Academic literature on the topic 'Terrorists – Recruiting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Terrorists – Recruiting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Terrorists – Recruiting"

1

Kim, Eun Young, and Min Woo Yun. "Islamic terrorists propaganda in cyberspace." Korean Association of Criminal Psychology 18, no. 2 (June 30, 2022): 37–50. http://dx.doi.org/10.25277/kcpr.2022.18.2.37.

Full text
Abstract:
Today, the cyberspace became a very important battle field of psychological warfare where terrorist groups are spreading propaganda, recruiting terrorists, and justifying their violent terror attacks. However, there are still a lack of literature investigating terrorist propaganda in cyberspace as a cyber warfare. Therefore, this study explores recent propaganda activities of terrorists in cyber space, its influence on the followers in social network, and countermeasure efforts. The findings of this study suggest that the wining of the new battle field becomes one of the most imminent and important tasks for military, intelligence communities, and counterterrorism authorities. In conclusion, the authors discuss academic and policy implications of the findings and suggest future research directions.
APA, Harvard, Vancouver, ISO, and other styles
2

Vasnetsova, Anastasiya Sergeevna. "Criminological characteristics of the heads of organized crime groups related to terrorism (the first stage of criminological research)." Полицейская деятельность, no. 6 (June 2020): 37–63. http://dx.doi.org/10.7256/2454-0692.2020.6.34318.

Full text
Abstract:
One of the most widespread directions of counterterrorism efforts is a targeted influence on the potential terrorists before they actually start their terrorist activity. To perform this complicated task, it is necessary to have the exact information about the characteristics of such personalities, which can be collected only by means of scientific interpretation of various significant data. It can help to find out what factors promote the formation of a personality of a terrorist and choose the measures aimed at their elimination thus preventing terrorist organizations from recruiting new members. The author studies such factors as the motive and the circumstances characterising the personality of a convict, which are subject to proving in the course of criminal proceedings according to part 1, article 73 of the Criminal Procedure Code of the Russian Federation. The author formulates the following conclusions: crimes of terrorism are ususally committed by young men (under the age of 30) with a low level of education; the increase of immigration to the Russian Federation leads to the increase of the number of the members of international terrorist organizations in the country; the reasons and  conditions leading to terrorist crimes are not being studied sufficiently enough; there is an interrelation between the criminological characteristics of terrorists’ personalities and the mechanisms of their involvement into terrorist activity, and the specificity of the roles performed by them in an organized crime group; the social sphere of regular terrorists is narrow, which determines their susceptibility to the terrorist ideology.   
APA, Harvard, Vancouver, ISO, and other styles
3

Tanuwijaya, Fanny, and Sunardi Sunardi. "MENGGALAKKAN DEKONSTRUKSI TERHADAP BIBIT-BIBIT TERORISME DI INDONESIA." Yurispruden 1, no. 1 (January 24, 2018): 71. http://dx.doi.org/10.33474/yur.v1i1.738.

Full text
Abstract:
ABSTRACTTerrorism is one of extraordinary crimes. The extraordinary of this crime is not only because it can cause serious impacts on the community life in general, but it also because of its ability to establish regeneration. This terrorist organization is quite successful in recruiting new members. This effectively encourages the willingness and the commitment of their members in conducting serious crimes in relation to terrorists conducts. In this circumstance, it is quite reasonable that all parties are encouraged to respond critically by deconstructing those terrorists’ regenerations. Keywords: Terrorism, Regeneration, Deconstruction, Society, Nation ABSTRAKTeroris merupakan salah satu jenis kejahatan isimewa (extraordinary crime). Keistimewaan kejahatan ini bukan semata disebabkan dampaknya yang serius terhadap kehidupan bermasyarakat dan berbangsa, tetapi juga dari sepek kemampuannya dalam membangun regenerasi. Organisasi teroris ini tergolong sukses dalam melakukan pembimbitan kader, sehingga untuk menjalankan modus operandi yang tergolong mengerikan, ada saja kader yang mau melaksanakannya. Berdasarkan kondisi ini, logis jika semua pihak dituntut melakukan dekonstruksi terhadap kaderisasi teroris.Kata Kunci: Terorisme, Kaderisasi, Dekonstruksi, Masyarakat, Negara.
APA, Harvard, Vancouver, ISO, and other styles
4

Khokhlov, I. "Some Approaches to Interpretation of Terrorism Phenomenon." World Economy and International Relations, no. 5 (2015): 19–28. http://dx.doi.org/10.20542/0131-2227-2015-5-19-28.

Full text
Abstract:
In this work the author discusses certain motivation aspects of the lower- and medium-level members of terrorist networks. It should be noted that the analysis of drivers for terrorist activity cannot be reduced to a single factor; in each case, a range of reasons, often interdependent and complementary, should be taken into account, as well as social, political and economic conditions "favorable" for the development of terrorism. Since the 1990s, and especially after 9/11, the studies of terrorism became more and more relevant. In this period, enormous research has been conducted regarding the logistics of a terrorist network, recruiting techniques and terrorist finance tracking. It has to be said that such research has greatly influenced the methods used today to fight terrorists in deep hiding. However, despite the ample analysis, scholars often miss one of the key elements of terrorism – the motivation of rank-and-file members of terrorist organizations that makes them give up their ambitions within the limits of universally accepted social behavior and seek to give way to their energy in the form of terrorism. Unlike the traditional criminal path which is chosen for lucrative reasons, participation in terrorist activities cannot be explained the same way.
APA, Harvard, Vancouver, ISO, and other styles
5

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (December 18, 2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Full text
Abstract:
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terrorist actors to expand the network by developing and recruiting new members. The threat of Islamic terrorism is categorized as a national security threat. The Indonesian Government through its security apparatus still have to work hard to hunt down other terrorists, to undertake preventive efforts to prevent Islamic fundamentalist beliefs not to develop and increased education level and the understanding of Islam more comprehensively.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
6

Humaizi, R. Hamdani Harahap, Ridwan Hanafiah, and Rudi Salam Sinaga. "PENDAYAGUNAAN KELOMPOK DISKUSI MAHASISWA DALAM MENANGKAL PAHAM RADIKALISME DAN PAHAM TERORISME DI LINGKUNGAN PERGURUAN TINGGI." ABDIMAS TALENTA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (July 9, 2018): 63–67. http://dx.doi.org/10.32734/abdimastalenta.v3i1.2348.

Full text
Abstract:
Terrorism groups have obviously put their attention to recruiting new members of educated people like college-age students, a number of terrorists who have been caught showing their status as students or college students. We consider one of the most important ways to be cultivated in a college environment by conducting radical anti-radical and anti-terrorist campaigns and campaigning the right way to deal with situations that focus on radical thinking and action and terrorism. This study will look at students' perceptions within the Faculty of Social and Political Sciences of the University of North Sumatra against the danger of radical understanding and understanding of terrorism and prevention solutions for the safety of their surrounding environment. The method used in this study is literature study, documentation and focus group discussion (FGD). The results of this study show a strong appreciation of student discussion groups on the intent and purpose of this activity
APA, Harvard, Vancouver, ISO, and other styles
7

Zelenkov, Mikhail Y., Vladimir G. Ponomarev, Valery V. Gusev, Anatoly N. Andreev, and Oleg N. Makarov. "Identification of Advertising Trends in the Mass Media and On the Internet Used by Modern Terrorism." Cuestiones Políticas 37, no. 65 (August 6, 2020): 382–98. http://dx.doi.org/10.46398/cuestpol.3865.26.

Full text
Abstract:
The authors have set themselves the goal of analyzing the mass media and coverage of terrorist attacks on the Internet, to assess their impact on the growing number of terrorists in the world based on this analysis. The methodological basis of this research is represented by the comprehensive approach, which allowed identifying and corroborating the need to restructure the media and the Internet to combat modern terrorism. The epistemological potential of the statistical and sociological methods used within quantitative and qualitative research makes it possible to properly interpret the results of scientific research devoted to the subject of analysis. The results suggest that current activity by the media and Internet users encourages the growth in the number of terrorist acts in the world and improves the efficiency of recruiting newcomers to terrorist organizations. Furthermore, optimal ways of restructuring social media and expanding the scope of control of the operation of the Internet without violating freedom of expression and the right of citizens to free access to information are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Kapsokoli, Eleni. "Cyber-jihad in the Western Balkans." National security and the future 22, no. 3 (December 22, 2021): 37–58. http://dx.doi.org/10.37458/nstf.22.3.5.

Full text
Abstract:
During the last two decades, the growing threat of Islamic terrorism has raised numerous security challenges for both states and non-state actors. Cyberspace is weaponized by actors who conduct malicious activities, in order to achieve their goals. Terrorist organizations reflect the darker side of cyberspace. Terrorists use cyberspace to collect data, raise funds, conduct propaganda, spread radical ideologies and hate speech as well as for the purposes of radicalization, recruitment and operational planning. Social media platforms provide a fertile ground to extend the radical ideologies, to spread terror and to connect with people who share the same views. ISIS is considered a pioneer in utilizing the benefits that cyberspace offers. The Western Balkans is a region where ISIS is recruiting foreign fighters and lone-wolves. The European Union is the driving force for the activation of Western Balkans in countering cyberterrorism and developing relevant strategies.
APA, Harvard, Vancouver, ISO, and other styles
9

Choi, Kyung-shick, Claire Seungeun Lee, and Robert Cadigan. "Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS." International Journal of Cybersecurity Intelligence and Cybercrime 1, no. 1 (August 15, 2018): 21–39. http://dx.doi.org/10.52306/01010418zdcd5438.

Full text
Abstract:
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were used primarily for propagating certain ideologies and for recruiting members for Al Qaeda and ISIS. Al Qaeda-affiliated cyberterrorists used YouTube videos as both individual sources and embedded sources for Facebook and Twitter, whereas ISIS-affiliated cyberterrorists predominantly used YouTube videos and Twitter posts.
APA, Harvard, Vancouver, ISO, and other styles
10

Bardhan, Soumia, and Daniel Cutter. "Recruiting Foreign Warriors: Moral and Temporal Tropes in the Islamic State’s Dabiq." Rhetoric and Public Affairs 24, no. 3 (September 1, 2021): 483–520. http://dx.doi.org/10.14321/rhetpublaffa.24.3.0483.

Full text
Abstract:
Abstract To commemorate its declaration of a global khilafah in 2014, the Islamic State (IS) began publishing an online magazine, Dabiq, which became one of its primary recruiting tools during its rise to infamy. By using rhetoric that recalls U.S. presidential war rhetoric, specifically, tropes of “justice” and “time,” the English-language version of Dabiq fulfilled both subversive and hegemonic functions. It disrupted the reductive discourse that equates Islamic terrorists only with barbaric aggression and rendered IS as a rational global actor. Through this subversive move, IS aligned its anti-imperial interests with potential recruits in English-speaking Western countries with similar proclivities. At the same time, through its use of dominant Western war tropes, IS made a hegemonic attempt to facilitate recruits’ cultural identification so they assume a congruence of interests with IS, leading to an alignment of motives. Dabiq thus fulfilled an imperial trajectory through (neo)imperial rhetorics of identification and control. IS’s strategic use of (neo)imperial tropes in English—language of the empire—in Dabiq hence complicates monolithic (and Oriental) perceptions of the relationship between empire, imperialism, and Islamic terrorism in contemporary global political discourse. In addition, the significance of (neo) imperial tropes expands the heuristic scope of the rhetoric of terrorism by highlighting the implications of imperial ambitions and use of (neo)imperial rhetoric for the rise of global Islamic terrorism.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Terrorists – Recruiting"

1

Ucak, Hursit. "Law Enforcement Intelligence Recruiting Confidential Informants within “Religion-Abusing Terrorist Networks”." VCU Scholars Compass, 2012. http://scholarscompass.vcu.edu/etd/2717.

Full text
Abstract:
This study examines the motivation factors that make some individuals (terrorists) confidential informants. The study is based on the assumptions of Maslow’s hierarchy of needs and Herzberg’s motivation-hygiene theories. Accordingly, main assumption of the present study is that some individuals with unsatisfied needs in religion-abusing terrorist (RAT) networks choose to become confidential informants to satisfy their predominant needs. The main hypothesis for the purpose of this study is “The individuals’ decision-making processes to cooperate with law enforcement intelligence (LEI) as a confidential informant is affected by some motivation factors during recruitment process.” The present study tests 27 hypotheses in order to answer two main research questions. To meet its objectives the present study uses quantitative research methodology, constructs a cross-sectional research design, and employs secondary data analysis to test the hypotheses of the research questions. A dataset was formed based on official records of Turkish National Police by including all confidential informants within eight different RAT networks in Turkey. First, individual effect of each motivation factor on being a confidential informant is tested and discussed in detail. Then two group specific multivariate models for being an informant in Al-Qaeda and Turkish-Hezbollah are illustrated, compared and contrasted. Both bivariate and multivariate statistical analyses not only revealed the extent of individual effects of motivations among RAT groups, but also helped us to build fitting multivariate models that explain the probability of being informants in certain RAT networks. By doing so, the present study aims to make contributions to the literature and practice on this relatively unexplored phenomenon. Findings indicate that while some motivation factors are common among all RAT networks, the strength and direction of their effects vary among different RAT networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Austin, Maggie C. "Military recruitment and the War on Terrorism /." 2006. http://handle.dtic.mil/100.2/ADA462150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sá, Leopoldina Fernandes. "A propaganda do Daesh como forma de terrorismo : considerações à volta dos conceitos." Master's thesis, 2018. http://hdl.handle.net/10400.14/26640.

Full text
Abstract:
O tema em estudo trata do incitamento público ao terrorismo desenvolvido pelo grupo terrorista Daesh. Envolvidos na luta de restabelecimento de um Califado, assim como a obsessão com o fim do mundo, e a luta entre o bem e o mal, o Daesh crê estar envolvido na batalha final conforme indicam as escrituras religiosas. Com base nessa profecia apocalíptica, o EI tem desenvolvido uma campanha terrorista sem precedentes contra todos aqueles que considera apóstatas (Takfir). O grupo usa os meios de comunicação social mais populares da Internet como ferramenta de recrutamento e publicidade. As iniciativas internacionais para lidar com o incitamento ao terrorismo correspondem à ênfase recente na prevenção do ato, em vez da concentração, apenas na resposta às infrações terroristas. Contudo, debatemo-nos desde logo, com a insegurança jurídica em torno dos conceitos de terrorismo e do incitamento ao terrorismo. Assim como, o âmbito exato deste último, ainda não está claro nos instrumentos internacionais sobre a matéria. Todavia, sendo o incitamento ao terrorismo um dos problemas mais graves da atualidade ao qual os governos não têm total controlo. E apesar do seu regulamento poder afetar o direito à liberdade de expressão, defendemos que o apelo ao terrorismo seja direto ou indireto deve ser criminalizado per se pelo direito internacional e o resultado real ou potencial da comissão do ato deve ser irrelevante para a sua criminalização.
The Subject under study deals with the public incitement to terrorism developed by the terrorist group Daesh. Involved in the struggled of the reestablishement of a Caliphate, as well as the obssession with the end of the world, and the struggle between good and evil, the Daesh believes is involved in the final battle as the religious scriptures indicate. Based on this apocalyptic prophecy, the Daesh has developed an unprecedented terrorist captain against all those who conserve apostates (Takfir). The group uses the most popular social media on the Internet as an easy and quick recruiting tool. International initiatives to deal with incitement to terrorism correspond to the recent emphasis on prevention of the act, rather than concentration, only on the response to terrorist acts. However, we have been debating from the outset, with legal uncertainty about the concepts of terrorism and incitement to terrorism. Just as the exact scope of the latter is not yet clear in the international instruments on the subject. However, incitement to terrorism is one of the most serious problems of the present time which governments do not have full control. And although its regulation may affect the right of freedom of expression, we argue that the appeal of the terrorism be direct or indirect must be criminalized by international law and actual or potential result of the commission of the act should be irrelevant to its criminalization.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Terrorists – Recruiting"

1

Zum Töten bereit: Warum deutsche Jugendliche in den Dschihad ziehen. München: Piper, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Would-be warriors: Incidents of jihadist terrorist radicalization in the United States since September 11, 2001. Santa Monica, CA: RAND, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pratama, Gilang. Cuci otak NII: Pengakuan mantan juru doktrin NII. Pejaten Barat, Jakarta: Tinta Publisher, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weis, Samu. Rekruten des Terrors: Wie Islamisten den Heiligen Krieg nach Deutschland bringen. München: Riva, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al Qaeda in Yemen and Somalia: A ticking time bomb : a report to the Committee on Foreign Relations, United States Senate, One Hundred Eleventh Congress, second session, January 21, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

True stories of teen terrorist recruits. New York: Cavendish Square, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Terrorist ideology: Hearing before the Select Committee on Intelligence, United States Senate, One Hundred Tenth Congress, first session, Tuesday, June 12, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martin-Rayo, Francisco. Winning the minds: Travels through the terrorist recruiting grounds of Yemen, Pakistan, and the Somali border. New York: CITA Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Terrorists – Recruiting"

1

West, Lindsay A., Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, and Gavin Macgregor-Skinner. "Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting." In Censorship, Surveillance, and Privacy, 1986–97. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7113-1.ch098.

Full text
Abstract:
Today, terrorist groups are recruiting, inspiring, and guiding global strategies not just by Internet operations, but through an organized, steady infusion of propaganda videos and call-to-action messages. Most worrisome: increasing evidence that the youth population represents a particularly susceptible cohort, being drawn into the ranks of terrorist organizations operating worldwide. In response, this article will address the pros and cons of social media banning, its effects on constitutional rights, and its effectiveness towards decreasing radicalization and recruitment. The research presented here aims to further the field of Homeland Security and to encourage debates on how to decrease terrorism and youth recruitment and whether banning social media would assist the Department of Homeland Security's mission. In conclusion, this article explores both sides of the spectrum while offering insight for scholars, organizations, and practitioners regarding the attainability of social media banning in the United States.
APA, Harvard, Vancouver, ISO, and other styles
2

Lyle, Perry L. "Laws and Methods for Mitigating Terrorism and Mass Violence." In Advances in Psychology, Mental Health, and Behavioral Studies, 278–312. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4957-5.ch016.

Full text
Abstract:
As a result of the horrific 9/11 (2001) suicide terrorist attacks, US citizens generally have concluded international terrorism is behind mass-casualty attacks. As the 20th anniversary of 9/11 draws near, the post 9/11 era shows the emerging threats to the US will continue as a composition of ideologies from jihadist, far right, and leftist extremism, and idiosyncratic strains. Intelligence agencies worldwide are concerned about the looming threats of bioterrorism from variant strains of COVID. As a cataclysmic event, 9/11 radically changed laws and methods nations use to evaluate their geopolitical policies and operationalize their new counterterrorism strategies. This chapter will explore the laws and methods used to help fight and mitigate emerging threats. Underpinning this research review are the conflict theory, religion as a political philosophy, and the abandonment theory of personality disorders observed playing an influencing role in recruiting extremists.
APA, Harvard, Vancouver, ISO, and other styles
3

Capone, Francesca. "Children, Not Soldiers." In Handbook of Political Violence and Children, 443–73. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190874551.003.0017.

Full text
Abstract:
Recruiting children under the age of 15 years and using them to actively participate in hostilities is forbidden under international law and amounts to an international crime. Nonetheless, parties continue to enlist and conscript children, putting their lives in danger by exploiting them, very often not only for military purposes. After outlining the legal foundations of the prohibition on recruiting and using children, this chapter aims at providing an overview of the tools and strategies, including the UN architecture on children and armed conflict, designed and implemented to thwart the phenomenon of child soldiering. The chapter offers some critical reflections on the necessity to implement effective child-friendly post-conflict and peace-building efforts, in particular disarmament, demobilization, and reintegration processes. In fact, those efforts are still predominantly concerned with adult male fighters and, in most instances, they are unable to adequately address the specific needs of children formerly associated with armed forces or armed non-state actors, including groups labeled as terrorist.
APA, Harvard, Vancouver, ISO, and other styles
4

Ozeren, Suleyman, Suat Cubukcu, and Mehmet F. Bastug. "Lessons Learned from ISIS Recruitment in Turkey: A Paradigm Shift in Counterterrorism Is Needed." In NATO Science for Peace and Security Series – E: Human and Societal Dynamics. IOS Press, 2021. http://dx.doi.org/10.3233/nhsdp200077.

Full text
Abstract:
The Islamic State of Iraq and Syria (ISIS) has been unprecedentedly effective in recruiting foreign terrorist fighters (FTFs). While Turkey has been a transit country and a major hub for ISIS’s logistical and human resources, it also has become a prolific hotbed for its recruitment. Based on face-to-face interviews and open-source reports, this paper provides an in-depth assessment of ISIS’s recruitment structure and the challenges that Turkey faces in relation to ISIS’s activities and FTFs. We conclude with a set of recommendations and a roadmap for pursuing effective and sustainable policies against ISIS. Overall, Turkey should adopt a paradigm shift on counterterrorism, transform the security and intelligence apparatus, and develop rehabilitation programs that consider the specificity of individuals’ radicalization at different levels.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography