Description
After all data are analyzed from a research project, the next step is for the researcher to develop conclusions and recommendations. These conclusions and recommendations not only allow the researcher to make connections to other literature but also to share insights gained with colleagues and stakeholders. For this blog, you consider how to disseminate the conclusions and recommendations that you develop for your Capstone Project.
Post an explanation of how you might disseminate conclusions and recommendations for the problem or issue you identified for your Capstone Project. Be specific and use examples to support your explanation. Include what you might do to ensure that your stakeholders clearly understand your recommendations and are able to effectively implement solutions.
Readings
- Booth, W. C., Colomb, G. G., Williams, J. M., Bizup, J. & Fitzgerald, W. T. (2016). The craft of research (4th ed.). Chicago, IL: The University of Chicago Press.
- Chapter 16, “Introductions and Conclusions” (pp. 232–247)
This chapter provides guidelines for writing both introductions and conclusions of research-based reports. In addition, the chapter explains the importance of carefully constructed titles for research-based reports.
- Chapter 16, “Introductions and Conclusions” (pp. 232–247)
- Heller, N. E., & Zavaleta, E. S. (2008). Biodiversity management in the face of climate change: A review of 22 years of recommendations. Biological Conservation, 142, 14–32. Retrieved from http://www.conservationcorridor.org/wp-content/uploads/2013/09/Heller-and-Zavaleta-2009.pdf
This article reviews the research on climate change and how plans for biodiversity management are affected. The article recommends improved institutional coordination, expanded perspectives, and the modification of existing conservation plans to address the threats to biodiversity from continuing climate change.
- National Aeronautics and Space Administration. (2000). NASA’s actions to implement the Rogers Commission recommendations after the Challenger accident. Retrieved from http://www.hq.nasa.gov/office/pao/History/actions.html
This report outlines the recommendations and actions taken by NASA in response to the Challenger accident in 1986. These actions apply to both hardware design and management procedures within NASA.
- U.S. Government Accountability Office. (2004). Summary of recommendations–The 9/11 Commission report. Retrieved from http://www.gao.gov/decisions/other/303692.htm
This report lists the recommendations made by the 9/11 Commission with comments from the U.S. Government Accountability Office regarding the implementation of the recommendations. Comments include whether the recommendations could be implemented administratively or would require additional legislation.
Optional Resources
- Majchrzak, A. (Ed.). (1984). Methods for policy research. Thousand Oaks, CA: Sage.
- “Communicating Policy Research to Policymakers” (pp. 91–102)
Research Question
Courtnie Walker
Walden University
1
RESEARCH QUESTION
2
Research Question
What are the effects of the privacy and civil liberties policies on the operation of the
Department of Homeland Security (DHS)?
Viability
The research question can be held as viable for the scope of this course since it entails an
interest of one of the topics of the course. According to Booth et al. (2016), the identification of
interest of a given topic forms the basis of generating a viable research question. Thus, due to my
interest in the public policy, I was in a position to develop a viable research question that relates
to my selected agency precisely the Department of Homeland Security.
Challenges
One of the challenges that I encountered when conceptualizing issues as a research
question was developing a rational argument. The literature review process requires the
development of an appropriate argument that matches with the research interest (Machi &
McEvoy, 2016). Thus, this requirement of formulating an argument that is in line with the
research interest proved to be challenging while drafting the research question. Ensuring a
balanced nature of the research question was another challenge that I confronted when
conceptualizing issues as a research question. An optimal research question is characterized by
the aspect of being neither too broad nor too shrink (Empire State College, n.d.). Thus, ensuring
that the research question was neither too extensive nor too narrow proved to be challenging.
RESEARCH QUESTION
3
References
Booth, W. C., Colomb, G. G., Williams, J. M., Bizup, J. & Fitzgerald, W. T. (2016). The craft of
research (4th ed.). Chicago, IL: The University of Chicago Press.
Empire State College. (n.d.). Developing a research question. Retrieved August 28, 2014,
from http://www8.esc.edu/esconline/across_esc/writerscomplex.nsf/0/f87fd7182f0ff21c8
52569c2005a47b7
Machi, L. A., & McEvoy, B. T. (2016). The literature review: Six steps to success (3rd ed.).
Thousand Oaks, CA: Corwin.
CAPSTONE PROJECT: A LITERATURE REVIEW
Capstone Project: A Literature Review
Courtnie Walker
Walden University/MMPA 6910
April 14, 2019
1
CAPSTONE PROJECT: A LITERATURE REVIEW
2
Capstone Project: Literature review
Terrorists attacked America on 11th September 2001, which increased the need
for coming up with measures that could help to avert terrorism (Marion & Cronin,2009).
The issue was of great concern to both government officials and individuals, all of them
concerned with how they could avoid such a problem from happening in the future.
Furthermore, the government channeled more money towards programs that seemed
helpful in averting such a disaster from occurring in the future. A terrorist attack is a
disaster that the government wishes it does not happen in the US soil again, because of
the adverse effects it has in all aspects of the society whether political, social or even
economical. Thus, both the state and federal government through the department of
homeland security has prioritized counterterrorism in their agendas. Therefore, my
primary objective for the Capstone project is to elaborate on how the Department of
Homeland Security reinforced itself for counterterrorism. For this purpose, to be
achieved, I have reviewed several scholarly resources related to counterterrorism to show
how effective the suggested or taken measures to help the situation.
According to Szpunar, 2017, counterterrorism is an efficient means of averting
terror attack. The writer primarily focuses on Sting operation, which is one of the
strategies that the officers in the Homeland Security department use. Sting operations
refer to a backbone of the DHS counterterrorism strategy, and it entails installing traps at
probable terrorist for them to be nabbed. The book is very crucial in this research because
it restructures the entire sting operation and its effectiveness. Nonetheless, I feel that
using sting operation to combat terrorism is very controversial. Markedly, the author has
pointed out that the strategy is contentious, but they have not explained what measures
CAPSTONE PROJECT: A LITERATURE REVIEW
3
should be taken to ensure that the operation is applied accordingly to combat terror attacks.
Nonetheless, the book is an excellent source on counterterrorism, because it has given hints now
further research can be done on how to conduct sting operations effectively.
Technology can also be used as a great measure to help in combatting terror attacks by
the DHS (John, 2004). In the current day society, there is a great advancement in technology, and
people can manipulate it in various ways to help handle most issues at hand. In this instance,
technology can assist in gathering information about possible terror attacks, and giving warnings
before the attack for the relevant people to act accordingly. According to John, 2004, cyber
infrastructures can be safeguarded and help in a faster action plan in case the initial protection
strategy fails. John (2004) has comprehensively analyzed technology as a resourceful factor
which DHS department can use for their factor as an excellent counterterrorism tool. However,
the terrorist also has an ever-increasing prowess in technology, and they too can use their
expertise to counter our systems. Nonetheless, it is a useful measure which we can put more
study and resources to ensure that we are always a notch higher than the terrorist with respect to
technology.
The United States homeland security National Strategy which was launched a few
months after the attack is also a vital source in counterterrorism. The strategy highlights the
principal measures which can help the country to be more prepared in case such an attack
happens in the future — for instance, collecting intelligence information and warning, border and
transport security and emergency preparedness. All the solutions that are elaborated in this
strategic plan are workable. Additionally, there is an emphasis that the government has
channeled great focus on counterterrorism, which the federal government as the main spearhead.
However, most of the objectives which the source has highlighted have already been attained.
CAPSTONE PROJECT: A LITERATURE REVIEW
4
According to Kogut et al.,2004, software agents can be very resourceful in
combatting terror attacks by the DHS. Software agents are vital in the collection of
anticipated information which can be communicated to the homeland security team thus
helps in the counterterrorism endeavor. Nonetheless, this is an expensive and challenging
strategy to implement.
According to Monahan, 2010, DHS should focus most of its energy and resources
to establishing fusion centers to help in evaluating threats and sharing information.
Various ways are elaborated by the writer on how DHS can enhance their focus on fusion
centers. Nonetheless, the author acknowledges that assessing threats and information
sharing can be exploited maliciously, although he does not give details on the nature of
exploitation, which calls for further research into the strategy.
An analysis of the measures that the Homeland Security department has taken
prior is currently undertaking, or the plans that are underway to be undertaken is also a
great strategy to help in counterterrorism (Kemp, 2012). Notably, the DHS is using
support groups and citizen assistance to aid in averting any future terror attack in the
American soils. Nonetheless, I feel that most of the measures analyzed in this source are
reactive, therefore not tackling the issue on what we can do now to combat any future
terror attack.
Brattbergy 2012 did not discuss counterterrorism measures, but instead, he
focusses on how the department of homeland security can enhance its coordination from
various contingencies as a measure if reducing the effects in case an attack happens
again. Although we are all working towards ensuring that such an attack never occurs, I
feel that it is for our best interests as a nation to hope for the best, but on the same time be
CAPSTONE PROJECT: A LITERATURE REVIEW
5
prepared for the worst. Brattberg has highlighted how systematic coordination amongst various
vital players can help in handling such an attack in case it happens again. Additionally, the writer
has explained how we can deal with the aftermath of the situation, to help in minimizing the
impact it has on our lives.
Radicalization is a critical factor in breeding terrorist in most parts of the world.
According to Edwards, 2015 it is essential for us as a nation to understand how radicals are
radicalized. Additionally, the study as elaborated ways that Homeland Security can use to end
radicalization as a measure of counterterrorism. Nonetheless, the measures discussed in this
study that can be used to mitigate radicalization are mainly general solutions, which are very
hard to implement given the broader population in America.
According to May 2011, the government should instill strong measures which will make
the homeland security department stronger and implement the counterterrorism strategies.
Furthermore, weak systems can result in the failure of even the most vigorous measures, which is
why the DHS should be strengthened. However, the analyses of the system are so general which
makes it difficult to implement the notion despite it being so insightful. Coming up with metrics
which can be used to measure the objectives of the homeland security department is also a create
counterterrorism strategy (Keeney et al., 2011). Nonetheless, the proposed model in this study is
very complicated for application in the system.
According to Masferrer & Walker 2013, there should be special police counterterrorism
police department whose aim is to counter terrorism, which can be done by training these police
on how to adequately conduct research pertaining terrorism for the terrorists to be sentenced.
Notably, when terrorists or the masterminds of the project are jailed, their subjects become
resistant to conducting the practices. However, if the case is forgotten with nobody being
CAPSTONE PROJECT: A LITERATURE REVIEW
6
charged in court, it makes the terrorist feel superior hence gives them an urge to fight
back even further. For justice to prevail in instances of a terror attack, the systems
should be well trained to conduct research duly for the prosecution to take the issue to
court. Thus, this calls for professional investigation and close cooperation between the
police and the police department. The police should be given enough technical assistance
pertaining to forensic analyses, crime scene management, and general analyses strategy
in areas which require technical assistance. Additionally, the Counterterrorism police
department should be given continuously adequate training to prepare them on any
emerging trends that the terrorists are using. Notably, this will help them to come up with
effective strategies and countermeasures on what can be done to reduce terror attacks.
Notably, this is a workable solution because it will ensure that the specific officers have
enough know-how and expertise pertaining to terrorism for justice to prevail. However, it
is also a challenging aspect given that most police officers are expected to conduct a
general investigation; therefore positioning them only for terror attack could be an
underutilization of this able workforce.
Van, 2011 has elaborated ways that can be used to ascertain the efficiency of
counterterrorism strategies and policies which the authorities have put in place.
According to the study, most of these strategies are not in line with the objectives of
establishing ways that can be used to combat counterterrorism, For instance, the
indicators which the author has analyzed are nor articulate on if they represent
effectiveness, or whether the authorities invest more in the specific measures they can
help in mitigating counterterrorism. Notably, an efficient strategy should be one which
the more investment is channeled towards it, the higher the reduction in chances of a
CAPSTONE PROJECT: A LITERATURE REVIEW
7
terror attack. After that, the author explains that breaking down terrorism into various topics then
evaluating each individually can help combat terror attack. Historically, successful measures
which can be used to counter terrorism are laid on the basis if deep-rooted serious issues which
entail first handling any threat at hand, which can be followed by conducting any possible
changes to ensure terrorism re-emergence is less likely to occur again. Therefore, we should
evaluate the loopholes which DHS found could be the probable reason for the attack, and then
analyses what the department is doing about this loophole. Commendably, this is a handy source
because we cannot just keep on investing in new measures without evaluating whether they are
helping the solution, or working towards stopping the problem at hand.
According to Levi, 2010 the DHS should channel more funds towards controlling the
cash flow and resource flow to the designated terror attack groups. Monitoring of all the financial
systems in the country can help in controlling cash flow to the dreadful group. Notably, several
wealthier financiers support terror attacks in the shadows. The authorities should make a sound
threat on any group of the state which assists the terror groups to get guns and other missiles
which they use to do mass destruction. Moreover, the DHS should also conduct political warfare
in addition to military attacks with the aim of destroying the things or people whom terrorist
treasure, (Crenshaw, M. 2010). This shows that the government has not surrendered to their
threat, but instead, it is working on frustrating them to ensure that they lose anything they hold
dear. Nevertheless, when trying to frustrate the financers of a terror attack, the Homeland
security should do so while preserving the core American values, for instance, avoid using force
and maintenance of due process while providing speedy justice. A possible donor could be just a
suspect, so the government should conduct enough investigate to avoid frustrating an innocent
person. Stiff action should be made to people giving links to terrorists on how they can get the
CAPSTONE PROJECT: A LITERATURE REVIEW
8
devices to use or those giving them the devices, for instance, liquidating their financial
accounts and being prosecuted in the court of law. However, the main weakness of this
counter-terrorism measure is that it is challenging to identify the private-public interface
in this risky capital of financing terrorism.
Wilkinson, 2012 argues that technology is a very essential but complicated
strategy for DHS to focus on using to counter terrorism. In several instances, the terrorist
also has great prowess when it comes to technology so that any new technology will be
utilized by both the DHS, and the terror groups. The best way for DHS to win over the
terror groups is to ensure they have the right to know how much the terrorist know, that is
the capabilities and weaknesses of the attackers. After that, the DHS can use technology
as a countermeasure. The technological intelligence war with terror groups is being
intensified by the rampant know-how of the terrorists, whereby they can hack the systems
of DHS to know their communication and even use sophisticated technology to destroy
our military system. In the recent times, we have seen that terrorists are using technology
in their favor, for instance, they frequently use television satellites to communicate their
intentions globally, and why they are making this attack without any struggle,
additionally, the advancement in technology has resulted to making several public places
more vulnerable. The terrorist often targets more economically developed areas with
sophisticated technology. The source is very resourceful because it makes the point that
for DHS to effectively use technology as a measure to combat terrorism, they should be
well aware of the capabilities of the terrorist. Notably, we can invest heavily on a
particular measure, only for terrorists to use it for their advantage.
CAPSTONE PROJECT: A LITERATURE REVIEW
9
Sauter & Carafano, 2005 did a strategic study on what DHS can do to understand,
prevent and survive terror attacks. Creating a good understanding of all matters
pertaining to terror attacks makes it easy for the DHS to understand how they can attack
to counter their actions. There are complex policies that the government can install. And also,
the common policy which the terror attacks uses to help the reader in understanding the critical
topic. The author as outrightly explained the history of the terror attack and the tactics that the
terrorist commonly uses. Notably, the best way to deal with a problem is to understand its root
course. Therefore, understanding the history of terror attack helps us to know the evolution, thus
gives the relevant authorities a clear picture of the operations. With the development in times,
there is also cyber terrorism a topic that is elaborated in this study (Sauter & Carafano 2005).
Cyberterrorism entails an ideologically motivated use of the internet that results from fearing to a
person, loss of life or other physical pain with the intention of intimidating the victims. There is
also an in-depth analysis of emergency preparation that the DHS should have in case of an
attack, and the weapons of mass destructions which are commonly used by attackers. Thus, this
vast source explaining the operations of terror groups can help DHS to act accordingly to any
terror threats or attack to avoid any physical, emotional or psychological gain in case of such an
occurrence happening.
Regan & Monahan 2013 explain the decentralization approaches which the department of
homeland security can use to monitor data sharing, ensure accountability and safeguard civil
liberties with the aim of protection against terror attacks. Notably, information is a very critical
aspect when dealing with enemies. DHS fusion centers are used as a key pivotal point that is
used for receipt, analysis. Gathering and sharing any information that is related to a threat of the
state or its boundaries. The fusion centers are located in various focal points, and they help even
CAPSTONE PROJECT: A LITERATURE REVIEW
10
private security personnel or individuals to gather and disclose any threat to the
government, for it to investigate the situation as a security measure. The databases and
fusion centers help in relaying information that can be used to prevent terror attacks.
However, the issue is that despite the government investing heavily in this fusion center
there is very little information that is received in relation to the terror attack. Moreover,
any information that is collected has to be analyzed by the personnel constructively and
skillfully for it to be effective. Therefore, I feel that the government should avid
channeling a lot of money to this center and use more of the money in strategies that are
effective in combating terrorism.
White, 2016 is a book that acknowledges that DHS is well aware of the main
interests of terror attacks. According to the study, most professionals who understand
how to deal with criminals argue that crime can be minimized if the attackers have an
entrusted interest in a country’s economic structure. Thus, any counterterrorism measure
should be focused on making America economically stable with everybody being given
an opportunity to participate in the mainstream economy. When the government does not
give people enough economic opportunities, the terror attackers can create their shell
state, a group which does not have any motives of growing the economic enterprises
legitimately. Therefore, countries should work towards the abolishment of any
underground industrial networks and ensure everybody benefits from the financial
system.
Waugh, 2003 explains that the state and federal established the Department of
Homeland Security to handle any large scales disasters, like terrorism which was
previously being overlooked. Despite the human and material resources that DHS has, the
CAPSTONE PROJECT: A LITERATURE REVIEW
11
perilous terrorist-spawned catastrophe is still life-threatening, which could be attributed that
DHS is not utilizing their resources effectively. Collaboration, cooperation, and transparency in
the department can be the reason what the department has shifted to be a command and control
system. Teamwork is always an essential aspect in any institution, and when a team is divided, it
is tough to tackle common challenges, (Hoffman, B. 2006). Therefore, for the correct utilization
of funds channeled towards counterterrorism, there should be a thorough cleanup of the
Department. In case terrorism catastrophe occurs again; the capability for utilization of the
system can be significantly damaged. However, the local, state and federal emergency efforts
towards counterterrorism are also supported and pushed by private firms, nonprofit
organizations, voluntary and other unorganized groups. Therefore, the state should use more
significant support from the public to their advantage. However, this can only be helpful in the
state, and federal authorities ensure that the Department of Homeland Security is working
accordingly.
Taylor Fritsch & Liederbach, 2014 is a text that is written in a straightforward tone to
help all readers understand digital crimes, and what can be done to such crimes. Historically,
terrorists have committed many crimes using computer technology and the internet. Terrorist
exploits social media platforms and the internet to facilitate cyber terrorism. The government
should also utilize the same channels to counter terrorism. For instance, most terrorism financiers
use cryptocurrencies which make it more difficult to retrace their steps. Therefore, DHS should
ensure they have a good understanding of cryptocurrencies regulation, supervision, and
investigation.
Terrorism is a global issue that poses a severe threat to both the domestic and foreign
security of a country. In most instances, Radical Islamic fundamentalist gives America threats of
CAPSTONE PROJECT: A LITERATURE REVIEW
12
attack. Most terror groups are normally self-financed, loosely organized with
international networks. Commendably, the state has channeled many resources to the
DHS with the aim of helping them curb terrorism (Perl 2004). Commendably, since DHS
was created, they work hard to prevent a terror attack in the American soil. Estimably, the
department has a strategic and international studies program which focuses on studying
and analyzing the methods that are being done by the department to counter terrorism.
Additionally, the department also researches on any new technology or information that
terrorists have for them to combat them effectively.
Conclusion
Terrorism is a great calamity for the attacked nation because of the economic and
sociopolitical impacts of the act. The federal and state government established the
Department of Homeland Security, whose aim is to counter any catastrophe from
happening, with the main focus on terrorism. The department has taken several measures
to combat terrorism. For instance, they have resource centers research on the knowledge
which terrorists have and evaluate the strategies which they have put in place.
Technology advancement also helps in combatting terrorism, though there is a need for
the department to know the capability of attackers because the latter commonly try using
technology for their advantage, given that they have equal prowess. Additionally, several
scholars have presented more diverse ways to help prevent the attack from happening.
Use of sting operation, software agents, fusion centers and good organization are
examples of the strategies that can be utilized. However, most of these strategy needs
further study for them to be effectively applied.
CAPSTONE PROJECT: A LITERATURE REVIEW
13
References
Brattberg, E. (2012). Coordinating for Contingencies: Taking Stock of Post-9/11 Homeland
Security Reforms. Journal of Contingencies & Crisis Management, 20(2), 77–89.
https://doi.org/10.1111/j.1468-5973.2012.00662.x
Edwards, J. J. (2015). Figuring Radicalization: Congressional Narratives of Homeland Security
and American Muslim Communities. Communication & Critical/Cultural Studies, 12(1),
102–120. https://doi.org/10.1080/14791420.2014.996168
John Yen, J. G. (2004). Emerging Technologies for Homeland Security. Communications of the
ACM, 47(3), 32–35. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=12456346&site=ehost
-live
Keeney, R. L., & von Winterfeldt, D. (2011). A Value Model for Evaluating Homeland Security
Decisions. Risk Analysis: An International Journal, 31(9), 1470–1487. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=s3h&AN=66139032&site=ehost
-live
Kemp, R. L. (2012). Homeland Security in America Past, Present, and Future. World Future
Review (World Future Society), 4(1), 28–33.
https://doi.org/10.1177/194675671200400105
Kogut, P., John Yen, P., Yui Leung, P., Shuang Sun, P., Rui Wang, Mielczarek, T., & Hellar, B.
(2004). Proactive Information Gathering for Homeland Security Teams. Communications
of the ACM, 47(3), 48–50. https://doi.org/10.1145/971617.971644
Levi, M. (2010). Combating the financing of terrorism: A history and assessment of the control
of ‘threat finance.’ The British Journal of Criminology, 50(4), 650-669.
CAPSTONE PROJECT: A LITERATURE REVIEW
14
Marion, N., & Cronin, K. (2009). Law Enforcement Responses to Homeland Security Initiatives:
The Case of Ohio. Southwest Journal of Criminal Justice, 6(1).
Masferrer, A., & Walker, C. (Eds.). (2013). Counter-terrorism, Human Rights and the Rule of
Law: Crossing Legal Boundaries in Defence of the State. Edward Elgar Publishing.
May, P. J., Jochim, A. E., & Sapotichne, J. (2011). Constructing Homeland Security: An Anemic
Policy Regime. Policy Studies Journal, 39(2), 285–307. https://doi.org/10.1111/j.15410072.2011.00408.x
Monahan, T. (2010). The Future of Security? Surveillance Operations at Homeland Security
Fusion Centers. Social Justice, 37(2/3), 84–98. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=eft&AN=65441998&site=ehostlive
Perl, R. (2004, December). Terrorism and national security: issues and trends. LIBRARY OF
CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
Regan, P. M., & Monahan, T. (2013). Beyond counterterrorism: Data sharing, privacy, and
organizational histories of DHS fusion centers. International Journal of E-Politics (IJEP),
4(3), 1-14.
Sauter, M., & Carafano, J. J. (2005). Homeland security: A complete guide to understanding,
preventing, and surviving terrorism (p. 3). New York: McGraw-Hill.
Szpunar, P. M. (2017). Premediating predisposition: informants, entrapment, and connectivity in
counterterrorism. Critical Studies in Media Communication, 34(4), 371–385.
https://doi.org/10.1080/15295036.2017.1319966
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism.
Prentice Hall Press.
CAPSTONE PROJECT: A LITERATURE REVIEW
15
US National Strategy for Homeland Security. (2002). Military Technology, 26(12), 36. Retrieved
from
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=9215391&site=ehostlive
Van Dongen, T. W. (2011). Break it down: An alternative approach to measuring effectiveness
in counterterrorism. Journal of Applied Security Research, 6(3), 357-371.
Waugh, W. L. (2003). Terrorism, homeland security, and the national emergency management
network. Public Organization Review, 3(4), 373-385.
White, J. R. (2016). Terrorism and homeland security. Cengage Learning.
Wilkinson, P. (2012). Technology and Terorrism. Routledge.
Hoffman, B. (2006). Inside terrorism. Columbia University Press.
Crenshaw, M. (2010). The causes of terrorism. Comparative politics, 13(4), 379-399.
Jackson, R. (2005). Writing the war on terrorism. Language, Politics and Counter-terrorism,
Manchester–New York.
Purchase answer to see full
attachment
