

Journal of Social and Political
Sciences
ISSN 2615-3718 (Online)
ISSN 2621-5675 (Print)







Published: 08 June 2025
Terrorism and International Relations: The Way Forward
Titilayo M. Kolade, Ayoola Abuloye, Enobong Ogundari
Ministry of Foreign Affairs (Nigeria), Obafemi Awolowo University Ile Ife (Nigeria)

Download Full-Text Pdf

10.31014/aior.1991.08.02.575
Pages: 98-108
Keywords: Terrorism, Counterterrorism, Governance, Economic Stability, Global Peace Index
Abstract
This study examines the impact of Terrorism on International Relations, its effects and possible solutions. It further investigates the complex motivations behind terrorism, the duty of global relations in molding anti-terrorism tactics, and the effectiveness of international plans in minimizing terrorism’s effect on peace and security. The study relied on data from the Global Terrorism Database (GTD), World Values Survey (WVS), and World Bank Governance Indicators. The study concluded that there is a possibility of more effective global responses and management of terrorism within the international sphere by prioritizing governance reforms, integrating economic development with counterterrorism strategies, expanding beyond military interventions, and strengthening intelligence-sharing.
1. Introduction
The threat of terrorism remains a significant and persistent danger to global security, influencing the political, social, and economic structures of the global community. The modern era has experienced remarkable growth in the scope and intensity of this emerging phenomenon, fostering unparalleled international responses. Although, Terrorism does not have a specific definition, it may be defined in context as the utilization of violence and coercion to attain political, religious, or ideological objectives, frequently crossing national boundaries and posing significant challenges to fundamental tenets of international relations. Government and international organizations must stabilize anti-terrorism efforts with the defense of human rights, democratic values, and the integrity of the worldwide security structure (Vоlоshchuk et al 2021).
The September 11, 2001, terrorist attacks on the United States constitutes a watershed moment in modern terrorism, precipitating a seismic shift in international anti-terrorism approaches. Coordinated by al-Qaeda, the assaults targeted not only the U.S. but also disrupting global systems and triggering military interference. Al-Qaeda’s inspirations were based on religious extremism, anti-Western ideologies, and contradicting U.S. policies in the Middle East, with the aim of attracting the U.S. into extended clashes in regions such as Afghanistan and Iraq (Schmid and Alex, 2022). Even though over two decades have passed, the result of these attacks continues to impact anti-terrorism tactics and mold international security policies (Abu-bakare, 2020; Olaniyi 2024).
Across 9/11, other examples demonstrate the complications of Terrorism beyond diverse contexts, such as the Boko Haram insurgency in Nigeria. Based on Islam radicalism, Boko Haram seeks to bring down the secular Nigerian Government and create an Islamic State guarded by Sharia. It has been posited that the group’s strategies, which include abductions, bombings, and assassinations, not only disrupt North-Eastern Nigeria but also increase global concerns; prompting replies from surrounding countries and global organizations (Okunade and Ogunnubi, 2020). Boko Haram’s actions highlight the complications in solving terrorism in religions with feeble governance, important economic inequalities, and restricted global aid (Ojo 2020; Ogungbemi 2024).
The 2008 Mumbai attacks provide a further illustration of the intricacies of contemporary terrorism. The international networks engaged together with their ideological inspirations illustrate the significance of global collaboration in fighting terrorism. India’s reply, comprising its dependence on knowledge-sharing and partnership with international powers, emphasizes the important duty of global organizations such as the North Atlantic Treaty Organisation (NATO) and the United Nations in anti-terrorism efforts (Susan et al.2024). The Mumbai attacks also show the weakness of a civilized environment, where highly populated areas create problems for stopping well-organized terrorist attacks (Heyer & Garth 2023; Akintola et al 2024).
Correspondingly, the 2015 Paris assault demonstrates the international nature of terrorism. Created by ISIS, these assaults aimed at important locations in significant European cities, exposing differences in national security frameworks and causing strain on global anti-terrorism corporations. Terrorists' manipulations of migrant crises and their use of coded communications increase worries about the fragile balance between state surveillance, privacy rights, and civil freedom (Kaunert et al.2020). The Paris Assault further shows the significance of stronger military, legal, and tactful replies to developing threats as European nations battled to halt familiar assaults in the future (Fox 2021).
Beyond traditional Terrorism, cyberterrorism presents a new dimension of complexity in the international struggle against extremism. The technology era has made terrorist organizations to work unidentified, broadening their reach through online hiring and implementing cyberattacks on crucial infrastructure. These developments challenge traditional anti-terrorism methods; cyber terrorism presents a multifaceted threat, comprising both national security and the stability of global financial systems and critical communication infrastructure (Broeders et al 2021). The rapidly evolving nature of terrorist activities in cyberspace necessitates a re-evaluation of international laws and cooperative frameworks to address emerging challenges effectively (Efrony2023; Arigbabu et al 2024).
Moreover, the intersection of Terrorism and human rights poses substantial challenges to international relations. Governments globally encounter the challenge of executing successful anti-terrorism actions while sustaining civil freedom. A lot of nations have relied on disputable practices, which include mass surveillance, indefinite detentions, and even the use of cruelty, frequently leading to violations of global human rights standards (Shahnawaz &Abad 2021). Although some argue that these measures are necessary for global security, concerns persist that they may inadvertently fuel the grievances exploited by terrorist groups, thereby perpetuating cycles of extremism. This ongoing argument between ranking security and safeguarding human rights remains one of the most difficult obstacles for states and global bodies included in anti-terrorism (Gamurari 2020; Samuel Okon etal 2024).
Global collaboration is important for handling the international threat of Terrorism. Organizations like the United Nations and NATO play an important role in coordinating tactics, enabling knowledge-sharing, and advocating global lawful structures. Nevertheless, these efforts are frequently obstructed by contradictory national interests, different levels of political dedication, and disproportionate resource allocation among member states. It has been proposed that while defense forces' interference and knowledge-sharing are crucial, addressing the source of terrorism, which includes political grievances, economic imbalance, and social unfairness, remains important for long-term stability (Mwangi 1975). Consequently, international organizations must adopt a multifaceted approach that transcends military interventions and instead addresses the root causes of conflicts through comprehensive solutions (Lake et al 2021; Samuel – Okon 2024).
The ever-evolving nature of Terrorism poses significant challenges to international counter-extremism efforts, particularly with the emergence of lone-wolf attacks and digital terrorism threats. Investigating major historical scenarios such as the September 11 attacks, the Boko Haram rebellion, and the Paris attacks, all point to the significance of international collaboration, strong anti-terrorism laws, and cautious stability between human rights and security actions. Analyzing the disparate motivations driving terrorist actions and the range of responses to these actions can provide invaluable insights, ultimately informing the development of effective international security tactics (Boustras and Waring 2020). As nations collaborate together to fight against terrorism, these case studies offer critical insights that will significantly inform and enhance future anti-terrorism initiatives, both domestically and globally (Ejova 2023).
2. Factors of Terrorism
Terrorism is driven by a multifaceted mix of socio-political, ideological, and economic motivations, characterized by varying contextual factors yet sharing over-reaching commonalities. Ideological extremism, frequently rooted in radical religious, political, and nationalist convictions, serves as a key catalyst for terrorism. It has been argued that groups like Al-Qaeda and ISIS have skewed religious messages to vindicate violence, especially in response to threats to their values (Venkatesh et al 2018). The September 11 attacks, for example, were motivated by a toxic mix of anti-Western sentiment and resentment towards U.S. foreign policy in the Middle East, with extremist groups exploiting religious narratives to recruit martyrs. Correspondingly, the Boko Haram rebellion in Nigeria, based on Islamist extremism, is targeted at commanding Sharia law. Still, it is also motivated by the socio-political disenfranchisement and economic disregard of Northeastern Nigeria (Samuel Okon 2024).
The advent of globalization, coupled with the proliferation of the internet and social media, has significantly expanded the reach and influence of terrorist organizations worldwide. Groups such as ISIS have leveraged these digital platforms to disseminate propaganda and recruit disillusioned individuals globally, transcending geographical boundaries. Social media platforms, including YouTube and Twitter, facilitate the dissemination of extremist ideologies, posing significant challenges to anti-terrorism initiatives due to their decentralized and diffused structures. For example, ISIS's use of social platforms illustrates how terrorist organizations adjust to the technology era, enlisting oppressed individuals exasperated with global politics (Abdulmajid 2021).
Political unrest also facilitates the rise of terrorism. It has been argued that the power authority void in Syria and Iraq permitted groups like ISIS to thrive by manipulating sectarian disputes and debilitating State power (Munhir 2023). The proliferation of Boko Haram can be attributed to the Nigerian government’s inability to address fundamental needs in the Northeastern region, compounded by economic disregard. This neglect cultivates discontent, which extremist groups capitalize on to recruit people against the state.
Economic instability, characterized by poverty and inequality, constitutes a significant factor in the proliferation of terrorism. In regions plagued by financial uncertainty, people are lured into extremist groups by economic enticement or the promise of social affiliation. Boko Haram manipulates economic inequalities in northern Nigeria, where high joblessness and inadequate development make enlistment easier. While economic factors do not singularly trigger terrorism, they exacerbate existing grievances, creating a fertile ground for radicalization (Tayimlong 200). Correspondingly, ISIS has effectively enlisted foreign fighters by providing not only ideological alignment but also economic sustenance in conflict-hidden regions (Tyler et al 2020; Okon et al 2024).
Terrorism is a multifaceted phenomenon driven by an interplay of ideological, social-political, and economic factors. Consequently, effective anti-terrorism strategies must embrace a holistic approach, dealing with the underlying grievances that fuel extremist ideologies (Treistman, 2021).
3. Impact of Terrorism on International Relations
Terrorist attacks have significant and wide-ranging effects on international relations, reshaping global diplomatic, military, and economic policies. These attacks often prompt immediate responses that alter security frameworks and diplomatic priorities. The September 11, 2001, attacks, for instance, led to the U.S. War on Terror and military interventions in Afghanistan and Iraq. These actions strengthened alliances, particularly within NATO, but also caused tensions with nations such as France and Russia, which opposed the interventions (Connah 2020). This shift placed terrorism at the center of international discussions, pushing aside other global issues (Kruglanski et al,2020; Asonze et al 2024).
Other major attacks, such as the 2008 Mumbai and 2015 Paris attacks, further demonstrate terrorism's impact on international relations. The Mumbai attacks heightened tensions between India and Pakistan, with India accusing Pakistan-based groups of responsibility, leading to increased military readiness. Similarly, the Paris attacks prompted France to intensify airstrikes on ISIS in Syria. These incidents highlight the need for international cooperation in counterterrorism, prompting European nations to enhance border controls and intelligence-sharing (Cross 2019).
Terrorism has also driven changes in global security frameworks, particularly after 9/11. It has been contended that the focus on counterterrorism led to the creation of institutions like the U.S. Department of Homeland Security and expanded NATO’s role (Levitt et al 2024). However, these military actions often result in civilian casualties and fuel radicalization, especially in the Middle East and South Asia. This raises concerns about the limitations of a purely military approach, with calls for addressing socio-economic factors that contribute to radicalization (Ramasamy2021).
Diplomatic relations are deeply affected by terrorism. The U.S. interventions in Afghanistan and Iraq caused long-term instability in the Middle East, straining relations with Iran and Syria, while strengthening alliances with countries like Saudi Arabia (Kaye et al 2024). International platforms such as the United Nations have facilitated counterterrorism dialogue, though debates persist over whether military actions or political and economic reforms are the most effective strategies (Londras et al 2022: Omoniyi et al 2024).
Terrorism also shapes global alliances and norms. The creation of bodies such as the UN’s Counter-Terrorism Committee and the Global Counterterrorism Forum reflects international responses to terrorism. While these alliances have bolstered efforts, they remain fragile due to disagreements over strategies. Nonetheless, terrorism continues to influence international relations, creating both opportunities for cooperation and challenges in managing conflicting national interests (Hill et al 2023).
Recently, the United Nations Agency for International Development (USAID) was accused of aiding and abetting terrorists in Nigeria with the funds meant for development in line with the agency’s mandate. The agency since inception by the government of John F. Kennedy has the mandate to improve the quality of living through its contribution to health, education and the economy with particular focus on HIV/AIDS patients and agriculture. US Congress man, Scot Perry alleged that USAID was funding terrorist groups such as Boko haram, ISIS and Al-Qaeda with the funds generated from taxes paid by Americans. Although, these allegations have remained unsubstantiated the Trump led government has withdrawn the aids given to developing countries. In this regard, it will be apposite to conduct a thorough investigation into the veracity of this allegation before concluding on the guilt of the agency.
4. Counterterrorism Efforts in International Relations
Counterterrorism efforts in international relations are shaped by the involvement of international organisations, military alliances, and legal frameworks, all of which influence global strategies. The United Nations (UN) has played a significant role in fostering cooperation among member states through initiatives like the 2006 Global Counter-Terrorism Strategy. This framework encourages international dialogue and collaboration. However, the UN’s effectiveness is limited by the divergent political agendas of member states, leading to inconsistent enforcement of agreements (Ipe et al.2010). Despite fostering cooperation, the lack of binding enforcement mechanisms weakens the overall impact of UN efforts (Hoffman et al 2022; oladoyinbo et al 2024).
NATO, in contrast, has focused on a militarized approach, otherwise called deradicalisation, as evidenced by its involvement in Afghanistan after 9/11. NATO has been instrumental in intelligence-sharing and coordinating military efforts to dismantle terrorist networks. However, criticisms have emerged, particularly concerning the overemphasis on military interventions rather than addressing the underlying causes of terrorism (Watling & Macfarland 2021) The U.S.-led campaigns in Afghanistan and Iraq temporarily disrupted terrorist activities, but they also destabilized regions, creating power vacuums later exploited by groups such as ISIS (Cordesman & Toukan 2019).
Intelligence-sharing remains a critical component of counterterrorism. Alliances like the Five Eyes—a cooperative intelligence-sharing group between the U.S., U.K., Canada, Australia, and New Zealand—have been vital in preempting attacks and strengthening global security efforts. These alliances have enhanced cross-border tracking of terrorist networks, although differences in national security priorities and legal frameworks, such as data privacy laws, present ongoing challenges (Cater 2023; Olaniyi et al 2024).
Legal frameworks and diplomacy are also essential in counterterrorism. Treaties like the International Convention for the Suppression of the Financing of Terrorism provide legal structures to combat the financing of extremist activities. Although these frameworks establish global standards, enforcement remains inconsistent, especially in regions with weak legal institutions. Diplomatic efforts aimed at promoting political stability and economic development are crucial in addressing terrorism’s root causes, although they often struggle to balance immediate security needs with long-term developmental goals (Verma 2019).
A purely military approach has proven inadequate in combating terrorism, as it fails to address the socio-political and economic factors that contribute to radicalization. Hence, a broader strategy combining diplomatic, legal, and developmental efforts is necessary to tackle the complexities of terrorism effectively (Prantl and Goh 2022). This comprehensive approach should integrate military responses with intelligence-sharing, legal reforms, and political initiatives to counter the conditions that sustain terrorism ( Walsh 2020; Olaniyi et al 2024).
5. Challenges to Global Counterterrorism Efforts
Global counterterrorism efforts continue to face numerous challenges that hinder their overall effectiveness. One significant obstacle is balancing national security with the protection of fundamental human rights. In the aftermath of 9/11, governments implemented stringent security measures, including surveillance programs and indefinite detentions, justified by the need to prevent future attacks. However, practices such as those at Guantanamo Bay have drawn criticism from human rights organizations, which argue that they violate international norms and contribute to further radicalization. Mass surveillance programs, as exposed by Edward Snowden, have also sparked debates over privacy rights.( Adelaiye 2024). Critics argue that these measures erode public trust and infringe on civil liberties, especially in marginalized communities, highlighting the ongoing difficulty of balancing security with civil rights protections (Aitkinson et al 2020).
The rise of cyberterrorism presents a newer challenge for global counterterrorism strategies. Terrorist organizations, particularly groups like ISIS, increasingly utilize cyberspace to recruit, radicalize, and coordinate attacks. It has also been posited that the anonymity of the internet allows these groups to operate with impunity, often surpassing the legal and enforcement capacities of individual nations (Belhadj Ali 2021). Current international legal frameworks, such as the Budapest Convention on Cybercrime, are inadequate for addressing the complexities of cyberterrorism. The transnational nature of these crimes further complicates jurisdictional enforcement, emphasizing the need for updated international laws that address prosecuting cyberterrorists operating across multiple borders (Mahboob et al 2023).
Resource disparities between nations also exacerbate the global counterterrorism challenge. Many less-resourced countries, particularly in Africa and the Middle East, lack the financial, technological, and human resources necessary to develop sophisticated counterterrorism strategies. Oriola argues that Nigeria’s struggle against Boko Haram illustrates this point, as the government’s inability to properly equip its military has allowed the group to persist. (Oriola 2021). These countries often depend on external support from wealthier nations, which raises concerns about sovereignty and dependency. Furthermore, resource disparities lead to unequal prioritization of counterterrorism, with wealthier nations focusing on their own security concerns, sometimes at the expense of broader global cooperation (McGauvran et al 2024).
Political differences further complicate global counterterrorism efforts. While some nations, like the United States and the United Kingdom, take active roles in military and intelligence-sharing initiatives, others, particularly those less affected by terrorism, may show lower levels of engagement. This divergence often creates gaps in international strategies, undermining the overall effectiveness of global counterterrorism efforts (Cline 2022). Greater international cooperation remains critical, but achieving consensus on coordinated responses is often hindered by competing national interests and varying levels of political commitment (Chaturvedi et al2024)
In addressing these challenges, a more integrated approach is required. It is contended that efforts to balance security with human rights, address cyberterrorism, and bridge resource and political gaps must be prioritized to effectively combat terrorism on an international level (Susan et al 2024).
6. The Way Forward
Counterterrorism efforts, while complex, have achieved notable successes that provide valuable insights for future strategies. One frequently cited example is Sri Lanka’s defeat of the Tamil Tigers (LTTE) in 2009, ending a 26-year civil war. Wuthnow and Fravel argue that this success was driven by a combination of military strategies, including consolidating military power and centralizing intelligence efforts.( Wuthnow and Fravel 2022). The Sri Lankan government's establishment of "no-fire zones" for civilians and the role of international support in logistics and intelligence were also critical. However, the campaign has been criticized for human rights violations, illustrating the need to balance security measures with humanitarian considerations (O’Leary 2021; Ogungbemi et al 2024).
Colombia’s efforts against the Revolutionary Armed Forces of Colombia (FARC) present another example of a successful counterterrorism approach. The Colombian government, with U.S. support under Plan Colombia, combined military action with socio-political reforms. The 2016 peace agreement was achieved not only through military operations but also by addressing poverty, inequality, and political exclusion—key drivers of terrorism (Meger & Sachseder 2020). This underscores that military solutions alone are insufficient for lasting peace (Walter et al 2020).
New and evolving threats, such as cyberterrorism and lone-wolf attacks, challenge traditional counterterrorism approaches. Terrorist organizations increasingly leverage digital platforms to recruit, plan, and execute attacks. The anonymity of cyberspace has allowed groups like ISIS to exploit this domain, outpacing current legal frameworks (Schneider et al 2020). Stronger international laws and enhanced intelligence-sharing are needed to counter this growing threat, although concerns over data privacy and national security complicate such cooperation (Bode and H. Huelss 2024).
Lone-wolf attacks, often carried out by individuals radicalised online, present additional challenges. Traditional counterterrorism strategies, which focus on organised groups, are often ill-equipped to address the decentralised nature of these attacks. Furthermore, expanded counter-radicalization efforts, focusing on psychological and social factors, are essential (Scrivens 2020). In the same vein, community engagement, counter-narratives to extremist ideologies, and mental health support are necessary to mitigate the rise of lone-wolf terrorism (Hutson 2021).
Scholars agree that a more holistic counterterrorism approach is needed. Beyond military interventions, it is vital to address socio-economic and political grievances that fuel terrorism. Reducing poverty, combating political marginalisation, and addressing ideological grievances can diminish the conditions that lead to radicalization (Ajil 2020). Enhanced international cooperation, particularly in intelligence-sharing and cybersecurity, will also be crucial for countering threats like cyberterrorism. As terrorist threats evolve, counterterrorism strategies must adapt, focusing on both immediate security and long-term stability (Rahman et al 2023; Joseph 2024).
7. Conclusion and Recommendations
This study highlighted the complex nature of terrorism, shaped by socio-political, ideological, and economic factors. While socio-political variables like trust in government, religious values, and political ideology were not significant predictors of religiously motivated terrorism, key patterns, particularly in the relationship between political ideology and governance have been revealed. These findings suggest that, although individual factors may not always predict terrorism, they influence its manifestation in different contexts.
The analysis of the September 11 attacks demonstrated a strong global response, with increased international collaborations and counterterrorism policies post-9/11. However, the U.S.'s internal peace stability showed limited change, emphasizing the greater global impact of these attacks. The growth of coalitions, led by organizations like NATO and the UN, underscores the importance of international cooperation in addressing terrorism.
The analysis confirmed that UN and NATO interventions help reduce terrorist incidents but are more effective when combined with strong governance and economic stability. The interaction between unemployment and governance further stressed the need for addressing socio-economic conditions in weak governance systems to effectively counter terrorism. Overall, governance and economic stability were found to be more impactful than military or legal interventions alone. Based on the findings, the study offers the following recommendations for improving global counterterrorism efforts:
1. International organizations should prioritize governance reforms in countries vulnerable to terrorism, as improved governance has a significant impact on reducing terrorist incidents.
2. Economic development initiatives must be integrated with counterterrorism strategies, as stronger economic stability is shown to have the most substantial effect on reducing terrorism.
3. International coalitions should expand beyond military and legal interventions, incorporating broader socio-economic strategies to address the root causes of terrorism.
4. Intelligence-sharing and international collaboration must be strengthened to ensure that counterterrorism policies are consistently implemented across borders, facilitating a more coordinated and effective global response to terrorism.
Author Contributions: All authors contributed to this research.
Funding: Not applicable.
Conflict of Interest: The authors declare no conflict of interest.
Informed Consent Statement/Ethics Approval: Not applicable.
References
A. A. J, “Implications of Boko Haram insurgency in Borno state, Nigeria,” Uew.edu.gh, 2022, doi: http://41.74.91.244:8080/handle/123456789/3668
A. Abdulmajid, “Extremism in the Digital Era,” Google Books, 2021. https://books.google.com/books?hl=en&lr=&id=Y8w4EAAAQBAJ&oi=fnd&pg=PP5&dq=ISIS%E2%80%99s+use+of+social+media+demonstrates+how+terrorist+organizations+adapt+to+the+digital+age (accessed Sep. 30, 2024).
A. Abu-Bakare, “Counterterrorism and race,” International Politics Reviews, vol. 8, no. 1, pp. 79–99, Jun. 2020, doi: https://doi.org/10.1057/s41312-020-00074-x
A. Ajil, “Politico-ideological violence: Zooming in on grievances,” European Journal of Criminology, vol. 19, no. 2, p. 147737081989622, Jan. 2020, doi: https://doi.org/10.1177/1477370819896223
A. Cordesman and A. Toukan, “The Return of ISIS in Iraq, Syria, and the Middle East,” 2019. Accessed: Oct. 01, 2024. [Online]. Available: http://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/190903_Comparisons_Between_LIG_UN_.pdf
A. D. Samuel-Okon, O. I. Akinola, O. O. Olaniyi, O. O. Olateju, and S. A. Ajayi, “Assessing the Effectiveness of Network Security Tools in Mitigating the Impact of Deepfakes AI on Public Trust in Media,” Archives of Current Research International, vol. 24, no. 6, pp. 355–375, Jul. 2024, doi: https://doi.org/10.9734/acri/2024/v24i6794
A. D. Samuel-Okon, O. O. Olateju, S. U. Okon, O. O. Olaniyi, and U. T. I. Igwenagu, “Formulating Global Policies and Strategies for Combating Criminal Use and Abuse of Artificial Intelligence,” Archives of current research international, vol. 24, no. 5, pp. 612–629, Jun. 2024, doi: https://doi.org/10.9734/acri/2024/v24i5735
A. D. Samuel-Okon, “Behind the Screens: A Critical Analysis of the Roles of Guilds and Associations in Standardizing Contracts, Wages, and Enforcing Professionalism amongst Players in the Entertainment Industry,” Asian Journal of Economics Business and Accounting, vol. 24, no. 9, pp. 166–187, Sep. 2024, doi: https://doi.org/10.9734/ajeba/2024/v24i91484
A. D. Samuel-Okon, “Headlines to Hard-Lines: Media Intervention in Managing Bullying and Cancel Culture in the Entertainment Industry,” Asian Journal of Advanced Research and Reports, vol. 18, no. 9, pp. 71–89, Aug. 2024, doi: https://doi.org/10.9734/ajarr/2024/v18i9736
A. D. Samuel-Okon, “Navigating the Shadows: Understanding and Addressing Sexual Harassment Challenges in the Entertainment Industry,” Asian Journal of Advanced Research and Reports, vol. 18, no. 9, pp. 98–117, Sep. 2024, doi: https://doi.org/10.9734/ajarr/2024/v18i9738
A. Susan Chinasa, M. Ravana Nanyeneke, S. O. Olabanji, O. J Olalekan, P. Joeaneke, and O. Oladeji Oluwaseun, “The Evolution of Terrorism in the Digital Age: Investigating the Adaptation of Terrorist Groups to Cyber Technologies for Recruitment, Propaganda, and Cyberattacks,” Social Science Research Network, Jan. 2024, doi: https://doi.org/10.2139/ssrn.4756964
A. T. Arigbabu, O. O. Olaniyi, C. S. Adigwe, O. O. Adebiyi, and S. A. Ajayi, “Data Governance in AI - Enabled Healthcare Systems: A Case of the Project Nightingale,” Asian Journal of Research in Computer Science, vol. 17, no. 5, pp. 85–107, Mar. 2024, doi: https://doi.org/10.9734/ajrcos/2024/v17i5441
A. W. Kruglanski, R. Gunaratna, M. Ellenberg, and A. Speckhard, “Terrorism in time of the pandemic: exploiting mayhem,” Global Security: Health, Science and Policy, vol. 5, no. 1, pp. 121–132, Jan. 2020, doi: https://doi.org/10.1080/23779497.2020.1832903
B. F. Walter, L. M. Howard, and V. P. Fortna, “The Extraordinary Relationship between Peacekeeping and Peace,” British Journal of Political Science, vol. 51, no. 4, pp. 1–18, Nov. 2020, doi: https://doi.org/10.1017/s000712342000023x
C. Atkinson and G. Chiozza, “Hybrid Threats and the Erosion of Democracy from Within: US Surveillance and European Security,” Chinese Political Science Review, vol. 6, no. 1, pp. 119–142, Nov. 2020, doi: https://doi.org/10.1007/s41111-020-00161-2
C. Belhadj Ali, “International Crimes in the Digital Age: Challenges and Opportunities Shaped by Social Media,” Groningen Journal of International Law, vol. 9, no. 1, pp. 43–59, Sep. 2021, doi: https://doi.org/10.21827/grojil.9.1.43-59
C. Ejova, “International cooperation for countering terrorism within the UN: theoretical-empirical aspects,” CES Working Papers, vol. XV, no. 2, pp. 173–193, 2023, Available: https://www.ceeol.com/search/article-detail?id=1208721
C. U. Asonze, O. S. Ogungbemi, F. A. Ezeugwa, A. O. Olisa, O. I. Akinola, and O. O. Olaniyi, “Evaluating the Trade-offs between Wireless Security and Performance in IoT Networks: A Case Study of Web Applications in AI-Driven Home Appliances,” Journal of Engineering Research and Reports, vol. 26, no. 8, pp. 411–432, Aug. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i81255
D. A. Lake, L. L. Martin, and T. Risse, “Challenges to the Liberal Order: Reflections on International Organization,” International Organization, vol. 75, no. 2, pp. 1–33, Mar. 2021, doi: https://doi.org/10.1017/S0020818320000636
D. Broeders, F. Cristiano, and D. Weggemans, “Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy,” Studies in Conflict & Terrorism, vol. 46, no. 12, pp. 1–28, Jun. 2021, doi: https://doi.org/10.1080/1057610x.2021.1928887
D. Cater, “Exploring solutions to the challenges of law enforcement access to cross-border data while maintaining personal privacy protections within global networks,” unsworks.unsw.edu.au, 2023. https://unsworks.unsw.edu.au/entities/publication/86efa199-97fd-4a1c-b805-fbb0ff87fe9c
D. Efrony, “Enhancing Accountability in Cyberspace Through a Three-Tiered International Governance Regime,” U.S. Naval War College Digital Commons, 2023. https://digital-commons.usnwc.edu/ils/vol103/iss1/13/ (accessed Sep. 30, 2024).
D. Heyer and Garth, “Police Respond to Terrorism,” Google Books, 2023. https://books.google.com/books?hl=en&lr=&id=hDfZEAAAQBAJ&oi=fnd&pg=PR9&dq=The+Mumbai+attacks+also+revealed+the+vulnerabilities+of+urban+environments(accessed Sep. 30, 2024)
De Londras and Fiona, “The Practice and Problems of Transnational Counter-Terrorism,” Google Books, 2022. https://books.google.com/books?hl=en&lr=&id=ZHJgEAAAQBAJ&oi=fnd&pg=PR7&dq=International+platforms+such+as+the+United+Nations+have+facilitated+counterterrorism+dialogue (accessed Oct. 01, 2024).
E. O’Leary, “Politics and principles: The impact of counterterrorism measures and sanctions on principled humanitarian action,” International Review of the Red Cross, pp. 1–19, Oct. 2021, doi: https://doi.org/10.1017/s1816383121000357
F. H. Khalid, “UNITED NATIONS COUNTER TERRORISM STRATEGY: A THEORETICAL ANALYSIS,” Journal of Nautical Eye and Strategic Studies, vol. 2, no. 1, pp. 43–55, Jun. 2022, Available: https://ojs.mul.edu.pk/index.php/J-NESS/article/view/97
G. Boustras and A. Waring, “Towards a reconceptualization of safety and security, their interactions, and policy requirements in a 21st century context,” Safety Science, vol. 132, p. 104942, Dec. 2020, doi: https://doi.org/10.1016/j.ssci.2020.104942
Rahman, A. Sadiq, and S. A. Shah, “Resurgence and Response: Evaluating the Effectiveness of Pakistan’s Counter-Terrorism Strategies amidst Rising Terrorism Threats,” Pakistan journal of social research, vol. 05, no. 04, pp. 24–37, Dec. 2023, doi: https://doi.org/10.52567/pjsr.v5i04.1329
Hill, Christopher, M. Smith, and S. Vanhoonacker, “International Relations and the European Union,” Google Books, 2023 http://books.google.com/books?hl=en&lr=&id=QPegEAAAQBAJ&oi=fnd&pg=PP1&dq=terrorism+continues+to+influence+international+relations
I. Bode and H. Huelss, “The future of remote warfare? Artificial intelligence, weapons systems and human control,” 2021. Accessed: Oct. 01, 2024. [Online]. Available: https://portal.findresearcher.sdu.dk/files/180860008/Open_access_version.pdf#page=64
J. Ipe, J. Cockayne, and A. Millar, “Implementing the UN Glob Counter-Terrorism Strategy West Africa Implementing the UN Global Counter-Terrorism Strategy in West Africa Implementing the UN Global Counter-Terrorism Strategy in West Africa,” 2010. Available: https://www.fourthfreedomforum.org/wp-content/uploads/2020/06/2010-September-Millar-Cockayne-Ipe-UN-CT-Strategy-West-Africa.pdf
J. Prantl and E. Goh, “Rethinking strategy and statecraft for the twenty-first century of complexity: a case for strategic diplomacy,” International Affairs, vol. 98, no. 2, pp. 443–469, Feb. 2022, doi: https://doi.org/10.1093/ia/iiab212
J. S. Ojo, “Governing ‘Ungoverned Spaces’ in the Foliage of Conspiracy: toward (Re)ordering Terrorism, from Boko Haram Insurgency, Fulani Militancy to Banditry in Northern Nigeria,” African Security, vol. 13, no. 1, pp. 1–34, Feb. 2020, doi: https://doi.org/10.1080/19392206.2020.1731109
J. Schneider, E. Goldman, M. Warner, P. Nakasone, and C. Demchak, “Ten Years In: Implementing Strategic Approaches to Cyberspace Ten Years In: Implementing Strategic Approaches to Cyberspace,” 2020. Available: https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1044&context=usnwc-newport-papers
J. Treistman, “Social Exclusion and Political Violence: Multilevel Analysis of the Justification of Terrorism,” Studies in Conflict & Terrorism, pp. 1–24, Dec. 2021, doi: https://doi.org/10.1080/1057610x.2021.2007244
J. Watling and S. Macfarland, “The Future of the NATO Corps,” 2021. Available: https://static.rusi.org/237_op_future_nato_corps_web_version.pdf
J. Wuthnow and M. T. Fravel, “China’s military strategy for a ‘new era’: Some change, more continuity, and tantalizing hints,” Journal of Strategic Studies, vol. 46, no. 6–7, pp. 1–36, Mar. 2022, doi: https://doi.org/10.1080/01402390.2022.2043850
Kaunert, Christian, J. de Deus Pereira, and M. Edward, “Thick Europe, ontological security and parochial Europe: the re-emergence of far-right extremism and terrorism after the refugee crisis of 2015,” In Transforming Europe Through Crises , 2022. https://www.academia.edu/download/66428408/23745118.2020.pdf
Kaye, D. Dassa, L. Robinson, A. L, J. Martini, and N. Vest, “Defense Technical Information Center,” Dtic.mil, 2024. https://apps.dtic.mil/sti/citations/trecms/AD1123969
L. Cline, “Sharing intelligence culture,” The Journal of Intelligence, Conflict, and Warfare, vol. 5, no. 1, pp. 18–38, May 2022, doi: https://doi.org/10.21810/jicw.v5i1.3818
L. Connah, “US Intervention in Afghanistan: Justifying the Unjustifiable?,” South Asia Research, vol. 41, no. 1, pp. 70–86, Nov. 2020, Available: https://journals.sagepub.com/doi/pdf/10.1177/0262728020964609
Levitt and Matthew, “Rethinking US efforts on counterterrorism: Toward a sustainable plan two decades after 9/11,” Washingtoninstitute.org, 2024. https://www.washingtoninstitute.org/sites/default/files/pdf/Levitt20210610-JNSLPTransitionReprint.pdf
M. K. D. Cross, “Counter-terrorism & the intelligence network in Europe,” International Journal of Law, Crime and Justice, vol. 72, p. 100368, Dec. 2019, doi: https://doi.org/10.1016/j.ijlcj.2019.100368
M. S. Shahnawaz and Q. Abad, “Torture: Challenges to Domestic and International Criminal Law,” Pakistan Horizon, vol. 74, no. 2–3, pp. 103–131, Apr. 2021, Available: http://www.pakistan-horizon.piia.org.pk/index.php/pakistan-horizon/article/view/150
O. I. Akinola, O. O. Olaniyi, O. S. Ogungbemi, O. B. Oladoyinbo, and A. O. Olisa, “Resilience and Recovery Mechanisms for Software-Defined Networking (SDN) and Cloud Networks,” Journal of Engineering Research and Reports, vol. 26, no. 8, pp. 112–134, Jul. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i81234
O. O. Olaniyi, F. A. Ezeugwa, C. G. Okatta, A. S. Arigbabu, and P. C. Joeaneke, “Dynamics of the Digital Workforce: Assessing the Interplay and Impact of AI, Automation, and Employment Policies,” Archives of current research international, vol. 24, no. 5, pp. 124–139, Apr. 2024, doi: https://doi.org/10.9734/acri/2024/v24i5690
O. O. Olaniyi, J. C. Ugonnia, F. G. Olaniyi, A. T. Arigbabu, and C. S. Adigwe, “Digital Collaborative Tools, Strategic Communication, and Social Capital: Unveiling the Impact of Digital Transformation on Organizational Dynamics,” Asian Journal of Research in Computer Science, vol. 17, no. 5, pp. 140–156, Mar. 2024, doi: https://doi.org/10.9734/ajrcos/2024/v17i5444
O. O. Olaniyi, O. O. Olaoye, and O. J. Okunleye, “Effects of Information Governance (IG) on Profitability in the Nigerian Banking Sector,” Asian Journal of Economics, Business and Accounting, vol. 23, no. 18, pp. 22–35, Jul. 2023, doi: https://doi.org/10.9734/ajeba/2023/v23i181055
O. O. Olaniyi, O. O. Omogoroye, F. G. Olaniyi, A. I. Alao, and T. O. Oladoyinbo, “CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem,” Journal of Engineering Research and Reports, vol. 26, no. 6, p. 32, 2024, doi: https://doi.org/10.9734/JERR/2024/v26i61160
O. O. Olaniyi, “Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies,” Asian Journal of Research in Computer Science, vol. 17, no. 5, pp. 172–189, Mar. 2024, doi: https://doi.org/10.9734/ajrcos/2024/v17i5447
O. O. Olateju, S. U. Okon, O. O. Olaniyi, A. D. Samuel-Okon, and C. U. Asonze, “Exploring the Concept of Explainable AI and Developing Information Governance Standards for Enhancing Trust and Transparency in Handling Customer Data,” Journal of Engineering Research and Reports, vol. 26, no. 7, pp. 244–268, Jun. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i71206
O. O. Olateju, S. U. Okon, U. T. I. Igwenagu, A. A. Salami, T. O. Oladoyinbo, and O. O. Olaniyi, “Combating the Challenges of False Positives in AI-Driven Anomaly Detection Systems and Enhancing Data Security in the Cloud,” Asian Journal of Research in Computer Science, vol. 17, no. 6, pp. 264–292, Jun. 2024, doi: https://doi.org/10.9734/ajrcos/2024/v17i6472
O. S. Ogungbemi, F. A. Ezeugwa, O. O. Olaniyi, O. I. Akinola, and O. B. Oladoyinbo, “Overcoming Remote Workforce Cyber Threats: A Comprehensive Ransomware and Bot Net Defense Strategy Utilizing VPN Networks,” Journal of Engineering Research and Reports, vol. 26, no. 8, pp. 161–184, Jul. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i81237
P. F. Walsh, “Transforming the Australian intelligence community: mapping change, impact and challenges,” Intelligence and National Security, vol. 36, no. 2, pp. 1–17, Oct. 2020, doi: https://doi.org/10.9734/ajrcos/2024/v17i5444
R. A. Hutson, “Preventing Violent Extremism and Social Work: Recent US History and Prospects,” Journal of Human Rights and Social Work, Jul. 2021, doi: https://doi.org/10.1007/s41134-021-00177-x
R. A. Tayimlong, “Fragility and Insurgency as Outcomes of Underdevelopment of Public Infrastructure and Socio-Economic Deprivation: The Case of Boko Haram in the Lake Chad Basin,” Journal of Peacebuilding & Development, vol. 16, no. 2, p. 154231662095018, Sep. 2020, doi: https://doi.org/10.1177/1542316620950188
R. J. McGauvran, G. Biglaiser, L. Y. Hunter, and H. Lee, “The Effect of Terrorism on Income Inequality,” International Studies Quarterly, vol. 68, no. 2, Mar. 2024, doi: https://doi.org/10.1093/isq/sqae043
R. Ramasamy, “Youth radicalization and violent extremism: a study of pathways in the post-war context of Sri Lanka,” Journal of Youth Studies, pp. 1–21, Dec. 2021, doi: https://doi.org/10.1080/13676261.2021.2010684
R. Scrivens, S. Windisch, and P. Simi, “Former Extremists in Radicalization and Counter-Radicalization Research,” Sociology of Crime, Law and Deviance, pp. 209–224, Sep. 2020, doi: https://doi.org/10.1108/s1521-613620200000025012
R. Verma, “China’s new security concept: India, terrorism, China’s geostrategic interests and domestic stability in Pakistan,” The Pacific Review, pp. 1–31, Sep. 2019, doi: https://doi.org/10.1080/09512748.2019.1663902
S. A. Joseph, “Balancing Data Privacy and Compliance in Blockchain-Based Financial Systems,” Journal of Engineering Research and Reports, vol. 26, no. 9, pp. 169–189, Sep. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i91271
S. A. Munir, “ISIS: A Major Threat to Peace and Security of Middle Eastern Countries,” Global strategic & security studies review, vol. VIII, no. III, pp. 10–18, Sep. 2023, doi: https://doi.org/10.31703/gsssr.2023(viii-iii).02
S. Adelaiye and D. W. Fadason, “Counterterrorism laws and state repression in the aftermath of the 9/11 attacks,” Critical Studies on Terrorism, vol. 17, no. 2, pp. 406–432, Apr. 2024, doi: https://doi.org/10.1080/17539153.2024.2351295
S. Chaturvedi et al., “Edited by The Palgrave Handbook of Development Cooperation for Achieving the 2030 Agenda,” 2021. Accessed: Oct. 01, 2024. [Online]. Available: https://library.oapen.org/bitstream/handle/20.500.12657/43286/2021_Book_ThePalgraveHandbookOfDevelopme.pdf?sequence=1#page=29
S. J. Fox, “Past Attacks, Future Risks: Where Are We 20-years After 9/11?,” Journal of Strategic Security, vol. 14, no. 3, pp. 112–157, 2021, Available: https://www.jstor.org/stable/48621953
S. J. Hoffman et al., “International treaties have mostly failed to produce their intended effects,” Proceedings of the National Academy of Sciences, vol. 119, no. 32, Aug. 2022, doi: https://doi.org/10.1073/pnas.2122854119
S. K. Okunade and O. Ogunnubi, “Insurgency in the border communities of North-Eastern Nigeria: security responses and sustainable solutions,” The Round Table, vol. 109, no. 6, pp. 684–700, Nov. 2020, doi: https://doi.org/10.1080/00358533.2020.1849496
s. M. Mahboob, s. S. Abbas, and i. A. Shaheen, “Adapting to Cybersecurity Challenges: Assessing the Effectiveness of International Law Against Cyber terrorism,” Journal of Social Research Development, vol. 4, no. 4, pp. 669–685, dec. 2023, doi: https://doi.org/10.53664/jsrd/04-04-2023-02-669-685
S. Meger and J. Sachseder, “Militarized peace: understanding post-conflict violence in the wake of the peace deal in Colombia,” Globalizations, vol. 17, no. 6, pp. 953–973, Jan. 2020, doi: https://doi.org/10.1080/14747731.2020.1712765
S. U. Okon, O. O. Olateju, O. S. Ogungbemi, S. A. Joseph, A. O. Olisa, and O. O. Olaniyi, “Incorporating Privacy by Design Principles in the Modification of AI Systems in Preventing Breaches across Multiple Environments, Including Public Cloud, Private Cloud, and On-prem,” Journal of Engineering Research and Reports, vol. 26, no. 9, pp. 136–158, Sep. 2024, doi: https://doi.org/10.9734/jerr/2024/v26i91269
Schmid and P. Alex, “Accept Terms and Conditions on JSTOR,” www.jstor.org, 2022. https://www.jstor.org/stable/pdf/resrep29395.pdf
T. B. Oriola, “Nigerian Soldiers On The War Against Boko Haram,” African Affairs, vol. 120, no. 479, pp. 147–175, Mar. 2021, doi: https://doi.org/10.1093/afraf/adab003
T. O. Oladoyinbo, S. O. Olabanji, O. O. Olaniyi, O. O. Adebiyi, O. J. Okunleye, and A. I. Alao, “Exploring the Challenges of Artificial Intelligence in Data Integrity and its Influence on Social Dynamics,” Asian Journal of Advanced Research and Reports, vol. 18, no. 2, pp. 1–23, Jan. 2024, doi: https://doi.org/10.9734/ajarr/2024/v18i2601
V. Tyler , L. Milton, and J. O. S. E. P. H. Young, “Choosing to Fight, Choosing to Die: Examining How ISIS Foreign Fighters Select Their Operational Roles,” International Studies Review, vol. 0, pp. 1–23, 2020, Accessed: Sep. 30, 2024. [Online]. Available: https://www.josephkyoung.com/publications/11144.pdf
V. Venkatesh, J. S. Podoshen, J. Wallin, J. Rabah, and D. Glass, “Promoting Extreme Violence: Visual and Narrative Analysis of Select Ultraviolent Terror Propaganda Videos Produced by the Islamic State of Iraq and Syria (ISIS) in 2015 and 2016,” Terrorism and Political Violence, vol. 32, no. 8, pp. 1–23, Oct. 2018, doi: https://doi.org/10.1080/09546553.2018.1516209
W. S. Mwangi, “The Use of Intelligence Gathering and Sharing in the Management of Transnational Terrorism In Kenya; A Thesis Submitted to The School Of Security, Diplomacy and Peace Studies In Partial Fulfilment of the Requirements for the Award of the Degree Of Doctor Of Philosophy (International Relations And Diplomacy), Kenyatta University,” 1975. Accessed: Jan. 07, 2024. [Online]. Available: Https://Ir-Library.Ku.Ac.Ke/Bitstream/Handle/123456789/23358/The%20use%20of%20intelligence%20gathering%20....Pdf?Sequence=1
О. Vоlоshchuk, V. Kоlеsnyk, A. Shevchuk, O. Yushchyk, and P. Krainii, “Human rights protection in the context of combating terrorism: problems of finding the optimal balance,” Revista Amazonia Investiga, vol. 10, no. 45, pp. 73–81, 2021, doi: https://dialnet.unirioja.es/descarga/articulo/8336862.pdf