PROFILING? -- Who is Affected by Racial Profiling and How are They Affected? -- How is Racial Profiling Being Used? -- How Effective is Racial Profiling in Reducing Crime? -- What Can We Conclude about Racial and Ethnic Profiling? -- LEGAL AND CONSTITUTIONAL ISSUES RELATED TO RACIAL PROFILING -- TERRORISM -- Terrorism and Profiling -- Who are the Terrorists?.
HOW EFFECTIVE IS RACIAL PROFILING IN REDUCING TERRORISM? -- RACIAL PROFILING AS A CRIME CONTROL POLICY -- WHAT CAN WE CONCLUDE ABOUT RACIAL PROFILING AND TERRORISM? -- REFERENCES -- Chapter Fourteen: Federal-Local Coordination in Homeland Security -- INTRODUCTION -- INTERORGANIZATIONAL NETWORKS -- THE ROLE OF THE FEDERAL GOVERNMENT -- The Joint Terrorism Task Forces -- Coordinating with State and Local Governments -- Other Federal Roles -- THE ROLE OF LOCAL GOVERNMENT -- The Local Role -- Prevention -- Response and Recovery -- Investigation -- THINKING ABOUT NETWORKS -- Prevention -- Response and Recovery -- Investigation -- CONCLUSION -- REFERENCES -- Chapter Fifteen: Liberty and Security in an Era of Terrorism -- INTRODUCTION -- LIBERTY -- Freedom -- Liberty -- Privacy -- SECURITY -- AN ERA OF TERRORISM? -- BALANCES, TRADE-OFFS, AND JUDGMENTS -- Balances -- Trade-Offs -- Judgment -- REFERENCES -- Chapter Sixteen: Regulating Terrorism -- RECONSIDERING DETERRENCE -- RECONSIDERING JUSTICE -- CONTAINMENT AND ENLARGEMENT -- THE TORN WEB OF U.S. CONTROLS ON TERRORISM -- THE PUBLIC HEALTH MODEL -- TOWARD AN EVIDENCE-BASED POLICY ON EXTREMISM -- CONCLUSION -- REFERENCES -- Part Three: Thinking About Tomorrow -- Chapter Seventeen: Using Open Source Data to Counter Common Myths about Terrorism -- THE EXTENT OF TERRORISM -- MYTH 1: Terrorist Attacks Reach Every Corner of the World -- MYTH 2: Terrorist Attacks were Rapidly Increasing in the Years Leading up to 9/11 -- MYTH 3: The United States is More Frequently Targeted by Terrorists than any Other Country in the World -- THE SOURCES OF TERRORISM -- MYTH 4: Most Terrorist Attacks Involve Disgruntled Groups and Individuals from One Country Carrying Out Attacks on Civilians in Other Countries -- MYTH 5: Terrorism is Unrelated to Traditional Political Grievances.
THE LETHALITY OF TERRORISM AND THE RESILIENCE OF TERRORIST GROUPS -- MYTH 6: Most Terrorist Attacks are Incredibly Lethal -- MYTH 7: Most Terrorist Attacks Rely on Sophisticated Weaponry -- MYTH 8: Most Terrorist Organizations are Long Lasting and Difficult to Eradicate -- COUNTERTERRORISM -- MYTH 9: Terrorist Groups are Impervious to Governmental Counterterrorist Policies and Rarely Make Mistakes -- MYTH 10: To be Effective Against Terrorism, Governments Must Strike Back Rapidly and Forcefully -- DISCUSSION AND CONCLUSIONS -- REFERENCES -- Chapter Eighteen: Criminal Justice and Terrorism: A Research Agenda -- INTRODUCTION -- LESSONS LEARNED: DEFINITIONS ARE NEEDED, AND SO IS FLEXIBILITY -- LESSONS LEARNED: INTERACTIONS AND TYPOLOGIES OF TERRORISM -- LESSONS LEARNED: THE BARRIERS TO EMPIRICAL RESEARCH ON TERRORISM ARE FORMIDABLE -- PROSPECTS FOR RESEARCH ON TERRORISM -- Adapting Crime Prevention Models to Terrorism -- Estimating the Social Costs of Terrorism and Counterterrorism Policy -- Other Prospects -- CONCLUSION -- REFERENCES -- Index.
Summary: This volume presents 19 original essays addressing issues surrounding terrorism from the unique perspective of criminology.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half-title -- Series-title -- Title -- Copyright -- Contents -- About the authors -- Preface -- DESCRIPTION, RATIONALE, AND SCOPE -- HOW THIS BOOK ADVANCES THINKING ABOUT TERORISM -- Chapter One: Introduction and Overview -- INTRODUCTION -- OVERVIEW -- CONCLUDING THOUGHTS -- Part One: Nature of the Problem -- Chapter Two: Manifestations of Aggression: Terrorism, Crime, and War -- INTRODUCTION -- TERRORISM AS CRIME -- State Laws -- Federal Law -- TERRORISM AS WAR -- IMPLICATIONS OF CONCEPTUAL APPROACHES FOR DEALING WITH TERRORISM -- CONCLUSION -- REFERENCES -- CASES CITED -- Chapter Three: The Etiology of Terrorism: Identifying, Defining, and Studying Terrorists -- DEFINING TERRORISM -- TERRORIST ACTORS -- MYTHS BROUGHT ABOUT FROM PROBLEMS WITH DEFINITION AND TYPOLOGY -- DATA ISSUES -- CONCLUSION -- REFERENCES -- Chapter Four: Balancing Counterterrorism Strategies: Lessons from Evolutionary Ecology -- INTRODUCTION -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE -- EVOLUTIONARY ECOLOGY AND TERRORIST ACTS -- THE INDIVIDUAL: RISK FACTORS FOR TERRORISM -- MOTIVATION FOR TERRORISM -- SITUATION, OPPORTUNITY, AND TERRORISM -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE ON COUNTERTERRORISM -- MODELING COUNTER-STRATEGIC BALANCE -- IMPROVED COUNTERTERRORIST STRATEGIES -- DETERRENCE -- ALTERNATIVE BEHAVIORS -- CONCLUSION -- REFERENCES -- Chapter Five: Gangs, Crime, and Terrorism -- THEORETICAL PERSPECTIVES -- THE ALLIANCE MODEL OF TERRORIST AND GANGS RELATIONS -- Gang Organization -- Gang Access to Resources from Drug Sales -- Global Interconnectivity of Gangs -- THE EL RUKN STREET GANG-LIBYA ALLIANCE -- A RECRUITMENT MODEL -- THE CRIMINAL JUSTICE SYSTEM RESPONSE -- REFERENCES -- Chapter Six: Women Terrorists -- INTRODUCTION -- A Brief History of the Role of Women in Terrorism -- Importance of Women in Terrorism Today.

CASE STUDIES: THE WOMEN WHO JOIN TERRORIST ORGANIZATIONS -- The Roles Women Assume in Terrorist Organizations -- Demographic Characteristics of Women in Terrorist Organizations -- CONCLUSIONS: THE REASONS WHY WOMEN JOIN TERRORIST ORGANIZATIONS -- BIBLIOGRAPHY -- Part Two: Strategies for Intervention -- Chapter Seven: Is Crime Prevention Relevant to Counterterrorism? -- INTRODUCTION -- A FRAMEWORK FOR CRIME PREVENTION -- THE RELEVANCE OF THE MATRIX TO COUNTERTERRORISM INTERVENTIONS -- GUIDANCE IN USING CRIME PREVENTION CONCEPTS FOR COUNTERTERRORISM INTERVENTIONS -- HOW CAN CRIMINOLOGISTS CONTRIBUTE? -- REFERENCES -- Chapter Eight: Implications of Opportunity Theory for Combating Terrorism -- INTRODUCTION -- OPPORTUNITY THEORY -- Defining Opportunity -- TESTING OPPORTUNITY THEORY -- Evaluations of Interventions -- Naturally and Routinely Occurring Variation in Opportunity -- Addressing Displacement and Substitution -- Summary -- CAN OPPORTUNITY THEORY BE USED TO UNDERSTAND AND COMBAT TERRORISM? -- Terrorism and Ordinary Street Crime -- Building a Theory of Opportunity for Terrorism -- Summary -- OPPORTUNITY REDUCTION TO REDUCE FEAR, NOT TERRORISM -- Why Study the Opportunity-Fear Relationship? -- Opportunity Reduction and Fear of Ordinary Street Crime -- Communities and Crime -- Evaluation of Specific Opportunity Reduction Initiatives -- CONCLUSION -- REFERENCES -- Chapter Nine: Soldiers and Spies, Police and Detectives -- INTRODUCTION -- CHANGES IN THE EXTERNAL ENVIRONMENT -- Military -- Police -- ADJUSTMENTS TO THE CHANGES -- Military -- Police -- CONCLUSIONS -- REFERENCES -- Chapter Ten: Community Policing and Terrorism: Problems and Prospects for Local Community Security -- INTRODUCTION -- DEMOCRATIC POLICING AND COMMUNITY TOLERANCE FOR POLICE INTERVENTION -- THE RISE OF COMMUNITY- AND PROBLEM-ORIENTED POLICING.

PROBLEM-ORIENTED POLICING: AN APPLICATION -- ZERO-TOLERANCE POLICING -- EXTENDING COMMUNITY-, PROBLEM-ORIENTED, AND ZERO-TOLERANCE POLICING TO TERRORISM - THE PROBLEMS -- MAPPING COP/POP TO TERRORISM PREVENTION, CONTROL, AND RESPONSE -- CAN COP/POP BE MADE TO WORK FOR TERRORISM? -- ARE COP/POP INFORMATION AND ANALYTICS USEFUL TO UNDERSTANDING TERRORISM? -- CAN COP/POP STRATEGIES AND TACTICS INFORM TERRORISM RESPONSES? -- CAN PARTNERSHIPS BE EXTENDED TO TERRORISM PREVENTION? -- WHAT ABOUT INSTITUTIONAL LEGITIMACY? -- THE PROSPECTS FOR COP AND POP AS TERRORISM RESPONSES -- CONCLUSION -- REFERENCES -- Chapter Eleven: Go Analyze!: (Connecting the Dots) -- FIRST COUNTEREXAMPLE: THE CASE OF AL-MIHDHAR AND AL-HAZMI -- A Lapse of Surveillance -- What Went Wrong? -- SECOND COUNTEREXAMPLE: GENESIS OF THE 9/11 ATTACKS -- The Looming 9/11 Attacks -- What Went Wrong? -- THE ROLE OF POLICE IN COUNTERTERRORISM -- The Police and the Cult of Evidence -- New Police Cultures -- THE LOGIC OF CONNECTING THE DOTS -- PROPOSED REFORMS -- CONCLUSION -- REFERENCES -- Chapter Twelve: Managing the Fear of Terrorism -- THE PROBLEM OF FEAR IN THE ERA OF TERRORISM -- FEAR AND RISK OF TERRORIST ACTS -- The Nature and Sources of Fear -- Fear and Risk -- THE ROLE OF THE MEDIA -- THE ROLE OF POLITICS -- FEAR AND PUBLIC POLICY -- AN AGENDA FOR REDUCING THE SOCIAL COSTS OF FEAR -- REFERENCES -- Chapter Thirteen: Should Profiling Be Used to Prevent Terrorism? -- INTRODUCTION -- WHAT IS RACIAL PROFILING? -- Who is Affected by Racial Profiling and How are They Affected? -- How is Racial Profiling Being Used? -- How Effective is Racial Profiling in Reducing Crime? -- What Can We Conclude about Racial and Ethnic Profiling? -- LEGAL AND CONSTITUTIONAL ISSUES RELATED TO RACIAL PROFILING -- TERRORISM -- Terrorism and Profiling -- Who are the Terrorists?.

HOW EFFECTIVE IS RACIAL PROFILING IN REDUCING TERRORISM? -- RACIAL PROFILING AS A CRIME CONTROL POLICY -- WHAT CAN WE CONCLUDE ABOUT RACIAL PROFILING AND TERRORISM? -- REFERENCES -- Chapter Fourteen: Federal-Local Coordination in Homeland Security -- INTRODUCTION -- INTERORGANIZATIONAL NETWORKS -- THE ROLE OF THE FEDERAL GOVERNMENT -- The Joint Terrorism Task Forces -- Coordinating with State and Local Governments -- Other Federal Roles -- THE ROLE OF LOCAL GOVERNMENT -- The Local Role -- Prevention -- Response and Recovery -- Investigation -- THINKING ABOUT NETWORKS -- Prevention -- Response and Recovery -- Investigation -- CONCLUSION -- REFERENCES -- Chapter Fifteen: Liberty and Security in an Era of Terrorism -- INTRODUCTION -- LIBERTY -- Freedom -- Liberty -- Privacy -- SECURITY -- AN ERA OF TERRORISM? -- BALANCES, TRADE-OFFS, AND JUDGMENTS -- Balances -- Trade-Offs -- Judgment -- REFERENCES -- Chapter Sixteen: Regulating Terrorism -- RECONSIDERING DETERRENCE -- RECONSIDERING JUSTICE -- CONTAINMENT AND ENLARGEMENT -- THE TORN WEB OF U.S. CONTROLS ON TERRORISM -- THE PUBLIC HEALTH MODEL -- TOWARD AN EVIDENCE-BASED POLICY ON EXTREMISM -- CONCLUSION -- REFERENCES -- Part Three: Thinking About Tomorrow -- Chapter Seventeen: Using Open Source Data to Counter Common Myths about Terrorism -- THE EXTENT OF TERRORISM -- MYTH 1: Terrorist Attacks Reach Every Corner of the World -- MYTH 2: Terrorist Attacks were Rapidly Increasing in the Years Leading up to 9/11 -- MYTH 3: The United States is More Frequently Targeted by Terrorists than any Other Country in the World -- THE SOURCES OF TERRORISM -- MYTH 4: Most Terrorist Attacks Involve Disgruntled Groups and Individuals from One Country Carrying Out Attacks on Civilians in Other Countries -- MYTH 5: Terrorism is Unrelated to Traditional Political Grievances.

THE LETHALITY OF TERRORISM AND THE RESILIENCE OF TERRORIST GROUPS -- MYTH 6: Most Terrorist Attacks are Incredibly Lethal -- MYTH 7: Most Terrorist Attacks Rely on Sophisticated Weaponry -- MYTH 8: Most Terrorist Organizations are Long Lasting and Difficult to Eradicate -- COUNTERTERRORISM -- MYTH 9: Terrorist Groups are Impervious to Governmental Counterterrorist Policies and Rarely Make Mistakes -- MYTH 10: To be Effective Against Terrorism, Governments Must Strike Back Rapidly and Forcefully -- DISCUSSION AND CONCLUSIONS -- REFERENCES -- Chapter Eighteen: Criminal Justice and Terrorism: A Research Agenda -- INTRODUCTION -- LESSONS LEARNED: DEFINITIONS ARE NEEDED, AND SO IS FLEXIBILITY -- LESSONS LEARNED: INTERACTIONS AND TYPOLOGIES OF TERRORISM -- LESSONS LEARNED: THE BARRIERS TO EMPIRICAL RESEARCH ON TERRORISM ARE FORMIDABLE -- PROSPECTS FOR RESEARCH ON TERRORISM -- Adapting Crime Prevention Models to Terrorism -- Estimating the Social Costs of Terrorism and Counterterrorism Policy -- Other Prospects -- CONCLUSION -- REFERENCES -- Index.

This volume presents 19 original essays addressing issues surrounding terrorism from the unique perspective of criminology.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha