Combating Terrorism through Peace Education: Online Educational Perspective

Combating Terrorism through Peace Education: Online Educational Perspective

Eugenie de Silva, Eugene de Silva, Eriberta B. Nepomuceno
ISBN13: 9781522507833|ISBN10: 1522507833|EISBN13: 9781522507840
DOI: 10.4018/978-1-5225-0783-3.ch100
Cite Chapter Cite Chapter

MLA

de Silva, Eugenie, et al. "Combating Terrorism through Peace Education: Online Educational Perspective." Blended Learning: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2017, pp. 2077-2089. https://doi.org/10.4018/978-1-5225-0783-3.ch100

APA

de Silva, E., de Silva, E., & Nepomuceno, E. B. (2017). Combating Terrorism through Peace Education: Online Educational Perspective. In I. Management Association (Ed.), Blended Learning: Concepts, Methodologies, Tools, and Applications (pp. 2077-2089). IGI Global. https://doi.org/10.4018/978-1-5225-0783-3.ch100

Chicago

de Silva, Eugenie, Eugene de Silva, and Eriberta B. Nepomuceno. "Combating Terrorism through Peace Education: Online Educational Perspective." In Blended Learning: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 2077-2089. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0783-3.ch100

Export Reference

Mendeley
Favorite

Abstract

This chapter focuses on peace education as a vital resource to combat terrorism. It is herein established that an everlasting solution to terrorism could only be reasonably expected if individuals' states of minds are altered. Accordingly, it is further determined that such changes are feasible through peace education, which will ultimately provide a firm basis for fact-based, non-violent, analyses of situations, and resolutions of issues. Furthermore, the authors of this chapter have further incorporated how peace education through online educational classrooms and courses will be extremely useful in the twenty-first century as more activities are conducted through cyber systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.