Routledge Handbook of Counterterrorism and Counterinsurgency in Africa. (Record no. 23661)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 11418nam a22005053i 4500 |
001 - CONTROL NUMBER | |
control field | EBC6458358 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240724114828.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2020 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781351271912 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781138575394 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC6458358 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL6458358 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1232280934 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6433.A35 .R688 2021 |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.32517096 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Tar, Usman A. |
245 10 - TITLE STATEMENT | |
Title | Routledge Handbook of Counterterrorism and Counterinsurgency in Africa. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Oxford : |
Name of producer, publisher, distributor, manufacturer | Taylor & Francis Group, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (689 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgements -- About the Editor -- Contributors -- Abbreviations -- Part I: Conceptual perspectives -- 1. Introduction The frontiers of counterterrorism and counterinsurgency in Africa -- Introduction -- The frontiers of CT-COIN in Africa - emerging threats and regional security architectures -- Conceptual and contextual contours -- Transnational perspectives on CT-COIN in Africa -- Regional perspectives on CT-COIN in Africa -- National perspectives on CT-COIN in Africa -- Alternative perspectives on CT-COIN in Africa -- References -- 2. Exploring the concept of terrorism: the morphology of organised violence -- Introduction -- Socio-psychological conceptions -- Legal conceptions of terrorism -- Terrorism as defined in a political context -- The Boaz Ganor re-conception -- A response to Ganor -- Expanding the definition of terrorism -- Conclusion -- Notes -- References -- 3. Mapping the contours of terrorism and counterterrorism in Africa -- Introduction -- Conceptual and historical overview of terrorism in Africa -- Current trends on terrorism in Africa -- Al-Qaeda in the Islamic Maghreb (AQIM) -- Boko Haram -- Al-Shabaab -- Overview of counter terrorism in Africa -- Counter terrorism in Africa: principles and praxis -- National counter terrorism effort: Nigeria versus Boko Haram -- Regional effort: Sahel countries and Al-Qaeda in the Islamic Maghreb -- The African Union counter terrorism efforts -- Global efforts at countering terrorism in Africa -- Conclusion -- Notes -- References -- 4. Counterterrorism and postcolonial crisis in Africa -- Introduction -- Evolving a phrase for a phase: post-colonial Africa and its crisis -- Theorising counterterrorism for postcolonial Africa -- Continental counterinsurgency regimes and practices in postcolonial Africa. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Extra-continental counterterrorism regimes and practices in postcolonial Africa -- Implications of counterterrorism for postcolonial crisis in Africa -- Conclusion -- References -- 5. Globalisation, terrorism, and counterterrorism in Africa -- Introduction -- Conceptual definitions and debates -- Globalisation -- Terrorism -- Insurgency -- Counterterrorism and counterinsurgency (CT-COIN) -- Globalisation, terrorism, and counterterrorism in Africa -- Local roots of terrorism -- Globalisation as an impetus to terrorism in Africa -- Conclusion -- References -- 6. Saudi Wahhabis and jihadi terrorism in Africa: Between fairy tales and conspiracy theories -- Introduction -- An imaginary Islamist international -- Saudi Arabia as a victim of terrorism -- On the limits of religious indoctrination -- Fluid categories and easy confusions -- Obstacles to Wahhabi proselytism -- Conclusion -- Notes -- Bibliography -- 7. The global war on terror and its African front -- Introduction -- Review of relevant literature and conceptualisation of terrorism -- The global war on terror -- Africa and the age of terror -- Africa's contributions to the war on terror -- Conclusion -- References -- 8. Radicalisation, violent extremism, and de-radicalisation in Africa -- Introduction -- Conceptualisation: violent extremism, radicalisation, and de-radicalisation -- Radicalisation -- Violent extremism -- De-radicalisation -- Overview of violent extremism in Africa -- Factors contributing to radicalisation and violent extremism in Africa -- Modes of radicalisation by violent extremist or terrorist groups in Africa -- Indoctrination -- Brainwashing -- Hypnosis -- Propaganda -- Recent de-radicalisation interventions in Africa -- Conclusion -- References -- 9. Laws of armed conflicts, counterterrorism and counterinsurgency: Emerging conceptual and empirical contours in the battle space. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- International laws designed to govern the moderation of armed hostilities -- LOAC, "old wars" and "new wars": evolution towards a solution -- Legal challenges inherent in small wars regulated by big laws -- Hearts and minds in laws of war -- Case study: armed conflict and the challenge for LOAC in Nigeria -- Stereotyping the battle space: counterterrorism or counterinsurgency? -- The footprints insurgency and LOAC legal bandwidth -- Conclusion -- References -- 10. Information and communication technology, cyber-security and counterterrorism in Africa -- Introduction -- Conceptualisation: ICT, cyber security and cyber-terrorism -- ICT and cyber-security in a violent world -- Africa's emerging ICT and cybersecurity infrastructure -- IT-driven counterterrorism and cyber-security policy in Africa -- Mauritius -- Nigeria -- South Africa -- Continental framework: the African Union cybersecurity convention -- The deficits of science, technology, ICT and cyber-security in Africa -- Strategic considerations for effective cyber security in Africa: toward a positive cyber hygiene -- Conclusion -- References -- 11. Participatory security in Africa -- Introduction -- Security crises in Africa: a review -- The state and civil society in Africa: conceptual and theoretical framework -- The nexus between state and civil society in security provisioning -- Civil-military relations for security provisioning: volunteering for civilian joint task forces -- Challenges and prospects of functional partnership between the state and civil society -- Conclusion -- References -- Part II: Transnational perspectives -- 12. UN counterterrorism and counterinsurgency operations in Africa: Paradigm shifts and emerging structures -- Introduction -- Conceptual issues -- What is counterterrorism (CT)? -- What is counterinsurgency (COIN)?. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | What is the difference between COIN and CT? -- Background: terrorism, insurgency and CT-COIN in comparative perspective -- 1973: invasion of Saudi Embassy in Khartoum, Republic of Sudan -- 1988: Pan Am Flight 103 bombing in Lockerbie, United Kingdom -- 1998: US Embassy bombings in Kenya and Tanzania -- 2002: Mombasa bombing, Kenya -- 2005-2017: Al-Qaeda in the Islamic Maghreb (AQIM) terrorist activities in the Sahel -- 1991-2017: Al-Shabaab violent extremisms in Somalia, Kenya and the sub-region of East Africa -- 1989-2017: Lord's Resistance Army (LRA) insurgency in Northern Uganda, South Sudan, the Central African Republic and Democratic Republic of the Congo (DRC) -- UN counterterrorism and counterinsurgency operations: the case studies of CTC, CTED and CTITF -- CTITF -- Office of the high commissioner for human rights (OHCHR) -- UN counterterrorism strategies in Africa -- The challenges facing the implementation of UN global counterterrorism strategy in Africa -- Deconstructing the "Four Pillars -- Conflict and underdevelopment -- Education, religion and culture -- Victims of terrorism -- Pillar II-measures to prevent and combat terrorism -- Community policing and intelligence initiatives -- Pillar III-building states' capacity to counter terrorism -- Pillar IV-ensuring respect for human rights and advancing the rule of law -- Conclusion: towards an effective CT-COIN framework for the UN -- Pillar I-CT and COIN with a human face -- Pillar II-prevention is better than cure -- Pillar III-state capacity-building -- Pillar IV-respect for human rights and the rule of law -- References -- 13. European Union's counterterrorism and counterinsurgency strategy in Africa -- Introduction -- Conceptual framework -- Counterterrorism -- Counterinsurgency -- Europe and the global war on terror -- Prevention -- Protection -- Pursuit -- Response. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The Africa-EU strategic partnership amidst insurgency -- Countering transnational terrorism: is Africa truly immune? -- Conclusion -- Notes -- References -- 14. NATO's counterterrorism and counterinsurgency strategy in Africa -- Introduction -- The North Atlantic Treaty Organisation (NATO): evolution and transformation -- Theoretical framing of NATO's path to counterterrorism -- NATO's counterterrorism policy guidelines versus global practical realities -- NATO and violent extremism in Africa: fighting justly for strangers or "responsibility to protect"? -- NATO-EU co-operation: in search of pragmatic counterinsurgency mission in Africa -- Conclusion -- Notes -- References -- 15. Afro-European partnership for counterterrorism and counterinsurgency in Africa -- Introduction -- Conceptualising terrorism and insurgency -- Terrorism and insurgency in Africa: a threat to peace, security and regional development -- Afro-European partnership for counterterrorism and counterinsurgency in Africa -- Notes -- Bibliography -- 16. United States' counterterrorism and counterinsurgency strategy in Africa -- Introduction -- Conceptualizing terrorism, insurgency, counterterrorism and counterinsurgency -- United States' counterterrorism and counterinsurgency strategy in Africa -- Combined Joint Task Force-Horn of Africa (CJTF-HOA) -- The US Africa command -- Trans-Sahara counterterrorism partnership -- Challenges of US CT-COIN in Africa -- Conclusion -- References -- 17. United Kingdom's counterterrorism and counterinsurgency policy in Africa -- Introduction -- The global nature of terrorist threat -- A brief overview of security and insurgency in Africa -- History of insurgency in Africa -- Impact of history of conflict on Africa -- The United Kingdom's development and security objectives in Africa -- Why Africa?. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Challenges of United Kingdom counterterrorism and counterinsurgency assistance to Africa. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book will illuminate how Africa's defence and security environments have been radically altered by dramatic changes in world politics and local ramifications. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Internal security-Africa-Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Counterinsurgency-Africa-Handbooks, manuals, etc. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Terrorism-Prevention-Africa-Handbooks, manuals, etc. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Tar, Usman A. |
Title | Routledge Handbook of Counterterrorism and Counterinsurgency in Africa |
Place, publisher, and date of publication | Oxford : Taylor & Francis Group,c2020 |
International Standard Book Number | 9781138575394 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=6458358">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=6458358</a> |
Public note | Click to View |
No items available.