1. The road to breaking al-Qaeda -- 2. The origination and continuation of the threat -- 3. The mentality of the threat -- 4. The business of influence -- 5. Breaking individuals -- 6. Breaking groups -- 7. Breaking relationships between groups -- 8. The final break.
Access options:
The following links lead to the full text from the respective local libraries:
"Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes what groups in the network are doing to recruit, plan, and carry out attacks worldwide. The book reports on intelligence and counterterror methods being used to garner information on al-Qaeda. It describes how the destabilization of Arab countries has led to opportunities for terrorists to capitalize on that instability and gain a foothold in countries such as Egypt, Yemen, Somalia, and Syria."--Publisher's website
Despite the killing of Osama bin Laden, the Al-Qaeda network he inspired is still alive and well and in some places, thriving. The rise and persistence of the radical threat must be viewed through a fusion of psychology, sociology, and organization development and human behavior theory. Breaking Al-Qaeda Psychological and Operational Techniques, Second Edition serves to educate those on the front line, as well as strategic planners and thinkers on the subject. Focusing on the background and history of Al-Qaeda, developments in recent years, and how and where Al Qaeda is spreading, it examines the current state of the terrorist network and what the organization and individual cells are doing to recruit, plan, and carry out attacks against the West. The book also investigates intelligence and counterterror methods to garner information on Al Qaeda and steps that are being taken to counter the continuing threat.The author explores recent developments related to the Arab spring, and addresses how the Al-Qaeda network continues to expand especially in Egypt, Yemen, Somalia, Mali, and Syria. Illustrating the shifting message and ideology of Al-Qaeda since the death of Osama bin Laden, the text describes how regional and international governments can utilize intelligence and apply counterterror measures to break relationships between groups--
In: Political science quarterly: a nonpartisan journal devoted to the study and analysis of government, politics and international affairs ; PSQ, Volume 127, Issue 2, p. 348-350
In: Political science quarterly: a nonpartisan journal devoted to the study and analysis of government, politics and international affairs ; PSQ, Volume 124, Issue 3, p. 567-569
This research note uses Hermann's personality‐at‐a‐distance (PAD) method and applies it to negotiating behavior. Gerry Adams's personality and its effect upon his negotiating behavior in the current peace process in Northern Ireland is used as an illustration of the expanded application of PAD in a negotiating context.
The British Union flag flew 365 days a year over Belfast City Hall and on designated days plus four specified days at the Ulster Hall and Duncrue Complex. This policy was challenged by the Sinn Féin party, prompting the city council to review the policy. Members of the city council consulted with the community, debated, and ultimately decided in December 2012 to change the policy in favor of designated days at the city council. They also removed the flag at the other two venues. This sparked protests from the Protestant community, some turning violent. The consultative process, the debates surrounding the change in the flag policy, and the reasons for the prolonged and at times violence response by the Protestant community is the result of conflict between both religious and political identity groups. This article examines these protests through the lens of cultural identity within divided communities.
The concept of peace is "fetishized" within statist power as it has a specific use-value. The constant state of flux present in contemporary societies requires new concepts of peace to be enacted and circulated, shifting from transactional to transformational notions of peace.
Access options:
The following links lead to the full text from the respective local libraries:
This comprehensive, user-friendly introductory textbook to political psychology explores the psychological origins of political behavior. The authors introduce readers to a broad range of theories, concepts, and case studies of political activity to illustrate that behavior. The book examines many patterns of political behaviors, including leadership, group behavior, voting, race, ethnicity, nationalism, terrorism, war, and genocide. It explores some of the most horrific things people do to one another for political purposes, as well as how to prevent and resolve conflict -- and how to recover from it. The goal is to help the reader understand the enormous complexity of human behavior and the significant role political psychology can play in improving the human condition.The book contains numerous pedagogical features, including text boxes highlighting current and historical events to help students see the connection between the world around them and the concepts they are learning. Different research methodologies used in the discipline are employed, such as experimentation and content analysis. The "Political Being" is used throughout to remind the reader of the psychological theories and concepts to be explored in each chapter.New to the second edition is coverage of recent political events, including the 2008 US presidential election, Darfur, Iraq, and Afghanistan. There are now separate chapters on race, ethnic conflicts, terrorism, and conflict resolution. In addition, instructor resources are available online.This accessible and engaging introductory textbook is suitable as a primary text on a range of upper-level courses in political psychology, political behavior, and related fields, including policymaking.
Access options:
The following links lead to the full text from the respective local libraries: