Matching Items (2)
Filtering by

Clear all filters

153304-Thumbnail Image.png
Description
This dissertation explores the various online radicalization and recruitment practices of groups like al-Qaeda and Hezbollah, as well as Salafi Jihadists in general. I will also outline the inadequacies of the federal government's engagement with terrorist / Islamist ideologies and explore the ways in which early 20th century foundational Islamist

This dissertation explores the various online radicalization and recruitment practices of groups like al-Qaeda and Hezbollah, as well as Salafi Jihadists in general. I will also outline the inadequacies of the federal government's engagement with terrorist / Islamist ideologies and explore the ways in which early 20th century foundational Islamist theorists like Hasan al-Banna, Sayyid Qutb, and Abul ala Mawdudi have affected contemporary extremist Islamist groups, while exploring this myth of the ideal caliphate which persists in the ideology of contemporary extremist Islamist groups. In a larger sense, I am arguing that exploitation of the internet (particularly social networking platforms) in the radicalization of new communities of followers is much more dangerous than cyberterrorism (as in attacks on cyber networks within the government and the private sector), which is what is most often considered to be the primary threat that terrorists pose with their presence on the internet. Online radicalization should, I argue, be given more consideration when forming public policy because of the immediate danger that it poses, especially given the rise of microterrorism. Similarly, through the case studies that I am examining, I am bringing the humanities into the discussion of extremist (religious) rhetorics, an area of discourse that those scholars have largely ignored.
ContributorsSalihu, Flurije (Author) / Ali, Souad T. (Thesis advisor) / Miller, Keith (Thesis advisor) / Corman, Steven (Committee member) / Gee, James P (Committee member) / Arizona State University (Publisher)
Created2014
166650-Thumbnail Image.png
Description
Threats to critical infrastructure are increasing, especially within the water industry. The purpose of this study was to evaluate the history of water attacks within the United States, determine the vulnerabilities, examine current and future methods of attack, and identify potential trends. Risk assessments of the water supply systems were

Threats to critical infrastructure are increasing, especially within the water industry. The purpose of this study was to evaluate the history of water attacks within the United States, determine the vulnerabilities, examine current and future methods of attack, and identify potential trends. Risk assessments of the water supply systems were evaluated based on threats, vulnerabilities, and consequences according to the 4 attack methods: physical, cyber, biological, and chemical. Each attack method was given a comprehensive background in the context of historical evidence, vulnerabilities, prevention, and response to a potential attack. In analyzing the risk assessment of water supply systems, it was determined that a majority of the vulnerabilities are due to outdated equipment or structure failure. Additionally, the increase in cyber-attacks worldwide signals a threat the U.S. is unprepared for. Therefore, physical, cyber, biological, and chemical attacks can be best mitigated through prevention and detection. Some prevention methods include establishing emergency protocols, training employees in risk management, and running emergency simulations.
ContributorsBove, Madison (Author) / Boyer, Treavor (Thesis director) / Richard, Rain (Committee member) / Barrett, The Honors College (Contributor) / School of Molecular Sciences (Contributor) / School of Politics and Global Studies (Contributor)
Created2022-05