Understanding Terrorism and the Terrorist Threat

Methode

Understanding Terrorism and the Terrorist Threat

Coursera (CC)
Logo von Coursera (CC)
Bewertung: starstarstarstar_halfstar_border 7,2 Bildungsangebote von Coursera (CC) haben eine durchschnittliche Bewertung von 7,2 (aus 6 Bewertungen)

Tipp: Haben Sie Fragen? Für weitere Details einfach auf "Kostenlose Informationen" klicken.

Beschreibung

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: The National Consortium for the Study of Terrorism and Responses to Terrorism (START), a Department of Homeland Security Center of Excellence housed at the University of Maryland, offers a course looking at the who, what and how of Terrorism Studies, by introducing students to cutting-edge research from the social and behavioral sciences and the experts investigating these topics. The course will begin with a unit looking at widely held myths about terrorism and utilizing empirical data to discuss the realities of broad trends and patterns in terrorist attacks over time. The course will then review the psychological factors at play in individual radicalization and rec…

Gesamte Beschreibung lesen

Frequently asked questions

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Noch nicht den perfekten Kurs gefunden? Verwandte Themen: PRINCE2 Practitioner, Sun, PRINCE2, Projektmanagement und PRINCE2 Foundation.

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: The National Consortium for the Study of Terrorism and Responses to Terrorism (START), a Department of Homeland Security Center of Excellence housed at the University of Maryland, offers a course looking at the who, what and how of Terrorism Studies, by introducing students to cutting-edge research from the social and behavioral sciences and the experts investigating these topics. The course will begin with a unit looking at widely held myths about terrorism and utilizing empirical data to discuss the realities of broad trends and patterns in terrorist attacks over time. The course will then review the psychological factors at play in individual radicalization and recruitment into terrorism, followed by an analysis of terrorist group dynamics. The course will next look at terrorist group operations, including their attacks and some of the supporting behaviors that allow them to carry out attacks, including use of media, financing, recruitment, and training. The course will conclude by looking at the factors that drive terrorist group persistence or endurance versus terrorist group desistance, and will bring the varied course concepts together through a detailed look at the case of Al-Qa’ida. Throughout the course, students will have the opportunity to study and work with the University of Maryland’s Global Terrorism Database (GTD), the largest database of terrorist incidents in the world, learning its capabilities and developing basic skills in searching and displaying terrorism data.

Created by:  University of Maryland, College Park
  • Taught by:  Dr. Gary LaFree, Director

    National Consortium for the Study of Terrorism and Responses to Terrorism
  • Taught by:  Bill Braniff, Executive Director

    National Consortium for the Study of Terrorism and Responses to Terrorism
  • Taught by:  Kate Izsak, Education Director

    National Consortium for the Study of Terrorism and Reponses to Terrorism
Level Beginner Language English, Subtitles: Spanish How To Pass Pass all graded assignments to complete the course. User Ratings 4.6 stars Average User Rating 4.6See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

University of Maryland, College Park The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign.

Syllabus


WEEK 1


Introduction



3 readings expand


  1. Reading: START HERE
  2. Reading: Syllabus
  3. Reading: Participate in Course Surveys
  4. Discussion Prompt: Introductions: Get to know your peers in this session!
  5. Discussion Prompt: Technical Issues: Report Issues Here


WEEK 2


Module 1: How Do We Study Terrorism?



13 videos, 9 readings expand


  1. Reading: Module 1 Introduction Reading: START HERE
  2. Video: Course Overview
  3. Video: 1.A: Kate Izsak (University of Maryland), "Introduction"
  4. Video: 1.B: Gary LaFree (University of Maryland), "Nine Myths About Terrorism Part 1"
  5. Video: 1.C: Gary LaFree (University of Maryland), "Nine Myths About Terrorism Part 2"
  6. Video: 1.D: Bill Braniff (University of Maryland), "Challenges of Studying Terrorism"
  7. Video: 1.E: Bill Braniff (University of Maryland), "Defining Terrorism & Key Concepts for this Course"
  8. Video: 1.F: Gary LaFree (University of Maryland), “Geographic Trends in the GTD Part 1”
  9. Video: 1.G: Gary LaFree (University of Maryland), “Geographic Trends in the GTD Part 2”
  10. Video: NATO Guest Lecture: We asked Juliette: Have definitional issues surrounding terrorism ever affected NATO? If so, how?
  11. Video: Institution for Economics Guest Lecture: We asked Daniel: What is the Global Terrorism Index and how did the GTD inform it?
  12. Video: U.S. Department of State Guest Lecture: We asked Jason: How does the US State Department designate foreign terrorist organizations? How do definitional issues surrounding terrorism affect this process?
  13. Reading: Discussion Forum Activity Explanation- READ BEFORE YOU BEGIN
  14. Discussion Prompt: Module 1 Discussion Activity: Australasia and Oceania
  15. Discussion Prompt: Module 1 Discussion Activity: Central America and the Carribean
  16. Discussion Prompt: Module 1 Discussion Activity: Central Asia
  17. Discussion Prompt: Module 1 Discussion Acitivity: East Asia
  18. Discussion Prompt: Module 1 Discussion Activity: Eastern Europe
  19. Discussion Prompt: Module 1 Discussion Activity: Middle East and North Africa
  20. Discussion Prompt: Module 1 Discussion Activity: North America
  21. Discussion Prompt: Module 1 Discussion Acitvity: Russia & Newly Independent States
  22. Discussion Prompt: Module 1 Discussion Acitvity: South America
  23. Discussion Prompt: Module 1 Discussion Activity: South Asia
  24. Discussion Prompt: Module 1 Discussion Acitvity: Southeast Asia
  25. Discussion Prompt: Module 1 Discussion Activity: Sub-Saharan Africa
  26. Discussion Prompt: Module 1 Discussion Activity: Western Europe
  27. Discussion Prompt: Module 1 Discussion Question: Surprising Myth?
  28. Discussion Prompt: Module 1 Discussion Question: Universal Definition?
  29. Discussion Prompt: Module 1 Discussion Question: Challenges to Studying Terrorism
  30. Discussion Prompt: Module 1 Discussion Question: Geographic Trends
  31. Discussion Prompt: Module 1 Discussion Question: Reflections on Spotlight Lectures
  32. Video: GTD Demo Video
  33. Reading: The Global Terrorism Database
  34. Video: Global Terrorism Index
  35. Reading: The Global Terrorism Index Main Page & 2014 Report
  36. Reading: "Discussion Point: Terrorism Studies is Not a Sub-Discipline"
  37. Reading: "Discussion Point: Black Swans and Burstiness- Countering Myths about Terrorism"
  38. Reading: START Provides 2013 State Department Statistical Annex
  39. Reading: GTD Codebook: Inclusion Criteria and Variables
  40. Reading: 2009 and 2011 START Research Reviews

Graded: Module 1: Introductory Quiz

WEEK 3


Module 2: Individual Radicalization



8 videos, 12 readings expand


  1. Reading: Module 2 Introduction Reading: START HERE
  2. Video: 2.A: Kate Izsak (University of Maryland), "Module 2 Introduction"
  3. Video: 2.B: Bill Braniff (University of Maryland), "Introduction to Radicalization"
  4. Video: 2.C: Bill Braniff (University of Maryland), "Ideology"
  5. Video: 2.D: Gary Lafree (University of Maryland), "PIRUS"
  6. Video: 2.E: Arie Kruglanski (University of Maryland), "Radicalization and the Quest for Significance"
  7. Video: NATO Guest Lecture: We asked Juliette: Individual radicalization is a key issue to understand when collaborating closely with foreign nationals and soldiers working in highly stressful and highly politicized environments. How does NATO deal with issues such as the insider threat?
  8. Video: Department of Homeland Security Guest Lecture: We asked Susan: How can government agencies use research on radicalization, such as research done at START, to inform efforts to counter violent extremism?
  9. Video: Life After Hate Guest Lecture: Angela King explains the work of Life After Hate. We asked Angela: How can community organizations use research on radicalization, such as the research done at START, to inform efforts to counter violent extremism?
  10. Discussion Prompt: Module 2 Discussion Question: Ideology and Its Role
  11. Discussion Prompt: Module 2 Discussion Question: Constrasting Radicalization Processes?
  12. Discussion Prompt: Module 2 Discussion Question: Spotlight Lectures
  13. Reading: "Pathways Towards Radicalization"
  14. Reading: "Two Pyramid Model of Radicalization"
  15. Reading: "Sources of Terror"
  16. Reading: "Support for the Caliphate & Radical Mobilization"
  17. Reading: "An Experimental Investigation of the Choice of Terror and Support for Taking Action"
  18. Reading: "Profiles of Individual Radicalization in the United States: An Empirical Assessment of Domestic Radicalization"
  19. Reading: "Profiles of Individual Radicalization in the United States: Preliminary Findings"
  20. Reading: "Characteristics of Violent Lone-Offenders: A Comparison of Assassins and School Attackers"
  21. Reading: "Community-Level Indicators of Radicalization: A Data and Methods Task Force"
  22. Reading: "Assessing the Effectiveness of Current De-Radicalization Initiatives and Identifying Implications for the Development of the U.S.-Based Initiatives in Multiple Settings"
  23. Reading: "Understanding Lone-actor Terrorism: A Comparative Analysis with Violent Hate Crimes and Group-based Terrorism"

Graded: Module 2 Individual Radicalization Quiz

WEEK 4


Module 3: Terrorist Group Dynamics



9 videos, 12 readings expand


  1. Reading: Module 3 Introduction Reading: START HERE
  2. Video: 3.A: Kate Izsak (University of Maryland), "Introduction"
  3. Video: 3.B: Bill Braniff (University of Maryland), "Rational Actor Theory"
  4. Video: 3.C: Gary Lafree (University of Maryland), "Group Trends in the GTD"
  5. Video: 3.D: Bill Braniff (University of Maryland), "Organizational Capacity and Security of Terrorist Organizations"
  6. Video: 3.E: Gina Ligon (University of Nebraska, Omaha), "Leadership Characteristics of Terrorist Organizations"
  7. Video: 3.F: Victor Asal (SUNY), "Big, Allied and Dangerous: A Look at Terrorist Group Lethality"
  8. Video: 3.G: Amy Pate (University of Maryland), "Ethnopolitical Organizations in MENA and the Use of Violence"
  9. Video: 3.H: Jonathan Wilkenfeld (University of Maryland), "Myth and Reality in International Politics"
  10. Video: Institute for Economics and Peace Guest Lecture: We asked Murray: How does IEP use GTD data to frame Countering Violent Extremism (CVE) programs as an element of peacebuilding?
  11. Reading: Discussion Activity: Discussion Forum Explanation: READ BEFORE YOU BEGIN
  12. Discussion Prompt: Module 3 Discussion Activity: Australasia and Oceania
  13. Discussion Prompt: Module 3 Discussion Activity: Central America and the Caribbean
  14. Discussion Prompt: Module 3 Discussion Activity: Central Asia
  15. Discussion Prompt: Module 3 Discussion Activity: East Asia
  16. Discussion Prompt: Module 3: Discussion Activity: Eastern Europe
  17. Discussion Prompt: Module 3 Discussion Activity: Middle East and North Africa
  18. Discussion Prompt: Module 3: Discussion Activity: North America
  19. Discussion Prompt: Module 3 Discussion Activity: Russia & Newly Independent States
  20. Discussion Prompt: Module 3 Discussion Activity: South America
  21. Discussion Prompt: Module 3: Discussion Activity: South Asia
  22. Discussion Prompt: Module 3: Discussion Activity: Southeast Asia
  23. Discussion Prompt: Module 3: Discussion Activity: Sub-Saharan Africa
  24. Discussion Prompt: Module 3: Discussion Activity: Western Europe
  25. Discussion Prompt: Operational Security and Operational Capacity
  26. Discussion Prompt: Group Trends in the GTD
  27. Discussion Prompt: The Role of a Leader
  28. Discussion Prompt: Connectivity and Lethality
  29. Reading: "The Organization and Leadership of Violence"
  30. Reading: "BADD Project Factsheet"
  31. Reading: "Analysis of Factors Related to Hate Crime and Terrorism"
  32. Reading: "Understanding Lone-Actor Terrorism: a Comparative Analysis with Violent Hate Crimes and Group-Based Hate Terrorism"
  33. Reading: "The Social Determinants of Terrorist Organizations' Resilience in Latin America"
  34. Reading: "How Community Ties Influence Terrorist Targeting of Civilians"
  35. Reading: "The Use of Violence by Ethnopolitical Groups in the Middle East"
  36. Reading: "Database Spotlight: Minorities at Risk Organizational Behavior (MAROB)"
  37. Reading: "The Use of Violence by Ethnopolitical Organizations"
  38. Reading: "Survival of the Fittest: Why Terrorist Groups Endure"

Graded: Module 3 Quiz: Group Dynamics

WEEK 5


Module 4: Terrorist Operations



14 videos, 21 readings expand


  1. Reading: Module 4 Introduction Reading: START HERE
  2. Video: 4.A: Kate Izsak (University of Maryland), "Introduction"
  3. Video: 4.B: Bill Braniff (University of Maryland), "What is Strategic Logic that Animates Terrorist Organizations?"
  4. Video: 4.C: Peter Krause (Boston College & MIT),"Effectiveness of Terrorist Operations"
  5. Video: 4.D: Gary Lafree (University of Maryland), "Weapon Trends in the GTD"
  6. Video: 4.E: Gary Lafree (University of Maryland), "Target Trends in the GTD"
  7. Video: 4.F: Gary Lafree (University of Maryland), "Tactic Trends in the GTD"
  8. Video: 4.G: Bill Braniff (University of Maryland), "Enabling the Next Attack: Logistics and Propaganda"
  9. Video: 4.H: Tony Lemieux (Georgia State University, "Terrorism and the Media Part 1"
  10. Video: 4.I: Tony Lemieux (Georgia State University), "Terrorism and the Media Part 2"
  11. Video: NATO Guest Lecture Part 1: We asked Juliette: We discussed the strategies of terrorist organizations. Does NATO have a formal counterterrorism strategy? How does NATO formulate strategy in a given operating environment?
  12. Video: NATO Guest Lecture Part 2: We asked Juliette: Does NATO engage with the intelligence communities of its member nations in order to address enabling behaviors, such as terrorist financing?
  13. Video: NATO Guest Lecture Part 3: We asked Juliette: How do information operations / public affairs offices figure into NATO’s operations? How does NATO manage its media relations?
  14. Video: Department of Homeland Security Guest Lecture: We asked Susan: What are some promising ways that US government agencies can work with community partners to counter violent extremists' use of some of these strategies?
  15. Video: ICONS Guest Lecture: We asked Devin: How can simulations, war gaming, and red teaming help policy makers and analysts plan and prepare for contingencies involving extremist organizations and terrorist activities?
  16. Discussion Prompt: Are Terrorists Rational?
  17. Discussion Prompt: Tactics, Targets & Weapons
  18. Discussion Prompt: Media Involvement
  19. Discussion Prompt: Coverage of Terrorism at Home?
  20. Discussion Prompt: Effectiveness of Terrorist Operations
  21. Discussion Prompt: Spotlight Lecture Responses
  22. Reading: "Terrorist Attacks on Educational Institutions"
  23. Reading: "Boko Haram Recent Attacks"
  24. Reading: "Al-Shabaab Attack on Westgate Mall in Kenya"
  25. Reading: "August 2013 Security Threat for Americans Abroad"
  26. Reading: "An Overview of Bombing and Arson Attacks by Environmental and Animal Rights Extremists in the US, 1995-2010"
  27. Reading: "Bombings at the 2013 Boston Marathon"
  28. Reading: "Ricin Letters Mailed to President and Senator"
  29. Reading: "Terrorism and the Olympics"
  30. Reading: "Background Report: Suicide Attack on Intercontinental Hotel in Kabul, Afghanistan"
  31. Reading: "Developing an Empirical Understanding of Improvised Explosive Devices: A Social and Behavioral Science Perspective"
  32. Reading: "How Community Ties Influence Terrorist Targeting of Civilian"
  33. Reading: "Muslim Public Opinion on US Policy, Attacks on Civilians, and al Qaeda"
  34. Reading: "From Extremist to Terrorist: Identifying the Characteristics of Communities where Perpetrators Live and Pre-Incident Activity Occurs Prior to Attacks"
  35. Reading: "Financial Crime and Political Extremism in the U.S."
  36. Reading: "Anatomizing Chemical and Biological Non-State Adversaries"
  37. Reading: "Are U.S. Chemical Facilities Still Open to Terrorist Attack?"
  38. Reading: "Violent Jihadism in Real Time: Al-Shabaab's Use of Twitter"
  39. Reading: "Transcending Organization Individuals and the Islamic State"
  40. Reading: "The Music of Terrorism: Do Songs and Videos Play an Important Role in Recruiting and Radicalization?"
  41. Reading: "You Want World Peace? Look to Heavy Metal"

Graded: Week 4 Quiz: Terrorist Opeations

WEEK 6


Module 5: Al-Qa'ida Case Study



10 videos, 16 readings expand


  1. Reading: Module 5 Introduction Reading: START HERE
  2. Video: 5.A: Kate Izsak (University of Maryland), "Introduction"
  3. Video: 5.B: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, Introduction"
  4. Video: 5.C: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, The Evolution of Global Jihad and al-Qa'ida"
  5. Video: 5.D: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, Grand Historical Narrative"
  6. Video: 5.E: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, Theological Context"
  7. Video: 5.F: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, Political Lens"
  8. Video: 5.G: Bill Braniff (University of Maryland), "Al-Qa'ida Case Study, Virtual Architecture"
  9. Video: 5.H: Gary LaFree (University of Maryland), "Terrorism in 2014"
  10. Reading: Participate in Course Surveys
  11. Video: Combating Terrorism Center Guest Lecture: We asked Daniel: How has the increase in available, web-based data influenced how the CTC approaches researching groups like Al-Qaeda and the Islamic State?
  12. Video: The Global Engagement Center Guest Lecture: We asked Tim: What challenges do you see in containing and countering the messages of violent extremists? How does the Global Engagement Center plan to engage and address messages of violent extremism abroad?
  13. Discussion Prompt: Examining al-Qa'ida Through a Lens
  14. Discussion Prompt: Expansion of Views
  15. Discussion Prompt: Were Goals Met?
  16. Discussion Prompt: Questions on the Peer Assessment
  17. Reading: "Country Reports on Terrorism 2013: Annex of Statistical Information"
  18. Reading: "Discussion Point: The Benefits and Drawbacks of Methodological Advancements in Data Collection and Coding: Insights from the Global Terrorism Database (GTD)"
  19. Reading: "The Global Terrorism Database: Accomplishments and Challenges. Perspectives on Terrorism"
  20. Reading: "Public Opinion in the Islamic World on Terrorism, al Qaeda, and US Policies"
  21. Reading: "The Islamic State of Iraq and the Levant: Branding, Leadership Culture and Lethal Attraction"
  22. Reading: "A Tale of Two Caliphates"
  23. Reading: "Transcending Organization: Individuals and 'The Islamic State'"
  24. Reading: "START executive director testifies before Congress on the state of al-Qaida"
  25. Reading: "Al - Qa'ida - Related Terrorism: Violent Incidents and Foiled Plots"
  26. Reading: "The Prospective Military Power of Al Qaeda Affiliated Groups in the Syrian Conflict"
  27. Reading: "Beyond al-Qa’ida”
  28. Reading: "Al-Qa'ida in the Arabian Peninsula (AQAP), Anway al-Awlaki, and Samir Khan"
  29. Reading: "As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad"
  30. Reading: Link to Training Video: Core Capabilities and the Potential Durability of the Isamic State of Iraq and the Levant (ISIL)

Graded: Module 5 Quiz: Al-Qa'ida Case Study
Graded: Terrorist Group Case Study Peer Assessment
Werden Sie über neue Bewertungen benachrichtigt
Es wurden noch keine Bewertungen geschrieben.
Schreiben Sie eine Bewertung
Haben Sie Erfahrung mit diesem Kurs? Schreiben Sie jetzt eine Bewertung und helfen Sie Anderen dabei die richtige Weiterbildung zu wählen. Als Dankeschön spenden wir € 1,00 an Stiftung Edukans.

Es wurden noch keine FAQ hinterlegt. Falls Sie Fragen haben oder Unterstützung benötigen, kontaktieren Sie unseren Kundenservice. Wir helfen gerne weiter!

Bitte füllen Sie das Formular so vollständig wie möglich aus

(optional)
(optional)
(optional)
(optional)

Haben Sie noch Fragen?

(optional)

Anmeldung für Newsletter

Damit Ihnen per E-Mail oder Telefon weitergeholfen werden kann, speichern wir Ihre Daten.
Mehr Informationen dazu finden Sie in unseren Datenschutzbestimmungen.