Pub Date : 2021-01-01DOI: 10.4018/IJCWT.2021010102
D. Atsa’am, R. Wario
This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.
{"title":"Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property","authors":"D. Atsa’am, R. Wario","doi":"10.4018/IJCWT.2021010102","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010102","url":null,"abstract":"This study extracted knowledge on the association between terrorism inclusion criteria and one of the terrorism target/victim types known as “private citizens and property.” Three criteria determine what constitutes a terror attack: Criterion 1: the action is done with intention to attain a political, economic, religious, or social goal; Criterion 2: the action is done with the intention to coerce, intimidate or publicize to larger audience(s); Criterion 3: the action is outside international humanitarian law. Literally, all terror incidents satify Criterion 3. As for Criteria 1 and 2, the odds ratio was deployed on the global terrorism database, consisting of 170,350 records of terrorist attack incidents, to evaluate the nexus between each of these criteria and terror attacks on private citizens and property. The results showed that any terror attack on private citizens and property is 2.2 times more likely to have been perpetrated by a terror group in order to achieve Criterion 2 than to achieve Criterion 1. The implications of the outcome in counterterrorism are discussed.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"20 7 1","pages":"20-30"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83471218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.4018/IJCWT.2021010101
S. Joshua, S. Idowu, F. O. Olanrewaju
The world is currently faced with the problem of refugees and internally displaced persons (IDPs). Africa and Middle East has the highest figure of IDPs. Nigeria tops the list of countries with largest population of IDPs in Africa. The Boko Haram insurgency has made Nigeria one of the flash points of high concentration of IDPs. Anchored on forced /involuntary migration theory, using primary and secondary data gathering techniques, the study examines insurgency and conditions of IDPs camps in Nigeria, focusing on NYSC camp in Girei Local Government, Adamawa State. The study finds that the condition in NYSC IDP camp is deplorable as IDPs lack access to basic essentials of life. The study recommends among others the need for the government to be more committed to the welfare of IDPs and also curb corruption of government officials in the camp as this has worsen the already deplorable condition of IDPs.
{"title":"Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian Conditions in IDP Camps in Nigeria","authors":"S. Joshua, S. Idowu, F. O. Olanrewaju","doi":"10.4018/IJCWT.2021010101","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010101","url":null,"abstract":"The world is currently faced with the problem of refugees and internally displaced persons (IDPs). Africa and Middle East has the highest figure of IDPs. Nigeria tops the list of countries with largest population of IDPs in Africa. The Boko Haram insurgency has made Nigeria one of the flash points of high concentration of IDPs. Anchored on forced /involuntary migration theory, using primary and secondary data gathering techniques, the study examines insurgency and conditions of IDPs camps in Nigeria, focusing on NYSC camp in Girei Local Government, Adamawa State. The study finds that the condition in NYSC IDP camp is deplorable as IDPs lack access to basic essentials of life. The study recommends among others the need for the government to be more committed to the welfare of IDPs and also curb corruption of government officials in the camp as this has worsen the already deplorable condition of IDPs.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"22 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77238922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.4018/IJCWT.2021010103
Yinka Olomojobi, Odusanya Temitope Omotola
Terrorism is ubiquitous. Most states around the world have experienced some form of terrorism. Terrorism has undermined the profile of Nigeria and has generated a tense and fragile political system. This paper underscores that the prevalence of grievance and the lack of an innovative economic base in Nigeria are amongst the key factors that stimulate terrorism in the state. In Nigeria, terrorist activities have become endemic. A cursory look on these activities has proven that social media has become a source for propagating terrorism. This has generated multifarious security challenges as well. This paper is aimed at analyzing terrorism and social media. It further proceeds to examine the main thrust of the paper submitting that social media is a viable tool for terrorists. From this standpoint, the paper explores a case study analysis to further explain and evaluate the symbiotic relationship between social media and terrorism in Nigeria.
{"title":"Social Media: A Protagonist for Terrorism","authors":"Yinka Olomojobi, Odusanya Temitope Omotola","doi":"10.4018/IJCWT.2021010103","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010103","url":null,"abstract":"Terrorism is ubiquitous. Most states around the world have experienced some form of terrorism. Terrorism has undermined the profile of Nigeria and has generated a tense and fragile political system. This paper underscores that the prevalence of grievance and the lack of an innovative economic base in Nigeria are amongst the key factors that stimulate terrorism in the state. In Nigeria, terrorist activities have become endemic. A cursory look on these activities has proven that social media has become a source for propagating terrorism. This has generated multifarious security challenges as well. This paper is aimed at analyzing terrorism and social media. It further proceeds to examine the main thrust of the paper submitting that social media is a viable tool for terrorists. From this standpoint, the paper explores a case study analysis to further explain and evaluate the symbiotic relationship between social media and terrorism in Nigeria.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"10 1","pages":"31-44"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81960032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.4018/IJCWT.2021010104
M. Korstanje
The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact with radicalized cells. For this reason, specialists traverse for many problems to understand the complexity of terrorism as well as the motivation of young lone-wolves to attack societies where they are native. The present conceptual research focuses not only on the borders of travel literature but also the colonial stereotypes forged during the European expansion to draw and model an “alterity” strictly limited to the ideals of the Enlightenment. In a nutshell, the allegories revolving around the “lone-wolf terrorism” continues the imprint of the “archetype of the noble savage” coined in 18th century.
{"title":"Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas, Contradictions, and Opportunities for the Next Decade","authors":"M. Korstanje","doi":"10.4018/IJCWT.2021010104","DOIUrl":"https://doi.org/10.4018/IJCWT.2021010104","url":null,"abstract":"The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact with radicalized cells. For this reason, specialists traverse for many problems to understand the complexity of terrorism as well as the motivation of young lone-wolves to attack societies where they are native. The present conceptual research focuses not only on the borders of travel literature but also the colonial stereotypes forged during the European expansion to draw and model an “alterity” strictly limited to the ideals of the Enlightenment. In a nutshell, the allegories revolving around the “lone-wolf terrorism” continues the imprint of the “archetype of the noble savage” coined in 18th century.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"17 1","pages":"45-56"},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78491586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/IJCWT.2020100101
Keshnee Padayachee
This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.
{"title":"Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour","authors":"Keshnee Padayachee","doi":"10.4018/IJCWT.2020100101","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100101","url":null,"abstract":"This study considers the framework of neutralization techniques, which responds to the attitude/rationalization leg of the fraud triangle with respect to the dark triad of personality traits' predictability toward compliant cybersecurity behaviour. Logically, organizations focus on reducing the insider's motivation and opportunities for malfeasance. However, it may be prudent to consider the rationalization for insider crime, which is arguably the most obscure element. This study is a unique contribution as it considers both the roles of neutralization techniques and the dark triad of personality traits with respect to insider threats and compliance intention. Furthermore, the specific categories of neutralization techniques will be considered as antecedents towards insider maleficence.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"6 1","pages":"1-19"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79980406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/IJCWT.2020100103
Trishana Ramluckan
With the approval of Articles 11 and 13 in Europe, net neutrality has become a contentious issue globally. These articles refer to European Union (EU) copyright law, which could possibly destroy the freedom of the internet that once existed. Throughout Europe it has become known as the “meme ban,” referring to the censorship elements. While there is much opposition to these articles, its supporters consider it necessary for the preservation for creative works online. Opposition to the legislation, which includes certain websites and internet presences, remains of the opinion that these two pieces of legislation will mean an end to “meme culture and user-generated content.” Along with the limitation to the freedom of the internet, cyber-security and cyber-warfare risks and vulnerabilities are imminent. This paper seeks to provide an in-depth discussion on the implications of neutrality on cyber-security and cyber-warfare.
{"title":"A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare","authors":"Trishana Ramluckan","doi":"10.4018/IJCWT.2020100103","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100103","url":null,"abstract":"With the approval of Articles 11 and 13 in Europe, net neutrality has become a contentious issue globally. These articles refer to European Union (EU) copyright law, which could possibly destroy the freedom of the internet that once existed. Throughout Europe it has become known as the “meme ban,” referring to the censorship elements. While there is much opposition to these articles, its supporters consider it necessary for the preservation for creative works online. Opposition to the legislation, which includes certain websites and internet presences, remains of the opinion that these two pieces of legislation will mean an end to “meme culture and user-generated content.” Along with the limitation to the freedom of the internet, cyber-security and cyber-warfare risks and vulnerabilities are imminent. This paper seeks to provide an in-depth discussion on the implications of neutrality on cyber-security and cyber-warfare.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"63 1","pages":"36-47"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87566995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/IJCWT.2020100102
D. N. Morah, O. Oladokun
The news sociology and news determinism perspectives do project both the integrationist and disintegrative capabilities of the media. This projection is premised on their agenda-setting tradition, meaning that the social responsibility performance credential of the reporter can help build a nation or be a factor of the collapse of social control. This work explores this oxymoron by examining terrorism reporting and how it impacts on ethnic relations among the three dominant regions in Nigeria. A total of 400 respondents from Southeast and Southwest Nigeria respond to seven items on their relationship with the Northern Region that has been affected by the activities of the terror group Boko Haram. The findings portray a violent nature of the Northern Region. However, they do not support six of the media-framed and widely-held assumptions by the southerners about the conflict, including the statement that the insurgents represent northerners' interest. The media can scale down ethnic tension by publishing and framing stories that promote de-escalation.
{"title":"Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria","authors":"D. N. Morah, O. Oladokun","doi":"10.4018/IJCWT.2020100102","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100102","url":null,"abstract":"The news sociology and news determinism perspectives do project both the integrationist and disintegrative capabilities of the media. This projection is premised on their agenda-setting tradition, meaning that the social responsibility performance credential of the reporter can help build a nation or be a factor of the collapse of social control. This work explores this oxymoron by examining terrorism reporting and how it impacts on ethnic relations among the three dominant regions in Nigeria. A total of 400 respondents from Southeast and Southwest Nigeria respond to seven items on their relationship with the Northern Region that has been affected by the activities of the terror group Boko Haram. The findings portray a violent nature of the Northern Region. However, they do not support six of the media-framed and widely-held assumptions by the southerners about the conflict, including the statement that the insurgents represent northerners' interest. The media can scale down ethnic tension by publishing and framing stories that promote de-escalation.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"24 1","pages":"20-35"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90503773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/IJCWT.2020100104
Jawad Hussain Awan, S. Memon, Azhar Shah, K. Pathan
This paper proposes a framework for a smart transportation system of Pakistan and discusses modern approaches as solutions to emerging threats and vulnerabilities of STS. In addition, STS changes the life of people and decreases the number of accidents, deaths, and traffic incidents. STS is saving the time of users and makes the urban city even smarter. The aim of STS is to accomplish more efficiency of traffic by decreasing traffic issues. It also provides the information about route traffic toward destination, local expediency, passing, vehicle dynamic or requested information, availability of seats to users, which decreases journey time of commuters and improves their security and ease. This paper discusses STS, its application and working mechanism, and the main parameters of the proposed framework of STS of Pakistan such as road condition monitoring, traffic management, municipal involvement, link data for society, accidental measures, and security, which are necessary while designing or implementing such systems.
{"title":"Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions","authors":"Jawad Hussain Awan, S. Memon, Azhar Shah, K. Pathan","doi":"10.4018/IJCWT.2020100104","DOIUrl":"https://doi.org/10.4018/IJCWT.2020100104","url":null,"abstract":"This paper proposes a framework for a smart transportation system of Pakistan and discusses modern approaches as solutions to emerging threats and vulnerabilities of STS. In addition, STS changes the life of people and decreases the number of accidents, deaths, and traffic incidents. STS is saving the time of users and makes the urban city even smarter. The aim of STS is to accomplish more efficiency of traffic by decreasing traffic issues. It also provides the information about route traffic toward destination, local expediency, passing, vehicle dynamic or requested information, availability of seats to users, which decreases journey time of commuters and improves their security and ease. This paper discusses STS, its application and working mechanism, and the main parameters of the proposed framework of STS of Pakistan such as road condition monitoring, traffic management, municipal involvement, link data for society, accidental measures, and security, which are necessary while designing or implementing such systems.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"111 1","pages":"48-63"},"PeriodicalIF":0.5,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80990005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijcwt.2020070102
M. Warren
Social media impacts all aspects of society from citizens to businesses, but also political parties. The article proposes a new social media engagement model that evaluates political cyber operations and the success of such campaigns during elections. The article will use the Cook Islands 2018 general election to validate the model.
{"title":"Political Cyber Operations: A South Pacific Case Study","authors":"M. Warren","doi":"10.4018/ijcwt.2020070102","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070102","url":null,"abstract":"Social media impacts all aspects of society from citizens to businesses, but also political parties. The article proposes a new social media engagement model that evaluates political cyber operations and the success of such campaigns during elections. The article will use the Cook Islands 2018 general election to validate the model.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"15 1","pages":"15-27"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84718541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijcwt.2020070103
Helaine Leggat
The Tallinn Manual on the International Law Applicable to Cyber Warfare (2013) sets out ninety-five ‘black-letter rules' governing conflicts and the basis for each in treaty and customary law. An earlier version of this article considered the applicability of national law to cyberspace. Specifically, whether there was sufficient basis at a national law level to establish norms for acceptable behavior at an international level. The proposition being it is time for a new kind of international cooperation in relation to cyber warfare and acceptable norms of behavior in cyberspace. This article provides detail from various national statutes to illustrate how national law applies to cyberspace. Both papers consider the applicability of current national criminal and tort law by using hypothetical scenarios in relation to self-defence, conspiracy and corporate responsibility in the private sector. The intention is to encourage experts to cooperate internationally to recognise national rules equivalent to the Tallinn work.
{"title":"Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace","authors":"Helaine Leggat","doi":"10.4018/ijcwt.2020070103","DOIUrl":"https://doi.org/10.4018/ijcwt.2020070103","url":null,"abstract":"The Tallinn Manual on the International Law Applicable to Cyber Warfare (2013) sets out ninety-five ‘black-letter rules' governing conflicts and the basis for each in treaty and customary law. An earlier version of this article considered the applicability of national law to cyberspace. Specifically, whether there was sufficient basis at a national law level to establish norms for acceptable behavior at an international level. The proposition being it is time for a new kind of international cooperation in relation to cyber warfare and acceptable norms of behavior in cyberspace. This article provides detail from various national statutes to illustrate how national law applies to cyberspace. Both papers consider the applicability of current national criminal and tort law by using hypothetical scenarios in relation to self-defence, conspiracy and corporate responsibility in the private sector. The intention is to encourage experts to cooperate internationally to recognise national rules equivalent to the Tallinn work.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"272 1","pages":"28-46"},"PeriodicalIF":0.5,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79929381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}