Transnational terrorism: a threat to global security

Research output: Contribution to journalArticlepeer-review



The beginning of the twenty-first century is characterised by the emergence of a new political landscape significantly influenced by globalisation. The rising interconnectivity that results from this phenomenon implies the need to redefine the concepts of international politics, strategies, threats, and security. In parallel, new technologies have enabled transnational threats to develop and come up as a primary concern for the great powers and global governance. Based on the analysis of previous works and relevant studies on the field (Brown, 2017; Bannelier-Christakis, 2016; Jones, Pascual, & Stedman, 2009; Garcia, 2006), this essay explores the emergence of transnational terrorism and the expansion of religious extremism as major threats for states and individuals nowadays. While searching to answer the question of how to address terrorism and violent extremism, this article analyses diverse positions, measures, and consequences that have originated in a context of global insecurity. The increasing interdependency between internal and external security has called states to develop new strategies to maintain stability and order. The article emphasises the need to build partnerships and enhance collaboration at all levels to meet the challenges posed by transnational terrorism. In this context of growing insecurity, nations are urged to cooperate with different actors to protect their sovereignty and strengthen human security. Is the contemporary political landscape characterised by insecurity and disorder?

Translated title of the contributionTerrorismo transnacional: uma ameaça à segurança global
Original languageEnglish
Pages (from-to)1-12
Number of pages12
Issue number1
Publication statusPublished - 1 May 2021


  • Extremism
  • Global governance
  • Globalisation
  • Security
  • Threats
  • Transnational terrorism


Dive into the research topics of 'Transnational terrorism: a threat to global security'. Together they form a unique fingerprint.

Cite this