1 |
The Middle East is Violence: On the Limits of Comparative Approaches to the Study of Armed Conflict |
Jacob Mundy
|
|
2 |
The Taliban and women's human rights in Afghanistan: the way forward |
Sebghatullah Qazi Zada & Mohd Ziaolhaq Qazi Zada
|
|
3 |
Understanding security force assistance: a matter of control? |
Alies Jansen
|
|
4 |
“No punishment is enough for monsters”: vindictiveness as an important political emotion in dealing with Belgian (potential) returnee men |
Iman Lechkar & Jihane Sliti
|
|
5 |
International political sociology of New Zealand's national security law |
Damien Rogers
|
|
6 |
Prevent and post-16 education: the implications for Muslim women |
Lilly Barker
|
|
7 |
Generation three and a half peacekeeping: Understanding the evolutionary character of African-led Peace Support Operations |
Andrew E. Yaw Tchie
|
|
8 |
Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts |
Andrew Robertson & David Weir;Maura Conway;Moign Khawaja; Suraj Lakhani;Jeremy Reffin
|
|
9 |
Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging |
Benjamin J. Lee
|
|
10 |
Relocating the veil: the everyday lives of young hijabi Britons under ideological culturalism |
Fatima Khan
|
|
11 |
Experimenting with Threat: How Cyberterrorism Targeting Critical Infrastructure Influences Support for Surveillance Policies |
Ryan Shandler & Daphna Canetti;Keren L. G. Snider;Amir Hefetz
|
|
12 |
The Fragility Dilemma and Divergent Security Complexes in the Sahel |
Kari M. Osland & Henriette U. Erstad
|
|
13 |
Investigating the Influence of Islamic State’s Discourse in Jordan |
Juline Beaujouan
|
|
14 |
Applying the study of religions in the security domain: knowledge, skills, and collaboration |
Kim Knott
|
|
15 |
The Whole Is Greater than the Sum of Its Parts: Risk and Protective Profiles for Vulnerability to Radicalization |
Caitlin Clemmow; Bettina Rottweiler;Michael Wolfowicz, ;Noémie Bouhana, ;Zoe Marchment & Paul Gill
|
|
16 |
The “War on Terror” and Public Diplomacy during the Cold War: Israeli–Turkish Relations and the 1980 Military Coup |
Eldad Ben Aharon
|
|
17 |
Developing best practices “against terrorists who protest”: Regional organizations as learning clubs for autocracies |
Stephen Hall & Maria Debre
|
|
18 |
Unpacking the varying strategic logics of total defence |
Jan Angstrom & Kristin Ljungkvist
|
|
19 |
The Post-Imperial Politics of Security and Depoliticisation: Comparing Discourses and Practices of Ordering Across Central Asia |
Thorsten Bonacker & Philipp Lottholz
|
|
20 |
Intersectionality and rehabilitation: how gendered, racial and religious assumptions structure the rehabilitation and reintegration of women returnees |
Helen Stenger
|
|
21 |
“Securing the state” in post-2011 Tunisia: performativity of the authoritarian neoliberal state |
Rosa Maryon
|
|
22 |
Whose (in)security? Gender, race and coloniality in European security policies: Introduction to the Special Issue |
Marijn Hoijtink, Hanna L. Mühlenhoff & Natalie Welfens
|
|
23 |
Automating Terror: The Role and Impact of Telegram Bots in the Islamic State’s Online Ecosystem |
Charlie Winter & János Kertész;Abdullah Alrhmoun
|
|
24 |
Critical factors to consider in the trade–security nexus of the African Continental Free Trade Area: A catalyst for establishing peace |
Juliet Eileen Joseph
|
|
25 |
Security assistance to surrogates – how the UAE secures its regional objectives |
Andreas Krieg
|
|
26 |
Security diplomacy as a response to Horn of Africa’s security complex: Ethio-US partnership against al-Shabaab |
Negasa Gelana Debisa
|
|
27 |
Beheading the Hydra? Does Killing Terrorist or Insurgent Leaders Work? |
Keith Patrick Dear (Squadron Leader)
|
|
28 |
Depoliticizing decolonization: the silencing of Palestine in universities |
Katy P. Sian
|
|
29 |
Securitization of a Political Conflict in Southeast Asia: Disengaging the Indigenous Audience in West Papua |
Hipolitus Ringgi Wangge
|
|
30 |
From Bombs to Books, and Back Again? Mapping Strategies of Right-Wing Revolutionary Resistance |
Jacob Aasland Ravndal
|
|
31 |
A state without a future: neoliberal despotism, crisis-fighting, and government through fear |
Christos Boukalas
|
|
32 |
Resilient non-radicalisers: beating the odds through non-radicalisation despite significant suffering |
Niyazi Ekici & Joe Whittaker;Kamil Yilmaz,; M. Alper Sozer,
|
|
33 |
“Phantom operators”: special operations forces and asymmetric warfare in Northern Nigeria. |
Folahanmi Aina
|
|
34 |
China’s Proposition to Build a Community of Shared Future for Mankind and the Middle East Governance |
Jun DING & Hongjin CHENG
|
|
35 |
Cognitive and Behavioral Radicalization: An Explanatory Split? |
Rik Peels
|
|
36 |
War Games of the Shanghai Cooperation Organization and the Collective Security Treaty Organization: Drills on the Move! |
Marcel de Haas
|
|
37 |
Toward a Behavioral Model of “Homegrown” Radicalization Trajectories |
Jytte Klausen;Selene Campion;Nathan Needle;Giang Nguyen & RosanneLibretti
|
|
38 |
EU religious engagement in the Southern Mediterranean: Much ado about nothing? |
Sarah Wolf
|
|
39 |
Terrorist alliance formation: the case of Islamic State and Lashkar-e-Jhangvi in Balochistan (Pakistan) |
Khurram Shahzad Siddiqui
|
|
40 |
Education policy and ‘free speech’ on race and faith equality at school |
Karl Kitching, Aslı Kandemir, Reza Gholami & Md. Shajedur Rahman
|
|
41 |
To look for another thing, and in another way: revitalising criticality with multimodal methodologies |
Michael Livesey
|
|
42 |
Genocidal processes: social death in Xinjiang |
David Tobin
|
|
43 |
Counter-radicalisation in UK higher education: a vernacular analysis of ‘vulnerability’ and the prevent duty |
Critical Studies on Security
|
|
44 |
Analyzing the evolution of the threat al-Shabaab poses to Kenya post-Westgate attack perio |
Gábor Sinkó & János Besenyő
|
|
45 |
“Press F to Pay Respects”: An Empirical Exploration of the Mechanics of Gamification in Relation to the Christchurch Attack |
Suraj Lakhani & Susann Wiedlitzka
|
|
46 |
End of the Lone Wolf: The Typology that Should Not Have Been |
Bart Schuurman,;Lasse Lindekilde;Stefan Malthaner;, Francis O'Connor;PauGill & Noémie Bouhana
|
|
47 |
Securing the platform: how Google appropriates security |
Anneroos Planqué-van Hardeveld
|
|
48 |
Securing the platform: how Google appropriates securit |
Anneroos Planqué-van Hardeveld
|
|
49 |
The nature and extent of the Taliban’s involvement in the drug trade before and after the regime change (1994–2022): insights from experts |
Hamid Azizi
|
|
50 |
‘None-the-wiser’? Citizenship education in preventing radicalisation: contrasting European and Middle East perspectives |
Francis Gaffney & Andrew Silke
|
|