To see the other types of publications on this topic, follow the link: Counter-terrorist strategy.

Journal articles on the topic 'Counter-terrorist strategy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Counter-terrorist strategy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sederberg, Peter C. "Conciliation as Counter-Terrorist Strategy." Journal of Peace Research 32, no. 3 (1995): 295–312. http://dx.doi.org/10.1177/0022343395032003004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bremer, L. Paul. "The west's counter‐terrorist strategy." Terrorism and Political Violence 4, no. 4 (1992): 255–62. http://dx.doi.org/10.1080/09546559208427185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'neil, Andrew. "Degrading and Managing Risk: Assessing Australia's Counter-Terrorist Strategy." Australian Journal of Political Science 42, no. 3 (2007): 471–87. http://dx.doi.org/10.1080/10361140701513596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hendroy, Faruq Arjuna. "The US National Efforts to Counter Domestic Terrorism: Progress and Controversy." Jurnal Global Strategis 12, no. 2 (2018): 69. http://dx.doi.org/10.20473/jgs.12.2.2018.69-80.

Full text
Abstract:
The article examines the increasing domestic terrorism threat within the U.S. borders and how the U.S. government responded to it. The robust maneuver of the U.S. ledcoalition in the Middle East to coercively hunt down the terrorist groups does not fully stop them from posing the threat. Ironically, the terrorist groups direct their attacks to the U.S. homeland through their small networks. It is not difcult to build networks in the U.S. homeland, since the the advance of millennium technology enables them to radicalize people from long distance. The U.S. surely concerns about the increasing n
APA, Harvard, Vancouver, ISO, and other styles
5

Sugiarto, Sugiarto. "COMMUNICATION STRATEGY OF THE NATIONAL COUNTER TERRORISM AGENCY IN THE DERADICALIZATION PROGRAM IN INDONESIA." Jurnal Pertahanan & Bela Negara 10, no. 2 (2020): 195. http://dx.doi.org/10.33172/jpbh.v10i2.898.

Full text
Abstract:
<p>The National Counter Terrorism Agency (BNPT) said that until the end of 2018 the success rate of the deradicalization program reached one hundred percent. The deradicalization program has already been attended by 800 people; 325 former terrorism inmates and the rest of the families of terrorist prisoners. None of the 325 ex-terrorist inmates who participated in the deradicalization program resumed acts of terror. One aspect that supports the success of the deradicalization program in Indonesia is the communication aspect. The purpose of this study is to elaborate aspects of communicat
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Naeem. "PAKISTAN’S COUNTERTERRORISM STRATEGY: A CRITICAL OVERVIEW." Journal of Social Sciences and Humanities 55, no. 2 (2016): 1–16. http://dx.doi.org/10.46568/jssh.v55i2.79.

Full text
Abstract:
This paper is an effort to critically evaluate Pakistan’s counterterrorism strategy, based on both military and non-military means. The paper argues that the counterterrorism strategy of Pakistan has proved ineffective and counter-productive to combat the homegrown threat of terrorism, unleashed by militant sectarian groups, following the Takfiri ideology. Although Pakistan’s Military claims that the latest on-going security operations, Zarb-e-Azb in North Waziristan and Khyber-II in Khyber Agency, have succeeded in clearing most of the area, however, the matter of fact is that the security op
APA, Harvard, Vancouver, ISO, and other styles
7

Tella, Oluwaseun. "Boko Haram Terrorism and Counter-Terrorism: The Soft Power Context." Journal of Asian and African Studies 53, no. 6 (2017): 815–29. http://dx.doi.org/10.1177/0021909617739326.

Full text
Abstract:
Given terrorists’ use of violence in pursuit of their objectives and violent counter-terrorism measures, terrorism is not often associated with soft power. Nevertheless, terrorist organisations subscribe to ideologies that are appealing to certain individuals and/or segments within their immediate environment and beyond. Similarly, counter-terrorism initiatives that embrace the utility of soft power might be more successful than those that rely on the use of naked force. While the soft power of terrorist organisations has received scant attention, there has been modest scholarly inquiry into a
APA, Harvard, Vancouver, ISO, and other styles
8

Freedman, Lawrence. "Terrorism as a Strategy." Government and Opposition 42, no. 3 (2007): 314–39. http://dx.doi.org/10.1111/j.1477-7053.2007.00226.x.

Full text
Abstract:
AbstractIn this article I discuss terrorism as a problem in the study of strategy rather than strategy as a problem in the study of terrorism. There is a developing literature now asserting that terrorist activity should be evaluated as strategy, so that dealing with the phenomenon requires not only denouncing it for its warped morality and inhumanity but also understanding motives and methods, treating it as purposive and instrumental and not just wicked. In this article I take it for granted that terrorism is strategic activity; my question is, what does this type of activity tell us about s
APA, Harvard, Vancouver, ISO, and other styles
9

Starodubtseva, Maria A., Valery A. Mazurov, and Ekaterina A. Shushakova. "EUROPEAN UNION STRATEGY FOR THE FIGHT AGAINST TERRORISM." Society and Security Insights 3, no. 2 (2020): 158–68. http://dx.doi.org/10.14258/ssi(2020)2-10.

Full text
Abstract:
The article analyzes the European Union counter-terrorism strategy. The authors give a brief outline of the formation of a system of supranational bodies of the EU. The absence of an integrated approach to the issue, the lack of narrow definitions of the terrorist threat is indicated. Given that, despite the fact that the EU’s attention is again (if not more) focused on the security aspect of terrorism (i.e. the fight against terrorism), and not on the myriad of other complex aspects that lead to it (i.e. the prevention of terrorism), the authors of the article conclude that the EU still does
APA, Harvard, Vancouver, ISO, and other styles
10

Seib, Philip. "US Public Diplomacy and the Terrorism Challenge." Hague Journal of Diplomacy 14, no. 1-2 (2019): 154–68. http://dx.doi.org/10.1163/1871191x-14011012.

Full text
Abstract:
Summary Public diplomacy can be one element of multifaceted counter-terrorism strategy, but to be successful it must be used in timely fashion as a preventive tool. One key to reducing the threat posed by terrorism is to turn off terror groups’ recruiting faucets, and public diplomacy can play an important role in doing this. This article explores the vulnerability of certain populations and how they might be reached and strengthened in ways that undercut terrorist recruitment. This includes recognizing the importance of religion in terrorist recruiting and how it may be addressed constructive
APA, Harvard, Vancouver, ISO, and other styles
11

Farag, Wael Zakaria. "American security strategy towards terrorism after September 11 attacks." Review of Economics and Political Science 5, no. 4 (2020): 323–33. http://dx.doi.org/10.1108/reps-10-2018-0010.

Full text
Abstract:
Purpose The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study revolves around a key question: How and why the American security strategy toward terrorism evolved in the aftermath of the September 11 attacks in 2001? Based on the neorealist approach in international relations, this paper attempted to answer that question: first, through defining the concept of terrorism and how the Americans perceive it; second, via pinpointing the characteristic of the American counter-terrori
APA, Harvard, Vancouver, ISO, and other styles
12

Bibik, Oleg N. "Terrorism as a manifestation of the ideological crime: culturological aspects of counteraction." Law Enforcement Review 2, no. 1 (2018): 114–22. http://dx.doi.org/10.24147/2542-1514.2018.2(1).114-122.

Full text
Abstract:
The subject. The issues of combating terrorism through the prism of culture are examined in the article.The purpose of the article is to show the anti-terroristic measures through the scope of culture.The description of methodology. The author uses methods of complex analysis, synthesis, as well as formal-legal, comparative-legal methods in cultural aspect.The main results and scope of their application. Acts of terrorism are frequent and occur almost worldwide.Counter-terrorism through criminal penalties is ineffective, because: 1) there are a lot of people among the terrorists who are law-ab
APA, Harvard, Vancouver, ISO, and other styles
13

Arreguín-Toft, Ivan. "Tunnel at the End of the Light: A Critique of US Counter-terrorist Grand Strategy." Cambridge Review of International Affairs 15, no. 3 (2002): 549–63. http://dx.doi.org/10.1080/0955757022000011051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chirleşan, Georgeta. "European Security And The Terrorist Threat: Evolutions And Current Ways Of Managing It." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 21–27. http://dx.doi.org/10.1515/kbo-2015-0003.

Full text
Abstract:
Abstract The European Security Strategy “A Secure Europe in a Better World” emphasizes on the fact that security is a precondition of development and nominates terrorism as the first key threat in the list of five major threats addressed to European security. In the “EU Internal Security Strategy in Action” the terrorism is seen as second threat (after serious and organized crime) and is pointed out as a phenomenon which requires concerted European action, due to a still existent vulnerability of our societies to terrorist attacks, “Europe being both a target and a base for such terrorism”. Th
APA, Harvard, Vancouver, ISO, and other styles
15

Zhao, Ruifang, Xiaolan Xie, Xun Zhang, Min Jin, and Mengmeng Hao. "Spatial Distribution Assessment of Terrorist Attack Types Based on I-MLKNN Model." ISPRS International Journal of Geo-Information 10, no. 8 (2021): 547. http://dx.doi.org/10.3390/ijgi10080547.

Full text
Abstract:
Terrorist attacks are harmful to lives and property and seriously affect the stability of the international community and economic development. Exploring the regularity of terrorist attacks and building a model for assessing the risk of terrorist attacks (a kind of public safety risk, and it means the possibility of a terrorist attack) are of great significance to the security and stability of the international community and to global anti-terrorism. We propose a fusion of Inverse Distance Weighting (IDW) and a Multi-label k-Nearest Neighbor (I-MLKNN)-based assessment model for terrorist attac
APA, Harvard, Vancouver, ISO, and other styles
16

Varenya, Natalia, and Sergii Avramenko. "Virtual Reality as a new World Factor for Analysis of the Level of Terrorist Threat." Ukrainian Journal of International Law 2 (March 15, 2020): 46–60. http://dx.doi.org/10.36952/uail.2020.2.46-60.

Full text
Abstract:
In the article is viewed through a lens of modern perspective directions of development of technologies in the sphere of the augmented and virtual realities, signs of information terrorism and its components – cyber terrorism and media terrorism are considered, and also the further vectors of terrorist threats in media space are predicted. The relevant UN anti-terrorism documents have been analyzed. It has been shown that today international law and Ukrainian legislation in the field of counter-terrorism security emphasize the technical component of preventing the disruption of information sys
APA, Harvard, Vancouver, ISO, and other styles
17

Mamud, Yusuf Abubakar, and Oboshi J. Agyeno. "Using Muslims Mannerism and Habits (UMMAH): An Early Warning Strategy for Countering Violent Extremism." European Scientific Journal, ESJ 13, no. 5 (2017): 416. http://dx.doi.org/10.19044/esj.2017.v13n5p416.

Full text
Abstract:
The fight against terrorism has long relied on military intervention and hard power strategy to curb terror threats. Current reality and the spade at which youths who are radicalized under the banner of religion to carry out terrorist activities has called for more attention paid on alternative counterterrorism (CT) measures and policies. CT initiatives should be broadened to accommodate soft power approach that interrupts the radicalization and recruitment of civilians into violent extremism and terrorism. It is revealed that more terrorist actions and violent extremism had been undertaking b
APA, Harvard, Vancouver, ISO, and other styles
18

Islam, Zahid, Mubeen Adnan, and Musharaf Ali Talpur. "Pakistan’s Counter-Terrorism Strategy with Viable Recommendations." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 155–67. http://dx.doi.org/10.51872/prjah.vol2.iss2.45.

Full text
Abstract:
Pakistan has been a victim of terrorist activities for the past two decades. No place has been left out as not only military installations, training centers of law enforcing agencies were targeted but soft belly targets like schools, hospitals, mosques, public parks, courts, hotels and restaurants were also chosen by the terrorists. Pakistan Army is a team of professionals having a mastery at their work have been fighting the menace of terrorism effectively but Army alone cannot control it to the fullest without the will and support of the general public and without a ‘hand & glove’ relati
APA, Harvard, Vancouver, ISO, and other styles
19

Kosmynka, Stanisław. "The problem of radical Salafism in Sweden in the context of terrorist threats." Przegląd Europejski, no. 4-2020 (December 14, 2020): 117–30. http://dx.doi.org/10.31338/1641-2478pe.4.20.9.

Full text
Abstract:
The article demonstrates the phenomenon of the radical Salafism in Sweden in the context of terrorist threats. Due to the radicalisation of terrorism, it is an important problem that also affects many other European and non-European countries. The aim of the article is the analysis of the background of the activity of some radical groups and the terrorist cells that make references to the character of this problem. The article refers to some social and economic conditions for violent radicalisation and its challenges for the security. It is focused on the most important dimensions of the count
APA, Harvard, Vancouver, ISO, and other styles
20

San, Juan E. "From Chinatown to Gunga Din Highway: Notes on Frank Chin's Writing Strategy." Ethnic Studies Review 24, no. 1 (2001): 1–28. http://dx.doi.org/10.1525/esr.2001.24.1.1.

Full text
Abstract:
Exploring Frank Chin's work, particularly in his latest novel Gunga Din Highway, the essay endeavors to re-situate ethnic writing in the historical specificity of its inscription in the United States as a racial polity. This cognitive remapping of the literary field as reconfigured by multiculturalist liberalism may be accomplished by examining Chin's cultural politics. Chin's mode of strategic writing interrogates the modelminority myth and the premises of cultural nationalism. While it rejects the pluralist resolution of the traditional conflicts in the Chinese diaspora, Chin's satiric impul
APA, Harvard, Vancouver, ISO, and other styles
21

Stevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.

Full text
Abstract:
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy
APA, Harvard, Vancouver, ISO, and other styles
22

Costa, Christopher P. "A Review of: “Joshua Alexander Geltzer.U.S. Counter-Terrorism Strategy and al-Qaeda: Signalling and the Terrorist World-View.”." Terrorism and Political Violence 23, no. 1 (2010): 112–14. http://dx.doi.org/10.1080/09546553.2011.533075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Helzhynskyi, A. Yu. "Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism." Law and Safety 74, no. 3 (2019): 10–17. http://dx.doi.org/10.32631/pb.2019.3.01.

Full text
Abstract:
The relevance of the research is determined by the prerequisites for the rise in the levels of terrorist threats in Ukraine and the development of international terrorism. In response to these threats, the state creates protective mechanisms, increasing the level of protection of the population, since this is one of its main tasks. However, this system does not fully meet its objectives without cooperation with civil society. That is why, one of the current tasks is to unite the efforts of the state and civil society institutions in fighting against terrorism.
 Every citizen and civil soc
APA, Harvard, Vancouver, ISO, and other styles
24

Ummah, Athik Hidayatul. "Digital Media and Counter Narrative of Radicalism." Jurnal THEOLOGIA 31, no. 2 (2021): 233–56. http://dx.doi.org/10.21580/teo.2020.31.2.6762.

Full text
Abstract:
This article aims to describe the meaning of narratives are used by digital media or online media to counter the narrative of radicalism. The research method used is discourse analysis to find the meaning in the text. The theoretical framework used is narrative theory to explain process audience can trust about a narrative because of the consistency and truth of narrative or story. Narratives are analyzed using a framework of identity prism theory. The identity prism describes that online media as a brand has a strategy to build and promote it is unique among other brands. The results of the s
APA, Harvard, Vancouver, ISO, and other styles
25

Lorenzo-Dus, Nuria, and Stuart Macdonald. "Othering the West in the online Jihadist propaganda magazines Inspire and Dabiq." Journal of Language Aggression and Conflict 6, no. 1 (2018): 79–106. http://dx.doi.org/10.1075/jlac.00004.lor.

Full text
Abstract:
Abstract This paper examines how the jihadist terrorist groups Al Qaeda and the so-called Islamic State discursively construct ‘the West’ as an alien, aberrant ‘other’ in their respective online propaganda magazines Inspire and Dabiq over a 5 year period (2010–2015). The analysis integrates insights from the field of Terrorism Studies into a Corpus Assisted Discourse Studies approach, working centrally with the notions of othering and conventionalised impoliteness. Our findings reveal not only that othering is a key discursive process in the groups’ online propaganda machinery but that it is d
APA, Harvard, Vancouver, ISO, and other styles
26

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Full text
Abstract:
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terro
APA, Harvard, Vancouver, ISO, and other styles
27

Heath-Kelly, Charlotte. "Algorithmic autoimmunity in the NHS: Radicalisation and the clinic." Security Dialogue 48, no. 1 (2016): 29–45. http://dx.doi.org/10.1177/0967010616671642.

Full text
Abstract:
This article explores the extension of counter-radicalisation practice into the National Health Service (NHS). In the 2011 reformulation of the UK Prevent strategy, the NHS became a key sector for the identification and suppression of ‘radicalisation’. Optometrists, dentists, doctors and nurses have been incorporated into counter-terrorism and trained to report signs of radicalisation in patients and staff. This article explores how calculative modalities associated with big data and digital analytics have been translated into the non-digital realm. The surveillance of the whole of the populat
APA, Harvard, Vancouver, ISO, and other styles
28

Fatima, Noor, and Zahid Ali Khan. "Soft Power and Cultural Diplomacy as Counter-terrorism Measure in Contemporary International Politics." Global Social Sciences Review III, no. II (2018): 1–20. http://dx.doi.org/10.31703/gssr.2018(iii-ii).01.

Full text
Abstract:
Public diplomacy lies at the heart of modern development of information age and shapes the concept of social and political thought. This paper analysis the concept of soft power vis-a-vis counter terrorism strategy of nation states and discusses the significance of the soft power and public/cultural diplomacy in building image, nation branding and ultimately building a narrative. It will bring the reference point of Pakistan on the issue of relevance with today's world at the same time carrying a negative image of terrorist state. This paper establishes co-relation between nation branding and
APA, Harvard, Vancouver, ISO, and other styles
29

Hamilton, Richard, and Roger McCain. "Smallpox, Risks of Terrorist Attacks, and the Nash Equilibrium: An Introduction to Game Theory and an Examination of the Smallpox Vaccination Program." Prehospital and Disaster Medicine 24, no. 3 (2009): 231–38. http://dx.doi.org/10.1017/s1049023x00006865.

Full text
Abstract:
AbstractIntroduction:The smallpox vaccination emergency preparedness program has been unsuccessful in enrolling sufficient numbers of healthcare workers.Objective:The objective of this study was to use game theory to analyze a pre-event vaccination versus post-event vaccination program using the example of a terrorist considering an attack with smallpox or a hoax.Methods:A three-person game (normal and extensive form), and an in-person game are played for pre-event and post-event vaccinations of healthcare workers facing the possibility of a smallpox attack or hoax.Results:Full pre-event vacci
APA, Harvard, Vancouver, ISO, and other styles
30

Alexander, James. "Prevent." Feminist Dissent, no. 4 (March 11, 2019): 202–15. http://dx.doi.org/10.31273/fd.n4.2019.323.

Full text
Abstract:
This reflection presents a cautious look at Prevent from a youth workers’ point of view. It has been written with reference to first-hand experience and conversations with fellow youth workers and attempts to shed some light on why many in the youth and community sector may be reluctant to engage with the UK Government’s Prevent Strategy. Although the ideas presented in this article have been developed through personal experience, they also constitute the basis of planned future research on the way Prevent is being received within the youth sector.
 As such the paper will first set a poli
APA, Harvard, Vancouver, ISO, and other styles
31

Arifin, Bustanul, and Nur Afni Damanik. "THE IMPLEMENTATION OF INDONESIA’S COUNTER PIRACY STRATEGIES THROUGH MULTILATERAL COOPERATION IN THE MALACCA STRAIT (2004-2009)." Verity: Jurnal Ilmiah Hubungan Internasional (International Relations Journal) 12, no. 23 (2020): 5. http://dx.doi.org/10.19166/verity.v12i23.2482.

Full text
Abstract:
<p><span>International Maritime Organization data shows that the trend in piracy in the Malacca Strait was significant from 2000-2004. In 2005, the Malacca Strait was categorised as a high-risk zone by the Lloyd’s Joint War Risk Committee. In the 2000s, post 9/11 terrorist attacks have galvanised the rising concern of the international community over the security of the Malacca Strait since there was a concern that sea piracy could lead to sea terrorism. Prior to 2004, apart from conducting unilateral patrols, Indonesia had bound itself to engage in bilateral cooperation with Malay
APA, Harvard, Vancouver, ISO, and other styles
32

Limbada, Zubeda, and Lynn Davies. "Addressing the Foreign Terrorist Fighter Phenomenon from a Human Rights Perspective." International Community Law Review 18, no. 5 (2016): 483–93. http://dx.doi.org/10.1163/18719732-12341343.

Full text
Abstract:
Foreign terrorist fighters raise security concerns with regard to their actions abroad but also their possible return to their home countries. This paper asks whether tough state responses and new powers such as detention and withdrawal of citizenship raise significant human rights issues. It looks firstly at the different types of rights in play before examining counter-terror legislation from countries such as uk, Australia and Canada. Discourses of the profiles of extremists can be reductionist, ignoring the complexity of the journeys in and out of violent extremism. Does imprisonment does
APA, Harvard, Vancouver, ISO, and other styles
33

Scott, Russ. "The Sydney Lindt café siege: The role of the consultant psychiatrist." Australian & New Zealand Journal of Psychiatry 54, no. 3 (2019): 244–58. http://dx.doi.org/10.1177/0004867419853886.

Full text
Abstract:
Background: In December 2014, after a 16-hour siege of the Lindt café in Sydney, Iranian-born gunman Man Haron Monis shot dead a hostage precipitating the police action which broke the siege. Objective: This paper reviews the demographic and other factual details of Monis as documented by the NSW Coroner’s Inquest and critically analyses the published findings of the Coroner particularly in relation to the role of the psychiatrist who advised senior police and negotiators during the siege. Results: At the time of the siege, there was no formal protocol that delineated the role of a psychiatris
APA, Harvard, Vancouver, ISO, and other styles
34

Maza, Kangdim Dingji, Umut Koldas, and Sait Aksit. "Challenges of Countering Terrorist Recruitment in the Lake Chad Region: The Case of Boko Haram." Religions 11, no. 2 (2020): 96. http://dx.doi.org/10.3390/rel11020096.

Full text
Abstract:
This article attempts to shed light on the challenges confronting relevant actors (state and non-state) in countering the threat of terrorism recruitment by focusing on the Boko Haram terrorist organization, whose presence and activities threaten the security of the Lake Chad region. The article uses a qualitative research technique combining key informant interviews with stakeholders familiar with the conflict, academic and non-academic documents, reports, and policy briefs. The findings of the article suggest that despite the various initiatives by stakeholders aimed at containing the strate
APA, Harvard, Vancouver, ISO, and other styles
35

Yousafzai, Iftikhar Ahmad, and A. Z. Hilali. "India’s Role as a Determinant in Pakistan-US Relations (2005-2015)." Review of Applied Management and Social Sciences 4, no. 1 (2021): 285–93. http://dx.doi.org/10.47067/ramss.v4i1.122.

Full text
Abstract:
The United States adopted a policy of de-hyphenation in its relations with India and Pakistan in the post-09/11 period which continued to be operational in the period 2005-2015. This policy apparently meant that the United States would deal each of the two South Asian adversaries, India and Pakistan. The main reason for this phenomenon was that the policy-makers in the US saw India as a heavy-weight to counter the rising economic, political and military power of China in Asia. Pakistan could not be fitted in this strategic calculus. The United States changed its previous position on Kashmir an
APA, Harvard, Vancouver, ISO, and other styles
36

Chertoff, Michael, Patrick Bury, and Daniela Richterova. "Bytes not waves: information communication technologies, global jihadism and counterterrorism." International Affairs 96, no. 5 (2020): 1305–25. http://dx.doi.org/10.1093/ia/iiaa048.

Full text
Abstract:
Abstract Rapoport's conceptualization of the last, religious wave of four global waves remains highly influential. But it, and other typologies, have placed too little emphasis on the influence of information and communication technologies (ICTs) on the evolution of global jihadist activities. This article makes two new contributions by developing both a new ICT-based typology for understanding jihadist evolutions, and by focusing on successful attacks. Our central argument is that ICTs’ impact on global jihadism has facilitated dramatic transformations of its strategy, organization and tactic
APA, Harvard, Vancouver, ISO, and other styles
37

Bussotti, Luca, and Charles Torres. "THE RISK MANAGEMENT OF ISLAMIC TERRORISM IN A FRAGILE STATE: THE CASE OF MOZAMBIQUE." Problems of Management in the 21st Century 15, no. 1 (2020): 9–22. http://dx.doi.org/10.33225/10.33225/pmc/20.15.09.

Full text
Abstract:
Islamic terrorism has been a serious threat for Eastern and Southern Africa since the 1990s. Many of these African countries have developed different forms of struggle against Islamic terrorism, from a military intervention to social policies, in order to improve the general socio-economic conditions for society as a whole. In Mozambique, no specific measure was adopted to cope the diffusion of terrorism, leaving that radicalized forms of Islamism spread in particular in Cabo Delgado, a Northern Province bordering with Tanzania. Research aimed at approaching Islamic terrorism in Cabo Delgado a
APA, Harvard, Vancouver, ISO, and other styles
38

Shumilin, Aleksandr. "France: Republic against «Political Islam» (Part I)." Scientific and Analytical Herald of IE RAS, no. 1 (February 28, 2021): 54–61. http://dx.doi.org/10.15211/vestnikieran120215461.

Full text
Abstract:
On February 16, 2021, the French National Assembly (lower house of parliament) approved a draft law on countering separatism. On March 30, this document is to be discussed by members of the Senate. The degree of public discussions around him began to grow immediately after the speech of President E. Macron on October 2, 2020 and the subsequent publication in the press of the main provisions of the project. In fact, the document is aimed at preventing the radicalization of the Muslim community of France, at its more thorough adaptation to the socio-political conditions and basic values of the R
APA, Harvard, Vancouver, ISO, and other styles
39

Henning, Johan, and Mignon Hauman. "Fortifying a risk-based approach in the South African AML/CFT process." Journal of Financial Crime 24, no. 4 (2017): 520–28. http://dx.doi.org/10.1108/jfc-01-2017-0007.

Full text
Abstract:
Purpose The purpose of this paper is evaluate the provisions of Financial Intelligence Centre Act Amendment Bill, 2016 which intends to give effect to the implementation of the envisioned risk-based approach in anti-money laundering/combating financing of terrorism (AML/CFT) processes, as well as the extent to which the provisions address certain technical shortcomings elucidated in 2009 Mutual Evaluation Report concerning South Africa’s AML/CFT’s framework. Design/methodology/approach Sources of information consisted of scholarly articles, articles retrieved from the Web, news reports, report
APA, Harvard, Vancouver, ISO, and other styles
40

Rose, Kalle Johannes. "Disclosing anti-money launderers through CSR regulation – a new way to combat money laundering." Journal of Money Laundering Control 23, no. 1 (2020): 11–25. http://dx.doi.org/10.1108/jmlc-07-2019-0062.

Full text
Abstract:
Purpose Recent research questions the innocence of companies outside the current EU money laundering regulation in terms of contributing to the externality problem of money laundering. The purpose of this paper is to examine how including anti-money laundering as an element of the EU corporate social responsibilities (CSR) directive can contribute to solving the externality problem of money laundering. Based on the principles of CSR and the economic effects of disclosure duties, this paper analyzes the implications an introduction of anti-money laundering policies and disclosure duties can hav
APA, Harvard, Vancouver, ISO, and other styles
41

Blahova, Marta. "Security forecasts of terrorist attack." MATEC Web of Conferences 292 (2019): 01035. http://dx.doi.org/10.1051/matecconf/201929201035.

Full text
Abstract:
This article deals with security developments in terrorism. In the introductory part, the article deals with the history and current situation of terrorism. Furthermore, the national ones are analyzed and International Security Strategy Papers on Counter-Terrorism. In the next part of this article, long-term safety forecasts from the Czech Republic are analyzed and foreign authors with a focus on terrorism. The main outcome of the article is a proposal for an alternative scenario of possible security developments in the area of terrorism within the European Union.
APA, Harvard, Vancouver, ISO, and other styles
42

Rose, Kalle Johannes. "De-risking or recontracting – the risk dilemma of EU money laundering regulation." Journal of Risk Finance 21, no. 4 (2020): 445–58. http://dx.doi.org/10.1108/jrf-12-2019-0237.

Full text
Abstract:
Purpose Recent research and market effects within the European Union (EU) show a rising concern toward the de-risking of certain sectors/actors owing to the increased anti-money laundering regulation. Because of the enhanced due diligence and monitoring costs related to anti-money laundering and counter-terrorist financing regulation by the AMLD4 and AMLD5, several financial institutions now turn to de-risking their corporate client base to minimize not only costs from monitoring and onboarding but also the risks of sanctions and reputation. The purpose of this paper is to analyze the incentiv
APA, Harvard, Vancouver, ISO, and other styles
43

Shpiro, Shlomo. "Conflict Media Strategies and the Politics of Counter-Terrorism." Politics 22, no. 2 (2002): 76–85. http://dx.doi.org/10.1111/1467-9256.00162.

Full text
Abstract:
This article argues that the events of 11 September 2001, and the subsequent ‘war on terror’, have highlighted the role of the media in both the coverage and conduct of modern conflict. The article concentrates on the ‘conflict media strategies’ pursued by belligerents and examines the development and refinement of such strategies over time, from the Second World War through to the conflict in Afghanistan. Using data from Vietnam, the Falklands, the Gulf, Kosovo and other conflicts, I argue that an effective conflict media strategy is an essential tool of warfare that is used by states and ter
APA, Harvard, Vancouver, ISO, and other styles
44

Rothenberger, Liane, Yulia An, Natalia Angulo Mejía, Arlinda Arizi, and María Martín Villalobos. "Perpetrators’ strategic communication: Framing and identity building on ethno-nationalist terrorists’ websites." Communications 43, no. 2 (2018): 133–71. http://dx.doi.org/10.1515/commun-2017-0057.

Full text
Abstract:
Abstract The study explores communication strategies of ethno-nationalist terrorists with respect to their framing and identity building. Strategies of eight ethno-nationalist terrorist groups were analyzed using 70 articles published on the groups’ websites. Three cluster-analytic procedures and a correlational analysis were applied to (1) strategies of problem definition, (2) cause and responsibility attribution, (3) treatment recommendations, and (4) identity building. The analysis revealed various dimensions on which terrorists frame their content. No group-specific strategies of framing a
APA, Harvard, Vancouver, ISO, and other styles
45

Monar, Jörg. "Common Threat and Common Response? The European Union's Counter-Terrorism Strategy and its Problems." Government and Opposition 42, no. 3 (2007): 292–313. http://dx.doi.org/10.1111/j.1477-7053.2007.00225.x.

Full text
Abstract:
AbstractOn the basis of an analysis of the European Union's common definition of the post-9/11 terrorist threat, this article provides a critical assessment of the EU's response. The EU has arrived at a reasonably specific definition of the common threat that avoids simplistic reductions and is a response that is sufficiently multidimensional to address the different aspects – internal and external, legislative and operational, repressive and preventive – of this threat. Yet the definition is undermined by differences between national threat perceptions. The preference for instruments of coope
APA, Harvard, Vancouver, ISO, and other styles
46

Kumar, Deepa. "Terrorcraft: empire and the making of the racialised terrorist threat." Race & Class 62, no. 2 (2020): 34–60. http://dx.doi.org/10.1177/0306396820930523.

Full text
Abstract:
Terrorism is so associated with Arabs, Muslims and South Asians that it has become common sense in the post 9/11 world. Drawing on various bodies of scholarship, this article traces the complex evolution of ‘race’ in relation to Arabs and Muslims from the 1960s to mid-’80s, alongside changing notions of ‘terrorism’, to advance an argument about the historically contingent nature of the racialised terrorist threat. The author argues that ‘terrorcraft’ – or terrorist racialisation – is a process. First, the racialised terrorist was crafted deep in the US empire. Counter-insurgency doctrine was i
APA, Harvard, Vancouver, ISO, and other styles
47

Baldaccini, Anneliese. "Counter-Terrorism and the EU Strategy for Border Security: Framing Suspects with Biometric Documents and Databases." European Journal of Migration and Law 10, no. 1 (2008): 31–49. http://dx.doi.org/10.1163/138836407x261308.

Full text
Abstract:
AbstractThis article examines the way in which the EU amd its Member States have approached border security issues since the terrorist attacks in the US on 11 September 2001. A key aspect of this approach has been to tighten control of borders and the safety of documents by the use of biometric systems. The new policies on border security and document security are resulting in the mass collection and storage of biometric data in relation to third-country nationals seeking entry into the territory of EU Member States, and in relation to EU nationals within the context of travel and identity doc
APA, Harvard, Vancouver, ISO, and other styles
48

Khairil, Muhammad. "Wahdah Islamiyah’s Counter-Radicalism Strategy Through The New Media Network in Da’wah Development Of Palu City." Al-Ulum 18, no. 2 (2018): 417–35. http://dx.doi.org/10.30603/au.v18i2.610.

Full text
Abstract:
Radical labels and terrorist movements are often pinned down on various Islamic organizations in Indonesia, one of which is Wahdah Islamiyah (WI). This stigma is growing rapidly among Indonesians because the news in the media seems to accuse Islamic organizations of being the source of radical movements. Understanding the media becomes a crucial need in society. In addition, Islamic organizations are required to balance technological developments and utilize communication media in the modern era to re-establish the image of Muslims in Indonesia. This study focused on Wahdah Islamiyah in Palu C
APA, Harvard, Vancouver, ISO, and other styles
49

Chunlin, Liu, and Rohan Gunaratna. "The terrorist threat forecast in 2021." UNISCI Journal 19, no. 55 (2021): 215–20. http://dx.doi.org/10.31439/unisci-112.

Full text
Abstract:
The pandemic year 2021 is likely to witness an overall decline in global terrorism. While the threat grew in conflict zones, it diminished off-the-battlefields. However, threat groups worldwide are expanding in cyber space during the pandemic. From Indonesia to Pakistan, Muslim majority countries, Arabization and Islamization of Muslim communities during the pandemic is disrupting national cohesion. To prevent, counter and respond to the recent developments of key terrorist organizations, governmental and non-governmental partners should understand the threat. The intelligence services, law en
APA, Harvard, Vancouver, ISO, and other styles
50

Grigor’eva, Kseniya S. "Problem of Selective Control as a Means of Countering Terrorism (On the example of Poland, Latvia, Bulgaria)." Sociologicheskaja nauka i social naja praktika 7, no. 4 (2019): 166–79. http://dx.doi.org/10.19181/snsp.2019.7.4.6809.

Full text
Abstract:
The use of ethnic discrimination in anti-terrorism activities is often preceded by terrorist attacks. The need for increased control over certain groups of citizens on the basis of their ethnic and / or national origin, as a rule, is justified by the extraordinary situation. However, ethnically selective control also exists where terrorist risks are low. The article discusses the relevant experience of Poland, Latvia and Bulgaria – countries where a low level of terrorist threat is officially declared. In all three countries, the main subject of ethnically selective control are people from the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!