Online Global terrorism

Online Global terrorism class

School of Security and Global Studies

Security Management Program

SCMT319 Global Terrorism

3 Credit Hours 8 Weeks

Prerequisite(s): All lower level general education and career planning coursework necessary to develop research, writing, and critical thinking skills.

Table of Contents

Instructor Information Evaluation Procedures
Course Description Grading Scale
Course Scope Course Outline
Course Objectives Policies
Course Delivery Method Online Library
Course Resources Selected Bibliography
Instructor Information

Instructor:

Bio:

Email: Please use the internal classroom messaging system (Messages). Use mycampus email for after class communication only.

Table of Contents

Course Description (Catalog)

This course examines various elements and aspects of International and Domestic Terrorism. Students explore the cultural and ideological philosophies, as well as the social, economic, political, and religious conditions of select states, groups, and individuals that comprise the phenomena of terrorism. By examining the historical and contemporary aspects of terrorism students develop a working knowledge of the current Global War on Terror and are better prepared to comprehend terrorist motives and ideologies. Topics include: History and Development, Types of Terrorism, Conventional and Unconventional terrorist tactics, the Media’s impact on terrorism including the US Counterterrorism Policies. Particular attention is addressed to the Al-Qaeda terrorist network.

Table of Contents

Course Scope

SCMT319 Global Terrorism is a comprehensive undergraduate course in terrorism studies. It is an academic course suitable for both practitioners in the various anti and counter-terrorism fields, but also those students who have no previous knowledge or grounding in the study of terrorism. This is accomplished by standard undergraduate learning methodology. Primarily, most of the course amounts to the assimilation of basic facts and concepts. To facilitate this, each individual aspect of terrorism is systematically isolated, dissected and examined in turn.

Secondly, this assimilation of facts and concepts is supplemented by a more advanced study method, which consists of examining differing and sometimes conflicting perspectives and comparisons of terrorism. This secondary method is calculated to stimulate analytical, comparative, critical, logic and integrative skills, in strict keeping with Undergraduate study methodology. It is provided by appropriate assignments partly involving published books on terrorism and a limited amount of guided and self-initiative led research of given topics.

Table of Contents

Course Objectives

After completing this course, you will be able to:

· Explain terrorism, the history of terrorism, and the dilemmas in defining of terrorism.

· Describe international terrorism and the problems concerning international cooperation on counter-terrorism.

· Summarize homegrown terrorism and difficulties in deterrence of terrorists.

· Assess media coverage and challenges concerning media coverage of terrorist attacks.

· Analyze counter-terrorism and problems in defining counter-terrorism.

· Examine terrorist tactics around the globe.

· Appraise technology in relation to terrorism.

· Explain women terrorists and issues concerning offensive and defensive counter-terrorism actions.

Table of Contents

Course Delivery Method

This course, delivered via distance learning, will enable students to complete academic work in a flexible manner, completely online. Course materials and access to an online learning management system will be made available to each student. Responses to Discussion prompts (submitted for review by the Faculty Member) are posted in Forums and are due every Friday of discussion weeks (weeks 1 – 3 and 5 – 7). Classmate (or instructor, if a follow-up question is asked) Discussion “Responses” (2) are due the last day (Sunday) of each discussion week (weeks 1 – 3 and 5 – 7). Midterm and final examinations, respectively, are due by the last day (Sunday) of week four and eight and available in these weeks under “Tests & Quizzes.” A terrorism event research project is posted under Assignments and due on Sunday of week seven. Assigned faculty will support the students throughout this eight-week course.

Table of Contents

Course Resources

Textbook

Ganor, B. (2005). The counter-terrorism puzzle: A guide for decision makers. New Brunswick, NJ: Transaction Publishers.

Selected Open Educational Resources

Blakeley, R. (2011). Dirty Hands, Clean Conscience? The CIA Inspector General’s Investigation of “Enhanced Interrogation Techniques” in the War on Terror and the Torture Debate. Journal of Human Rights10(4), 544–561.

Bloom, M. (2011). Bombshells: Women and Terror. Gender Issues; New York28(1–2), 1–21.

Cottee, S., & Hayward, K. (2011). Terrorist (E)motives: The Existential Attractions of Terrorism. Studies in Conflict & Terrorism34(12), 963–986.

Gregg, H. S. (2014). Defining and Distinguishing Secular and Religious Terrorism. Perspectives on Terrorism, 8(2). Retrieved from

Gunaratna, R., & Haynal, C. (2013). Current and Emerging Threats of Homegrown Terrorism: The Case of the Boston Bombings. Perspectives on Terrorism7(3), 44–63.

Gerhards, J., & Schäfer, M. S. (2014). International terrorism, domestic coverage? How terrorist attacks are presented in the news of CNN, Al Jazeera, the BBC, and ARD. International Communication Gazette76(1), 3–26.

Howcroft, James. (2017). Utilizing Society’s Forgotten Half: The Essential Role of Women in Counter Terrorism. Small Wars Journal.

Kruglanski, A. W., Chen, X., Dechesne, M., Fishman, S., & Orehek, E. (2009). Fully Committed: Suicide Bombers’ Motivation and the Quest for Personal Significance. Political Psychology30(3), 331–357.

Rapoport, D. C. (1984). Fear and Trembling: Terrorism in Three Religious Traditions. The American Political Science Review78(3), 658–677.

Sinai, J. (2010). How to Define Terrorism. Perspectives on Terrorism2(4). Retrieved from Smith, A. G. (2008). The Implicit Motives of Terrorist Groups: How the Needs for Affiliation and Power Translate into Death and Destruction. Political Psychology29(1), 55–75.

Table of Contents

Evaluation Procedures

FORUMS:

There are six forums in this course. Grading is based on six responses to forum prompt responses; 12 classmate (or instructor, if a follow-up question is asked) forum responses; untimed and open book midterm and final examinations; and a research project.

EXAMINATIONS:

The midterm (week four) and final (week eight) examinations are untimed open book assessments. Each is valued at 12.5% of your final grade. The examinations will be comprised of essay questions that cover selected sections of the textbook and additional assigned readings.

Penalties: Late examinations will be penalized 10 points “per day.”

RESEARCH PROJECT:

Terrorism Event Research Project is due in week seven and is valued at 12.5% of your final grade. Project details can be found under “Assignments.”

Penalties: Late projects will be penalized 10 points “per day.”

Table of Contents

Grading Scale

The points earned on discussions, classmate/instructor responses, assessments, and the field project will determine your final course grade on will be based on the following grading table:

Grade Instruments Points Possible Course Weight
Forum Discussion Prompt Responses (6) & Responses (2 per discussion week – 12 in total) 100/600 62.5%
Midterm Examination 100 12.5%
Terrorism Event Research Project 100 12.5%
Final Examination 100 12.5%
TOTAL 100 100%

Please see the Student Handbook to reference the University’s grading scale.

Table of Contents

8 – Week Course Outline

Week Topic(s) Learning Objectives Reading(s) Assignments
1 What is Terrorism, History of Terrorism, & Dilemmas in Defining the Threat Explain terrorism, the history of terrorism, and the dilemmas in defining of terrorism. Ganor, The Counter-Terrorism Puzzle, Preface & Chapter 1

Selected Weekly Open Educations Resources in Lessons 1

Lesson 1 lecture notes located inside Lessons tab (click on LESSONS to access).

Introduction: Post to Introduction – Week 1 Forum

Forum Prompt & Responses (2):

Post to Week 1 Forum

2 International Terrorism & Dilemmas Concerning International Cooperation on Counter-Terrorism Describe international terrorism and the problems concerning international cooperation on counter-terrorism. Ganor, The Counter-Terrorism Puzzle, Chapter 10

Selected Weekly Open Education Resources in Lessons 2

Lecture notes, Lesson 2.

Document inside Forum #2 folder.

Forum Prompt & Responses (2): Post to Week 2 Forum
3 Homegrown Terrorism in the U.S. & Dilemmas in Deterrence of Terrorists Summarize homegrown terrorism and difficulties in deterrence of terrorists. Ganor, The Counter-Terrorism Puzzle, Chapter 3

Selected Weekly Open Educational Resources in Lessons 3

Documents inside Forum #3 folder.

Lecture notes, Lesson 3.

Video located inside Lessons tab entitled: Battle of Ideas: Terrorism.

Forum Prompt & Responses (2): Post to Week 3 Forum
4 Media Coverage of Terrorism & Dilemmas Concerning Media Coverage of Terrorist Attacks Assess media coverage and challenges concerning media coverage of terrorist attacks. Ganor, The Counter-Terrorism Puzzle, Chapter 8

Selected Weekly Open Educational Resources in Lessons 4

Lecture notes, Lesson 4.

Video located inside Lesson tab entitled: The Face of Terrorism.

Midterm Examination – Due Sunday
5 Counter-terrorism & Dilemmas in Defining Counter-terrorism Analyze counter-terrorism and dilemmas in defining counter-terrorism. Ganor, The Counter-Terrorism Puzzle, Chapter 2

Selected Weekly Open Educational Resources Lessons 5

Documents inside Forum #5 folder.

Lecture notes, Lesson 5.

Video located inside Lesson tab entitled: Anti-Semitism and Jihad.

Forum Prompt & Responses (2): Post to Week 5 Forum
6 Terrorist Tactics Around the Globe Examine terrorist tactics around the globe. Selected Weekly Open Educational Resources Lessons 5

Documents inside Forum #6 folder.

Lecture notes, Lesson 6.

Video located inside Lesson tab entitled: The Rise of Al Qaeda and the Long Road to 9/11.

Forum Prompt & Responses (2): Post to Week 6 Forum
7 Technology & Terrorism Appraise technology in relation to terrorism. Selected Open Educational Resources in Lessons 7

Documents inside Forum #7 folder.

Lecture notes, Lesson 7.

Video located inside Lesson tab entitled: Al Qaeda and the Media.

Forum Prompt & Responses (2): Post to Week 7 Forum

Terrorism Event Research Project: Submit via Assignments – Due Sunday

8 Women Terrorists & Dilemmas Concerning Offensive & Defensive Counter-terrorism Actions Explain women terrorists and issues concerning offensive and defensive counter-terrorism actions.

.

Ganor, The Counter-Terrorism Puzzle, Chapter 5, Summary and Conclusion

Selected Weekly Open Educational Resources in Lessons 8

Lecture notes, Lesson 8.

Final Examination – Due Sunday

Table of Contents

Policies

Please see the Student Handbook to reference all University policies. Quick links to frequently asked question about policies are listed below.

Drop/Withdrawal Policy

Plagiarism Policy

Extension Process and Policy

Disability Accommodations

Writing Expectations

All written submissions should be submitted in a font and page set-up that is readable and neat. It is recommended that students try to adhere to a consistent format, which is described below.

1. Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

1. Arial 11 or 12-point font or Times New Roman styles.

1. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

Citation and Reference Style

Students will follow the APA Style as the sole citation and reference style used in written work submitted as part of coursework to the University. Assignments completed in a narrative essay or composition format must follow the citation style cited in the APA Style.

Late Assignments

Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals, I understand you must manage competing demands on your time. Should you need additional time to complete an assignment, please contact me before the due date so we can discuss the situation and determine an acceptable resolution.

Netiquette

Online universities promote the advancement of knowledge through positive and constructive debate – both inside and outside the classroom. Forums on the Internet, however, can occasionally degenerate into needless insults and “flaming.” Such activity and the loss of good manners are not acceptable in a university setting – basic academic rules of good behavior and proper “Netiquette” must persist. Remember that you are in a place for the rewards and excitement of learning which does not include descent to personal attacks or student attempts to stifle the Forum of others.

· Technology Limitations: While you should feel free to explore the full-range of creative composition in your formal papers, keep e-mail layouts simple. The Sakai classroom may not fully support MIME or HTML encoded messages, which means that bold face, italics, underlining, and a variety of color-coding or other visual effects will not translate in your e-mail messages.

· Humor Note: Despite the best of intentions, jokes and especially satire can easily get lost or taken seriously. If you feel the need for humor, you may wish to add “emoticons” to help alert your readers: ;-), : ),

Disclaimer Statement

Course content may vary from the outline to meet the needs of this particular group.

Table of Contents

Online Library

The Online Library is available to enrolled students and faculty from inside the electronic campus. This is your starting point for access to online books, subscription periodicals, and Web resources that are designed to support your classes and generally not available through search engines on the open Web. In addition, the Online Library provides access to special learning resources, which the University has contracted to assist with your studies. Questions can be directed to librarian@apus.edu .

1. Charles Town Library and Inter Library Loan: The University maintains a special library with a limited number of supporting volumes, collection of our professors’ publication, and services to search and borrow research books and articles from other libraries.

1. Electronic Books: You can use the online library to uncover and download over 50,000 titles, which have been scanned and made available in electronic format.

1. Electronic Journals: The University provides access to over 12,000 journals, which are available in electronic form and only through limited subscription services.

1. Tutor.com: AMU and APU Civilian & Coast Guard students are eligible for 10 free hours of tutoring provided by APUS. Tutor.com connects you with a professional tutor online 24/7 to provide help with assignments, studying, test prep, resume writing, and more. Tutor.com is tutoring the way it was meant to be. You get expert tutoring whenever you need help, and you work one-to-one with your tutor in your online classroom on your specific problem until it is done.

Request a Library Guide for your course ( http://apus.libguides.com/index.php )

The AMU/APU Library Guides provide access to collections of trusted sites on the Open Web and licensed resources on the Deep Web. The following are specially tailored for academic research at APUS:

· Program Portals contain topical and methodological resources to help launch general research in the degree program. To locate, search by department name, or navigate by school.

· Course Lib-Guides narrow the focus to relevant resources for the corresponding course. To locate, search by class code (e.g., SOCI111), or class name.

If a guide you need is not available yet, please email the APUS Library: librarian@apus.edu.

Table of Contents

Turnitin.com

Turnitin.com is a web-based plagiarism  prevention application licensed, for campus use, through the APUS Online Library.  Your assignments will be automatically submitted for review and requires no action on your part.

Turnitin.com analyzes electronic submissions of student writing, compares them to the contents of a huge online database, and generates a customized Originality Report. The database used to produce this analysis contains a massive collection of documents available on the Internet from both free and commercial sources, as well as the full texts of all other papers that have been previously submitted to Turnitin.com.

Table of Contents

School of Security and Global Studies

Security

Management

Program

SCMT319

Please follow and like us: