SlideShare a Scribd company logo
1 of 6
Download to read offline
Journal of Strategic Security
Volume 9
Number 4 Volume 9, No. 4, Special Issue Winter
2016: Understanding and Resolving Complex
Strategic Security Issues
Article 1
Table of Contents
Follow this and additional works at: http://scholarcommons.usf.edu/jss
pp.
This Cover & Front Matter is brought to you for free and open access by the USF Libraries at Scholar Commons. It has been accepted for
inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact
scholarcommons@usf.edu.
Recommended Citation
"Table of Contents." Journal of Strategic Security 9, no. 4 (2016).
Available at: http://scholarcommons.usf.edu/jss/vol9/iss4/1
Journal of Strategic
Security
Volume 9, No. 4, Special Issue Winter 2016:
Understanding and Resolving Complex Strategic Security Issues
Editor-in-Chief
Jeremy Tamsett, Henley-Putnam University
Guest Editor
Sara Savage, Cambridge University
Senior Editor
Randy Borum, University of South Florida
Editorial Associate
Katie Cook, Henley-Putnam University
Production Editor
Chelsea Johnston, University of South Florida
Copyeditor
Beth Eisenfeld, Henley-Putnam University
Book Review Editor
Edward J. Hagerty, Henley-Putnam University
Communications Strategist
Roy Regalado, Henley-Putnam University
Published Quarterly by
Henley-Putnam University Press
www.henley-putnam.edu
et al.: Table of Contents
Produced by The Berkeley Electronic Press, 2016
Copyright © 2016 by Henley-Putnam University
All rights reserved. No part of this publication shall be reproduced, stored in a retrieval system, or transmitted by any
means electronic, mechanical, photocopying, recording, or otherwise without written permission from the publisher. No
patent liability is assumed with respect to the use of the information contained herein. Although every precaution has
been taken in the preparation of this publication, the publisher and the author(s) assume no responsibility for errors or
omissions. Neither is any liability assumed for damanages resulting from the use of the information contained herein.
eISSN: 1944-0472
Warning and Disclaimer
Every effort has been made to make this publication as complete and as accurate as possible, but no warranty of fitness
is implied. The information provided is on an “as is” basis. The authors and the publisher shall have neither liability nor
responsibility to any person or entity with respect to any loss or damages arising from the information contained in this
publication.
Journal of Strategic Security, Vol. 9 No. 4
http://scholarcommons.usf.edu/jss/vol9/iss4/1
Editorial Advisory Board
Gary Ackerman, START Center, University of Maryland
Matt Armstrong, MountainRunner Institute
Edwin Bakker, Security and Conflict Programme,
Clingendael Institute
David L. Carter, Michigan State University
Drew Conway, New York University
Sharyl Cross, College of International and Security Studies,
George C. Marshall European Center for Security Studies
Andrea Dew, Center for Irregular Warfare & Armed
Groups, U.S. Naval War College
Christine Fair, Georgetown University
Robert Fein, The Metis Group
James Forest, Visiting Associate Professor at University of
Massachusetts Lowell
Mark Galeotti, Center for Global Affairs, New York
University
Sumit Ganguly, Indiana University, Bloomington
Donald Goldstein, Duke University
Colin Gray, University of Reading, England
Sheldon Greaves, Henley-Putnam University
Denise Greaves, Henley-Putnam University
Rita Grossman-Vermaas, FourWinds, Ltd.
Audrey Guinchard, University of Essex
John Horgan, International Center for the Study of
Terrorism, Pennsylvania State University
Richard J. Hughbank, Northwestern State University
Swen Johnson, SCIA, LLC
Robert Jervis, Columbia University
Richard J. Kilroy Jr., Coastal Carolina University
Steven Kleinman, Consultant
Margaret E. Kosal, Sam Nunn School of International
Affairs, Georgia Tech
Claire Metelits, School of International Service, American
University
Steve Metz, Strategic Studies Institute, U.S. Army War
College
Michael Miklaucic, National Defense University / U.S.
Agency for International Development
Charles A. Morgan, Yale University School of Medicine
John Nagl, Center for a New American Security
David C. Rapoport, University of California at Los
Angeles
Sara Savage, University of Cambridge
Mario Scalora, University of Nebraska, Lincoln
Louise Shelly, Terrorism, Transnational Crime &
Corruption Center, George Mason University
Greg Smith, Command Senior Enlisted Leader, Special
Operations Command Europe
John Sullivan, Los Angeles Sheriff’s Department
Jessica Turnley, Joint Special Operations University &
Galisteo Consulting Group
Ed Urie, Henley-Putnam University
Anthony Vinci, Frontier Data Corp
et al.: Table of Contents
Produced by The Berkeley Electronic Press, 2016
Correspondence concerning essays submitted for consideration should be directed to: Editor@Henley-Putnam.edu.
Guidelines for manuscript submissions can be found on the Henley-Putnam University website at www.Henley-Putnam.edu.
Materials that have been previously published or are under consideration for publication elsewhere will not be accepted.
Questions or correspondence concerning book reviews may be directed to Editor@Henley-Putnam.edu. Unsolicited book
reviews will not be accepted.
The Journal of Strategic Security is published quarterly by Henley-Putnam University Press.
Journal of Strategic Security, Vol. 9 No. 4
http://scholarcommons.usf.edu/jss/vol9/iss4/1
Table of Contents
Defeating ISIS on the Battle Ground as well as in the Online Battle Space:
Considerations of the “New Normal” and Available Online Weapons in the
Struggle Ahead.............................................................................................................1
Complexity Under Stress: Integrative Approaches to Overdetermined
Vulnerabilities.............................................................................................................11
Wicked Problems: How Complexity Science Helps Direct Education Responses to
Preventing Violent Extremism....................................................................................32
I SEE! Scotland: Tackling Sectarianism and Promoting Community Psychosocial
Health..........................................................................................................................53
Increasing Cognitive Complexity and Collaboration Across Communities: Being
Muslim Being Scottish ................................................................................................79
An IC Intervention for Post-Conflict Northern Ireland Secondary Schools..............111
Latent Memories of Terror: Media Perceptions of the Woolwich Attack .................125
Book Reviews ..............................................................................................................133
Operation Whisper: The Capture of Soviet Spies Morris and Lona Cohen..........133
Defeating Jihad: The Winnable War......................................................................136
Tradecraft Primer: A Framework for Aspiring Interrogators.............................139
et al.: Table of Contents
Produced by The Berkeley Electronic Press, 2016

More Related Content

Similar to JSS Winter Issue, Vol. 9, No. 4, Table of Contents

Academia in hls webinar june 10
Academia in hls webinar   june 10Academia in hls webinar   june 10
Academia in hls webinar june 10RPesapane
 
images20180130_120703.jpgimages20180130_120724.jpgimag.docx
images20180130_120703.jpgimages20180130_120724.jpgimag.docximages20180130_120703.jpgimages20180130_120724.jpgimag.docx
images20180130_120703.jpgimages20180130_120724.jpgimag.docxwilcockiris
 
Rhodes Scholars named for 2014
Rhodes Scholars named for 2014Rhodes Scholars named for 2014
Rhodes Scholars named for 2014mastergoodie4328
 
Terrorism Bibliography
Terrorism BibliographyTerrorism Bibliography
Terrorism BibliographyAdam Pode
 
20160325 Raugh-CV
20160325 Raugh-CV20160325 Raugh-CV
20160325 Raugh-CVDave Raugh
 
Harvard Kennedy School Spring 2015 newsletter
 Harvard Kennedy School Spring 2015 newsletter Harvard Kennedy School Spring 2015 newsletter
Harvard Kennedy School Spring 2015 newsletterAndy Varoshiotis
 
Rhodes Scholars named for 2014
Rhodes Scholars named for 2014Rhodes Scholars named for 2014
Rhodes Scholars named for 2014giantgas3071
 
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...Jose Katab
 
1465American Behavioral ScientistVolume 52 Number 10Ju.docx
1465American Behavioral ScientistVolume 52 Number 10Ju.docx1465American Behavioral ScientistVolume 52 Number 10Ju.docx
1465American Behavioral ScientistVolume 52 Number 10Ju.docxdurantheseldine
 
Visits That Enroll SACAC/PCACAC 2012
Visits That Enroll SACAC/PCACAC 2012Visits That Enroll SACAC/PCACAC 2012
Visits That Enroll SACAC/PCACAC 2012TargetX
 
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Elliott Coney, Ed.D
 

Similar to JSS Winter Issue, Vol. 9, No. 4, Table of Contents (20)

Book studies62-4-december-2018 1
Book studies62-4-december-2018 1Book studies62-4-december-2018 1
Book studies62-4-december-2018 1
 
Book studies62-4-december-2018
Book studies62-4-december-2018Book studies62-4-december-2018
Book studies62-4-december-2018
 
Academia in hls webinar june 10
Academia in hls webinar   june 10Academia in hls webinar   june 10
Academia in hls webinar june 10
 
images20180130_120703.jpgimages20180130_120724.jpgimag.docx
images20180130_120703.jpgimages20180130_120724.jpgimag.docximages20180130_120703.jpgimages20180130_120724.jpgimag.docx
images20180130_120703.jpgimages20180130_120724.jpgimag.docx
 
NIS_Harvard
NIS_HarvardNIS_Harvard
NIS_Harvard
 
Teaching intelligence
Teaching intelligenceTeaching intelligence
Teaching intelligence
 
HSC Background Guide
HSC Background GuideHSC Background Guide
HSC Background Guide
 
Rhodes Scholars named for 2014
Rhodes Scholars named for 2014Rhodes Scholars named for 2014
Rhodes Scholars named for 2014
 
Terrorism Bibliography
Terrorism BibliographyTerrorism Bibliography
Terrorism Bibliography
 
mediakit
mediakitmediakit
mediakit
 
20160325 Raugh-CV
20160325 Raugh-CV20160325 Raugh-CV
20160325 Raugh-CV
 
Zafar security cv
Zafar security cvZafar security cv
Zafar security cv
 
Harvard Kennedy School Spring 2015 newsletter
 Harvard Kennedy School Spring 2015 newsletter Harvard Kennedy School Spring 2015 newsletter
Harvard Kennedy School Spring 2015 newsletter
 
Research Report
Research ReportResearch Report
Research Report
 
Rhodes Scholars named for 2014
Rhodes Scholars named for 2014Rhodes Scholars named for 2014
Rhodes Scholars named for 2014
 
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
A Bibliography Of Academic Theses On Terrorism And Related Forms Of Violence ...
 
1465American Behavioral ScientistVolume 52 Number 10Ju.docx
1465American Behavioral ScientistVolume 52 Number 10Ju.docx1465American Behavioral ScientistVolume 52 Number 10Ju.docx
1465American Behavioral ScientistVolume 52 Number 10Ju.docx
 
Visits That Enroll SACAC/PCACAC 2012
Visits That Enroll SACAC/PCACAC 2012Visits That Enroll SACAC/PCACAC 2012
Visits That Enroll SACAC/PCACAC 2012
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

JSS Winter Issue, Vol. 9, No. 4, Table of Contents

  • 1. Journal of Strategic Security Volume 9 Number 4 Volume 9, No. 4, Special Issue Winter 2016: Understanding and Resolving Complex Strategic Security Issues Article 1 Table of Contents Follow this and additional works at: http://scholarcommons.usf.edu/jss pp. This Cover & Front Matter is brought to you for free and open access by the USF Libraries at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact scholarcommons@usf.edu. Recommended Citation "Table of Contents." Journal of Strategic Security 9, no. 4 (2016). Available at: http://scholarcommons.usf.edu/jss/vol9/iss4/1
  • 2. Journal of Strategic Security Volume 9, No. 4, Special Issue Winter 2016: Understanding and Resolving Complex Strategic Security Issues Editor-in-Chief Jeremy Tamsett, Henley-Putnam University Guest Editor Sara Savage, Cambridge University Senior Editor Randy Borum, University of South Florida Editorial Associate Katie Cook, Henley-Putnam University Production Editor Chelsea Johnston, University of South Florida Copyeditor Beth Eisenfeld, Henley-Putnam University Book Review Editor Edward J. Hagerty, Henley-Putnam University Communications Strategist Roy Regalado, Henley-Putnam University Published Quarterly by Henley-Putnam University Press www.henley-putnam.edu et al.: Table of Contents Produced by The Berkeley Electronic Press, 2016
  • 3. Copyright © 2016 by Henley-Putnam University All rights reserved. No part of this publication shall be reproduced, stored in a retrieval system, or transmitted by any means electronic, mechanical, photocopying, recording, or otherwise without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this publication, the publisher and the author(s) assume no responsibility for errors or omissions. Neither is any liability assumed for damanages resulting from the use of the information contained herein. eISSN: 1944-0472 Warning and Disclaimer Every effort has been made to make this publication as complete and as accurate as possible, but no warranty of fitness is implied. The information provided is on an “as is” basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this publication. Journal of Strategic Security, Vol. 9 No. 4 http://scholarcommons.usf.edu/jss/vol9/iss4/1
  • 4. Editorial Advisory Board Gary Ackerman, START Center, University of Maryland Matt Armstrong, MountainRunner Institute Edwin Bakker, Security and Conflict Programme, Clingendael Institute David L. Carter, Michigan State University Drew Conway, New York University Sharyl Cross, College of International and Security Studies, George C. Marshall European Center for Security Studies Andrea Dew, Center for Irregular Warfare & Armed Groups, U.S. Naval War College Christine Fair, Georgetown University Robert Fein, The Metis Group James Forest, Visiting Associate Professor at University of Massachusetts Lowell Mark Galeotti, Center for Global Affairs, New York University Sumit Ganguly, Indiana University, Bloomington Donald Goldstein, Duke University Colin Gray, University of Reading, England Sheldon Greaves, Henley-Putnam University Denise Greaves, Henley-Putnam University Rita Grossman-Vermaas, FourWinds, Ltd. Audrey Guinchard, University of Essex John Horgan, International Center for the Study of Terrorism, Pennsylvania State University Richard J. Hughbank, Northwestern State University Swen Johnson, SCIA, LLC Robert Jervis, Columbia University Richard J. Kilroy Jr., Coastal Carolina University Steven Kleinman, Consultant Margaret E. Kosal, Sam Nunn School of International Affairs, Georgia Tech Claire Metelits, School of International Service, American University Steve Metz, Strategic Studies Institute, U.S. Army War College Michael Miklaucic, National Defense University / U.S. Agency for International Development Charles A. Morgan, Yale University School of Medicine John Nagl, Center for a New American Security David C. Rapoport, University of California at Los Angeles Sara Savage, University of Cambridge Mario Scalora, University of Nebraska, Lincoln Louise Shelly, Terrorism, Transnational Crime & Corruption Center, George Mason University Greg Smith, Command Senior Enlisted Leader, Special Operations Command Europe John Sullivan, Los Angeles Sheriff’s Department Jessica Turnley, Joint Special Operations University & Galisteo Consulting Group Ed Urie, Henley-Putnam University Anthony Vinci, Frontier Data Corp et al.: Table of Contents Produced by The Berkeley Electronic Press, 2016
  • 5. Correspondence concerning essays submitted for consideration should be directed to: Editor@Henley-Putnam.edu. Guidelines for manuscript submissions can be found on the Henley-Putnam University website at www.Henley-Putnam.edu. Materials that have been previously published or are under consideration for publication elsewhere will not be accepted. Questions or correspondence concerning book reviews may be directed to Editor@Henley-Putnam.edu. Unsolicited book reviews will not be accepted. The Journal of Strategic Security is published quarterly by Henley-Putnam University Press. Journal of Strategic Security, Vol. 9 No. 4 http://scholarcommons.usf.edu/jss/vol9/iss4/1
  • 6. Table of Contents Defeating ISIS on the Battle Ground as well as in the Online Battle Space: Considerations of the “New Normal” and Available Online Weapons in the Struggle Ahead.............................................................................................................1 Complexity Under Stress: Integrative Approaches to Overdetermined Vulnerabilities.............................................................................................................11 Wicked Problems: How Complexity Science Helps Direct Education Responses to Preventing Violent Extremism....................................................................................32 I SEE! Scotland: Tackling Sectarianism and Promoting Community Psychosocial Health..........................................................................................................................53 Increasing Cognitive Complexity and Collaboration Across Communities: Being Muslim Being Scottish ................................................................................................79 An IC Intervention for Post-Conflict Northern Ireland Secondary Schools..............111 Latent Memories of Terror: Media Perceptions of the Woolwich Attack .................125 Book Reviews ..............................................................................................................133 Operation Whisper: The Capture of Soviet Spies Morris and Lona Cohen..........133 Defeating Jihad: The Winnable War......................................................................136 Tradecraft Primer: A Framework for Aspiring Interrogators.............................139 et al.: Table of Contents Produced by The Berkeley Electronic Press, 2016