Volume XIV

Volume XIV

Causes & Explanations of Suicide Terrorism: A Systematic Review

The frequency of suicide terrorist attacks has increased dramatically since the year 2000, creating a renewed interest in this area of study, as well as an increase in the importance of understanding individual and organizational motivations behind engagement in suicide terrorism.

By Vanessa Harmon, Edin Mujkic, Catherine Kaukinen, and Henriikka Weir

Causes & Explanations of Suicide Terrorism: A Systematic Review

Risk-Based Performance Metrics for Critical Infrastructure Protection? A Framework for Research and Analysis

Measuring things that do not occur, such as “deterred” or “prevented” terrorist attacks, can be difficult. Efforts to establish meaningful risk-based performance metrics and performance evaluation frameworks based on such metrics, for government agencies with counterterrorism missions, are arguably in a nascent state.

By Eric F. Taquechel and Marina Saitgalina

Risk-Based Performance Metrics for Critical Infrastructure Protection? A Framework for Research and Analysis

Learning From H.I.M. (Harvey, Irma, Maria): Preliminary Impressions for Supply Chain Resilience

The 2017 Atlantic hurricane season challenged critical infrastructure and key resources across a wide area. Harvey, Irma, and Maria each exposed different aspects of how density, dependencies, and distance impact expression of risk.

By Phillip J. Palin

Learning From H.I.M. (Harvey, Irma, Maria): Preliminary Impressions for Supply Chain Resilience

Operator Driven Policy: Deriving Action From Data Using The Quadrant Enabled Delphi (QED) Method

To close the gap in operator-driven policy for the homeland security enterprise, we argue for a bottom-up policy process that acknowledges operator knowledge and opinions.

By Lilian Alessa, Sean Moon, David Griffith, and Andrew Kliskey

Operator Driven Policy: Deriving Action From Data Using The Quadrant Enabled Delphi (QED) Method

Defected from ISIS or Simply Returned, and for How Long?– Challenges for the West in Dealing with Returning Foreign Fighters

Many of the 38,000 foreign fighters ISIS has managed to attract to Syria and Iraq will return home. As increasing numbers of ISIS cadres flee the battlefield, some as defectors and others as returnees still aligned with ISIS’ goals and ideology, the challenges for the West will be how to identify and sort out true defectors from returnees, and determine if they are at risk to support again or rejoin a terrorist group.

By Anne Speckhard, Ardian Shajkovci, and Ahmet S. Yayla

Defected from ISIS or Simply Returned, and for How Long?– Challenges for the West in Dealing with Returning Foreign Fighters

Improving Maritime Transportation Security in Response to Industry Consolidation

Containerized cargo is the single largest security vulnerability in maritime shipping. Recent consolidation in the maritime shipping industry, along with freefalling shipping rates and increased vessel sizes, combine to cause concern for the future of containerized shipping security.

By Nick Monacelli

Improving Maritime Transportation Security in Response to Industry Consolidation

Book Review: Preventing and Countering Extremism and Terrorist Recruitment: A Best Practice Guide by Hanif Qadir

A parent logs into a child’s computer and a chat room window pops up on the screen. The parent starts scrolling through the chat history and realizes that the child was speaking to an ISIS recruiter. In this hypothetical situation, the child has not conducted any crime, yet the parent is worried. What should the parent do?

Reviewed by Caitlin Ambrozik

Book Review: Preventing and Countering Extremism and Terrorist Recruitment: A Best Practice Guide by Hanif Qadir

Scroll to Top