Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Contemporary Terrorist Challenges and Threats in Europe

View through CrossRef
This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a unique definition of the concept of security science is given, without which it is not possible to properly perceive or investigate security threats and risks within which terrorism is one of the significant threats. The second part deals with models of terrorist activities with special attention to the webspace and the significant role that terrorists attach to the increasing use of the Internet for their purposes. The theoretical part leads to the conclusion that there are five essential elements whose presence, if detected in one territory or state, indicates the existence of a mechanism that produces or creates new jihad warriors. The paper also gives a unique forecast of the degree of endangerment on the example of a territory, which gives scientists who investigate these threats a new direction of research.
Title: Contemporary Terrorist Challenges and Threats in Europe
Description:
This article generally contains two parts.
One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism.
Within the first part, a unique definition of the concept of security science is given, without which it is not possible to properly perceive or investigate security threats and risks within which terrorism is one of the significant threats.
The second part deals with models of terrorist activities with special attention to the webspace and the significant role that terrorists attach to the increasing use of the Internet for their purposes.
The theoretical part leads to the conclusion that there are five essential elements whose presence, if detected in one territory or state, indicates the existence of a mechanism that produces or creates new jihad warriors.
The paper also gives a unique forecast of the degree of endangerment on the example of a territory, which gives scientists who investigate these threats a new direction of research.

Related Results

From extreme beliefs to actual violence
From extreme beliefs to actual violence
This dissertation addresses the question of what factors and processes explain pathways of individuals with extreme beliefs towards different outcomes, including violent actions (e...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
Threat of committing a terrorist act
Threat of committing a terrorist act
The article is devoted to the debatable issues of interpretation of the concept of the threat of committing a terrorist act and its signs. There is still no unity of opinion regard...
A cyberterrorist behind the keyboard
A cyberterrorist behind the keyboard
Abstract Given the diverse backgrounds of people living in modern societies as well as the international nature of cyber-terrorist threats, prof...
Giovanni Paolo II e l’Europa
Giovanni Paolo II e l’Europa
John Paul II and Europe In his article entitled ‘Una frontiera per l’Europa: dove?’ (The boundary of Europe: where is it located?), published in Vita e Pensiero (October 197...
ANALISIS YURIDIS PELAKSANAAN KOMPENSASI TERHADAP KORBAN TERORISME DITINJAU DALAM PERSPEKTIF KEADILAN DISTRIBUTIF
ANALISIS YURIDIS PELAKSANAAN KOMPENSASI TERHADAP KORBAN TERORISME DITINJAU DALAM PERSPEKTIF KEADILAN DISTRIBUTIF
Bom Bali I is one of the terrorist incidents that occurred in Indonesia. Government Regulation in Lieu of Law (Perppu) Number 1 of 2002 and Perppu Number 2 of 2002, which relate to...
Law, Hybrid Threats and Counter-Terrorism
Law, Hybrid Threats and Counter-Terrorism
The article analyzes the concept of hybrid threats formed in recent decades. It shows that in many well-known documents there is a direct connection between hybrid threats and the ...
Narcissism Over Ideology: Revealed versus Stated Terrorist Preferences
Narcissism Over Ideology: Revealed versus Stated Terrorist Preferences
What preferences motivate the severity of terrorist attacks? I investigate how Boko Haramterrorists adjust their fatalities when unexpectedly deprived of public attention, relative...

Back to Top