Siga este enlace para ver otros tipos de publicaciones sobre el tema: Counter-terrorist strategy.

Artículos de revistas sobre el tema "Counter-terrorist strategy"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Counter-terrorist strategy".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Sederberg, Peter C. "Conciliation as Counter-Terrorist Strategy." Journal of Peace Research 32, no. 3 (1995): 295–312. http://dx.doi.org/10.1177/0022343395032003004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Bremer, L. Paul. "The west's counter‐terrorist strategy." Terrorism and Political Violence 4, no. 4 (1992): 255–62. http://dx.doi.org/10.1080/09546559208427185.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

O'neil, Andrew. "Degrading and Managing Risk: Assessing Australia's Counter-Terrorist Strategy." Australian Journal of Political Science 42, no. 3 (2007): 471–87. http://dx.doi.org/10.1080/10361140701513596.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hendroy, Faruq Arjuna. "The US National Efforts to Counter Domestic Terrorism: Progress and Controversy." Jurnal Global Strategis 12, no. 2 (2018): 69. http://dx.doi.org/10.20473/jgs.12.2.2018.69-80.

Texto completo
Resumen
The article examines the increasing domestic terrorism threat within the U.S. borders and how the U.S. government responded to it. The robust maneuver of the U.S. ledcoalition in the Middle East to coercively hunt down the terrorist groups does not fully stop them from posing the threat. Ironically, the terrorist groups direct their attacks to the U.S. homeland through their small networks. It is not difcult to build networks in the U.S. homeland, since the the advance of millennium technology enables them to radicalize people from long distance. The U.S. surely concerns about the increasing number of terrorist attacks within its borders, that it recently issued a set of national counter-terrorism strategy combining both coercive and soft approach. However, the approval of discriminatory and controversial travel ban policy was believed to hamper the existing national strategy, mistarget the main causes, and create new problems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sugiarto, Sugiarto. "COMMUNICATION STRATEGY OF THE NATIONAL COUNTER TERRORISM AGENCY IN THE DERADICALIZATION PROGRAM IN INDONESIA." Jurnal Pertahanan & Bela Negara 10, no. 2 (2020): 195. http://dx.doi.org/10.33172/jpbh.v10i2.898.

Texto completo
Resumen
<p>The National Counter Terrorism Agency (BNPT) said that until the end of 2018 the success rate of the deradicalization program reached one hundred percent. The deradicalization program has already been attended by 800 people; 325 former terrorism inmates and the rest of the families of terrorist prisoners. None of the 325 ex-terrorist inmates who participated in the deradicalization program resumed acts of terror. One aspect that supports the success of the deradicalization program in Indonesia is the communication aspect. The purpose of this study is to elaborate aspects of communication, especially BNPT communication strategies in the deradicalization program. The author uses qualitative research methods in this study. The conclusion of the research shows that BNPT utilizes the communication strategy as one of the successes of the success of the deradicalization program even though the communication strategy used by the BNPT is not written and detailed.</p><p><strong>Keywords:</strong> communication, a former terrorist convict, strategy, deradicalization, terrorism.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ahmed, Naeem. "PAKISTAN’S COUNTERTERRORISM STRATEGY: A CRITICAL OVERVIEW." Journal of Social Sciences and Humanities 55, no. 2 (2016): 1–16. http://dx.doi.org/10.46568/jssh.v55i2.79.

Texto completo
Resumen
This paper is an effort to critically evaluate Pakistan’s counterterrorism strategy, based on both military and non-military means. The paper argues that the counterterrorism strategy of Pakistan has proved ineffective and counter-productive to combat the homegrown threat of terrorism, unleashed by militant sectarian groups, following the Takfiri ideology. Although Pakistan’s Military claims that the latest on-going security operations, Zarb-e-Azb in North Waziristan and Khyber-II in Khyber Agency, have succeeded in clearing most of the area, however, the matter of fact is that the security operations have not considerably damaged the ability of terrorists, particularly the Tehrik Taliban Pakistan (TTP), to plan and execute terrorist attacks. The terrorists’ network, their strength and structure have until now remained intact. The key to longterm prevention of terrorism, beyond security operations for clearing any area of the militants, is to discontinue the supply chain of terrorists. This requires the creation of a new counter-extremism religious narrative, which will help re-formulate a concrete and effective counter-terrorism strategy of Pakistan to ensure domestic peace and security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Tella, Oluwaseun. "Boko Haram Terrorism and Counter-Terrorism: The Soft Power Context." Journal of Asian and African Studies 53, no. 6 (2017): 815–29. http://dx.doi.org/10.1177/0021909617739326.

Texto completo
Resumen
Given terrorists’ use of violence in pursuit of their objectives and violent counter-terrorism measures, terrorism is not often associated with soft power. Nevertheless, terrorist organisations subscribe to ideologies that are appealing to certain individuals and/or segments within their immediate environment and beyond. Similarly, counter-terrorism initiatives that embrace the utility of soft power might be more successful than those that rely on the use of naked force. While the soft power of terrorist organisations has received scant attention, there has been modest scholarly inquiry into a soft power approach to counter-terrorism. However, no comprehensive research has been conducted on the place of soft power in Boko Haram’s activities and the Nigerian government’s efforts to end their campaign. This article offers a new perspective to the burgeoning literature on Boko Haram terrorism by examining whether or not it possesses elements of soft power that are appealing to certain Nigerians. It also examines if the Nigerian government has adopted a soft power approach in its counter-terrorism efforts. The article concludes that effectively tackling the sect will require a smart power strategy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Freedman, Lawrence. "Terrorism as a Strategy." Government and Opposition 42, no. 3 (2007): 314–39. http://dx.doi.org/10.1111/j.1477-7053.2007.00226.x.

Texto completo
Resumen
AbstractIn this article I discuss terrorism as a problem in the study of strategy rather than strategy as a problem in the study of terrorism. There is a developing literature now asserting that terrorist activity should be evaluated as strategy, so that dealing with the phenomenon requires not only denouncing it for its warped morality and inhumanity but also understanding motives and methods, treating it as purposive and instrumental and not just wicked. In this article I take it for granted that terrorism is strategic activity; my question is, what does this type of activity tell us about strategy? The case is interesting because terrorism is strategically generally demanding and prone to failure. Certainly when used on its own it is a poor support for political objectives, and may be counter-productive even when used with other methods. By looking at strategy at the fringes it is possible to illuminate aspects of strategic activity that have a wider application.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Starodubtseva, Maria A., Valery A. Mazurov, and Ekaterina A. Shushakova. "EUROPEAN UNION STRATEGY FOR THE FIGHT AGAINST TERRORISM." Society and Security Insights 3, no. 2 (2020): 158–68. http://dx.doi.org/10.14258/ssi(2020)2-10.

Texto completo
Resumen
The article analyzes the European Union counter-terrorism strategy. The authors give a brief outline of the formation of a system of supranational bodies of the EU. The absence of an integrated approach to the issue, the lack of narrow definitions of the terrorist threat is indicated. Given that, despite the fact that the EU’s attention is again (if not more) focused on the security aspect of terrorism (i.e. the fight against terrorism), and not on the myriad of other complex aspects that lead to it (i.e. the prevention of terrorism), the authors of the article conclude that the EU still does not fully understand the nature of terrorism. Its political dynamics are still driven by crisis situations, and the EU does not seem to want to deviate significantly in real terms from any of its previous strategies. In the authors' view, the EU’s approach to combating terrorism (politics, not rhetoric) will remain the same: focusing on security cooperation while promoting initiatives that create the impression that other areas, such as civic cooperation and intercultural dialogue, are not completely excluded . This will remain the main focus of the EU's anti-terrorism policy: with each terrorist attack (whether group or single), calls will be intensified to expand security cooperation in the context of EU integration and ensuring public safety. According to the authors, the development of a single concept will enhance the joint actions of states to destroy the terrorist threat.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Seib, Philip. "US Public Diplomacy and the Terrorism Challenge." Hague Journal of Diplomacy 14, no. 1-2 (2019): 154–68. http://dx.doi.org/10.1163/1871191x-14011012.

Texto completo
Resumen
Summary Public diplomacy can be one element of multifaceted counter-terrorism strategy, but to be successful it must be used in timely fashion as a preventive tool. One key to reducing the threat posed by terrorism is to turn off terror groups’ recruiting faucets, and public diplomacy can play an important role in doing this. This article explores the vulnerability of certain populations and how they might be reached and strengthened in ways that undercut terrorist recruitment. This includes recognizing the importance of religion in terrorist recruiting and how it may be addressed constructively. Further, traditional pubic diplomacy programmes such as educational and cultural exchanges have been underestimated as a mean of counteracting the ‘othering’ that increases vulnerable populations’ susceptibility to terrorist recruitment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Farag, Wael Zakaria. "American security strategy towards terrorism after September 11 attacks." Review of Economics and Political Science 5, no. 4 (2020): 323–33. http://dx.doi.org/10.1108/reps-10-2018-0010.

Texto completo
Resumen
Purpose The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study revolves around a key question: How and why the American security strategy toward terrorism evolved in the aftermath of the September 11 attacks in 2001? Based on the neorealist approach in international relations, this paper attempted to answer that question: first, through defining the concept of terrorism and how the Americans perceive it; second, via pinpointing the characteristic of the American counter-terrorism strategy before September 11 attacks; and third, through examining the effects of those terrorist attacks on that strategy. Design/methodology/approach The nature of the subject of this study calls for reliance on the analytical descriptive approach to highlight the role and strategy of the USA in the fight against terrorism following the events of September 11, in addition to the use of the system analysis methodology, which can identify the inputs and outputs of the system that had an impact in formulating the US counter-terrorism strategy. Findings This study has come up with seven findings. The first finding was that the 9/11 attacks served as a turning point of the US counter-terrorism strategy and restructured its agenda. Confronting the communist threat had been its primary objective, until terrorism came to the fore and became its first and foremost priority. The USA vowed that terrorism is its enemy and waged the war on terror to thwart its risk as a global threat. The second finding revolves around the idea of double standards in the American foreign policy. True to its long-standing tradition of favoring its own interests, in complete disregard of the interests of any other party, the USA continued to uphold the double-standards policy. Originality/value This study adds a new study to the Arab Library in the field of counter-terrorism studies, national security strategies and American foreign policy. In addition, the researcher seeks to complete the scientific effort to study the US strategy against terrorism, with a clear impact on the development of the situation in the region. This study contributes to the study of how one of the great powers in the international system, the USA, deals with the terrorist organizations that have become widespread in the Arab region.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Bibik, Oleg N. "Terrorism as a manifestation of the ideological crime: culturological aspects of counteraction." Law Enforcement Review 2, no. 1 (2018): 114–22. http://dx.doi.org/10.24147/2542-1514.2018.2(1).114-122.

Texto completo
Resumen
The subject. The issues of combating terrorism through the prism of culture are examined in the article.The purpose of the article is to show the anti-terroristic measures through the scope of culture.The description of methodology. The author uses methods of complex analysis, synthesis, as well as formal-legal, comparative-legal methods in cultural aspect.The main results and scope of their application. Acts of terrorism are frequent and occur almost worldwide.Counter-terrorism through criminal penalties is ineffective, because: 1) there are a lot of people among the terrorists who are law-abiding, criminal behavior is not typical for them; 2) in case of terrorist acts by suicide bombers they could not be objectively deter by the threat of punishment; 3) criminal punishment, including capital punishment, can give him the halo of a martyr.Acts of terrorism cause a serious public outcry. Attempts to strengthen the criminal repression are being made often as a consequence of the impact of terrorist attacks. However, such a reaction to the terrorist attacks appears due to a desire to symbolically restore the social justice. The application of criminal repression is deeply symbolic, because it is always culturally determined. The execution of a terrorist should also be considered as an element of symbolic exchange (punishment instead of a crime).Terrorism is motivated ideologically, that’s why it may be regarded as a kind of ideological crime. Its foundation is a system of views, concepts that allow the offender consider crime as right, morally justified, committing for a higher purpose.Conclusions. It is proposed to consider the fight against terrorism as primarily a struggle with the idea that caused it to life, through the anti-terrorist propaganda, the formation of a negative image of the terrorist in popular culture, minimization of highlighting terrorist attacks and those, who committed them, in the press. The basis of counter-terrorism due to the conflict of cultures is the idea of a dialogue between them. Developing a strategy to counter terrorism we should take into account the risks that inevitably arise in connection with the limitation of rights and freedoms of people. Counter-terrorism is not a convenient reason for explaining the growing influence of law enforcement on social processes, especially for undermining the democratic foundations of the state.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Arreguín-Toft, Ivan. "Tunnel at the End of the Light: A Critique of US Counter-terrorist Grand Strategy." Cambridge Review of International Affairs 15, no. 3 (2002): 549–63. http://dx.doi.org/10.1080/0955757022000011051.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Chirleşan, Georgeta. "European Security And The Terrorist Threat: Evolutions And Current Ways Of Managing It." International conference KNOWLEDGE-BASED ORGANIZATION 21, no. 1 (2015): 21–27. http://dx.doi.org/10.1515/kbo-2015-0003.

Texto completo
Resumen
Abstract The European Security Strategy “A Secure Europe in a Better World” emphasizes on the fact that security is a precondition of development and nominates terrorism as the first key threat in the list of five major threats addressed to European security. In the “EU Internal Security Strategy in Action” the terrorism is seen as second threat (after serious and organized crime) and is pointed out as a phenomenon which requires concerted European action, due to a still existent vulnerability of our societies to terrorist attacks, “Europe being both a target and a base for such terrorism”. The paper presents the evolution of the European security environment between 1990 and 2015, emphasizing the increase of the terrorist threat and the steps and actions taken in preventing and fighting against it, as well as possible solutions for managing the terrorist phenomenon. In the final part of the paper, the findings of a case study achieved through sociological questionnaire are rendered. The study envisaged to catch the counter-terrorism perspective at the level of ordinary citizens and of decision-makers and stakeholders as well.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Zhao, Ruifang, Xiaolan Xie, Xun Zhang, Min Jin, and Mengmeng Hao. "Spatial Distribution Assessment of Terrorist Attack Types Based on I-MLKNN Model." ISPRS International Journal of Geo-Information 10, no. 8 (2021): 547. http://dx.doi.org/10.3390/ijgi10080547.

Texto completo
Resumen
Terrorist attacks are harmful to lives and property and seriously affect the stability of the international community and economic development. Exploring the regularity of terrorist attacks and building a model for assessing the risk of terrorist attacks (a kind of public safety risk, and it means the possibility of a terrorist attack) are of great significance to the security and stability of the international community and to global anti-terrorism. We propose a fusion of Inverse Distance Weighting (IDW) and a Multi-label k-Nearest Neighbor (I-MLKNN)-based assessment model for terrorist attacks, which is in a grid-scale and considers 17 factors of socio-economic and natural environments, and applied the I-MLKNN assessment model to assess the risk of terrorist attacks in Southeast Asia. The results show the I-MLKNN multi-label classification algorithm is proven to be an ideal tool for the assessment of the spatial distribution of terrorist attacks, and it can assess the risk of different types of terrorist attacks, thus revealing the law of distribution of different types of terrorist attacks. The terrorist attack risk assessment results indicate that Armed Attacks, Bombing/Explosions and Facility/Infrastructure Attacks in Southeast Asia are high-risk terrorist attack events, and the southernmost part of Thailand and the Philippines are high-risk terrorist attack areas for terrorism. We do not only provide a reference for incorporating spatial features in multi-label classification algorithms, but also provide a theoretical basis for decision-makers involved in terrorist attacks, which is meaningful to the implementation of the international counter-terrorism strategy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Varenya, Natalia, and Sergii Avramenko. "Virtual Reality as a new World Factor for Analysis of the Level of Terrorist Threat." Ukrainian Journal of International Law 2 (March 15, 2020): 46–60. http://dx.doi.org/10.36952/uail.2020.2.46-60.

Texto completo
Resumen
In the article is viewed through a lens of modern perspective directions of development of technologies in the sphere of the augmented and virtual realities, signs of information terrorism and its components – cyber terrorism and media terrorism are considered, and also the further vectors of terrorist threats in media space are predicted. The relevant UN anti-terrorism documents have been analyzed. It has been shown that today international law and Ukrainian legislation in the field of counter-terrorism security emphasize the technical component of preventing the disruption of information systems, while the strategy to combat threats is largely based on the latest relevant concepts aimed at strengthening the security of global information and telecommunications systems. Conceptual ways of counteracting the terrorist threat in the media space have been proposed in addition to the modern directions of anti-terrorist measures in the information sphere.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Mamud, Yusuf Abubakar, and Oboshi J. Agyeno. "Using Muslims Mannerism and Habits (UMMAH): An Early Warning Strategy for Countering Violent Extremism." European Scientific Journal, ESJ 13, no. 5 (2017): 416. http://dx.doi.org/10.19044/esj.2017.v13n5p416.

Texto completo
Resumen
The fight against terrorism has long relied on military intervention and hard power strategy to curb terror threats. Current reality and the spade at which youths who are radicalized under the banner of religion to carry out terrorist activities has called for more attention paid on alternative counterterrorism (CT) measures and policies. CT initiatives should be broadened to accommodate soft power approach that interrupts the radicalization and recruitment of civilians into violent extremism and terrorism. It is revealed that more terrorist actions and violent extremism had been undertaking by youths that professed the Islamic faith more than any in the 21st century. The worrisome trend has called the development of UMMAH as a CT strategy to understand the narratives and messaging exploited by recruiters and facilitators of violent extremism as a religious obligation. The strategy demands a counter narrative and messages that would replace the message of hate, violence and bigotry, with love, peace, tolerance and coexistence.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Islam, Zahid, Mubeen Adnan, and Musharaf Ali Talpur. "Pakistan’s Counter-Terrorism Strategy with Viable Recommendations." Progressive Research Journal of Arts & Humanities (PRJAH) 2, no. 2 (2020): 155–67. http://dx.doi.org/10.51872/prjah.vol2.iss2.45.

Texto completo
Resumen
Pakistan has been a victim of terrorist activities for the past two decades. No place has been left out as not only military installations, training centers of law enforcing agencies were targeted but soft belly targets like schools, hospitals, mosques, public parks, courts, hotels and restaurants were also chosen by the terrorists. Pakistan Army is a team of professionals having a mastery at their work have been fighting the menace of terrorism effectively but Army alone cannot control it to the fullest without the will and support of the general public and without a ‘hand & glove’ relation with other facets of the society. The objective of this article is to analyze those factors which gave birth to terrorism in Pakistan. Keeping in mind theoretical nature of the study, secondary data analysis method has been used to argue the issue. This study determines that the military operations are not the only solution to counter terrorism in the Pakistan but public opinion, political will and a close and friendly cooperation and coordination is a must to address the issue. Need of the hour is to take all the political, social and economic stakeholders onboard to tackle the issue, of terrorism bluntly.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Kosmynka, Stanisław. "The problem of radical Salafism in Sweden in the context of terrorist threats." Przegląd Europejski, no. 4-2020 (December 14, 2020): 117–30. http://dx.doi.org/10.31338/1641-2478pe.4.20.9.

Texto completo
Resumen
The article demonstrates the phenomenon of the radical Salafism in Sweden in the context of terrorist threats. Due to the radicalisation of terrorism, it is an important problem that also affects many other European and non-European countries. The aim of the article is the analysis of the background of the activity of some radical groups and the terrorist cells that make references to the character of this problem. The article refers to some social and economic conditions for violent radicalisation and its challenges for the security. It is focused on the most important dimensions of the counter-terrorism strategy implemented by the Swedish authorities to fight and prevent extremism. The methodological analysis is based on the integration of historical and system method and refers to Marc Sageman’s theory of the jihadist networks, which is more appropriate to understand how they appear and operate. The main conclusion of the article is that jihadist extremism has appeared in the multicultural society which is based on the idea of integration and inclusion. Sweden has implemented the multidimensional and integrated counter-terrorism policy to prevent violent extremism. Regarding the positive attitudes towards immigrants still are the majority, it should be emphasised that the terrorist threat fuels the anti-immigration orientation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

San, Juan E. "From Chinatown to Gunga Din Highway: Notes on Frank Chin's Writing Strategy." Ethnic Studies Review 24, no. 1 (2001): 1–28. http://dx.doi.org/10.1525/esr.2001.24.1.1.

Texto completo
Resumen
Exploring Frank Chin's work, particularly in his latest novel Gunga Din Highway, the essay endeavors to re-situate ethnic writing in the historical specificity of its inscription in the United States as a racial polity. This cognitive remapping of the literary field as reconfigured by multiculturalist liberalism may be accomplished by examining Chin's cultural politics. Chin's mode of strategic writing interrogates the modelminority myth and the premises of cultural nationalism. While it rejects the pluralist resolution of the traditional conflicts in the Chinese diaspora, Chin's satiric impulse proposes a defamiliarization of Asian American “common sense” adequate to provoke a revaluation of the presumed conjunction of ethnicities, cultures, and nationalities in the current counter-terrorist milieu.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Stevanović, Miroslav, and Dragan Đurđević. "The role of computer forensics in the fight against terrorism." Megatrend revija 17, no. 1 (2020): 129–42. http://dx.doi.org/10.5937/megrev2001129s.

Texto completo
Resumen
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy is evaluated from the point of view of functionality. In this sense, it is an attempt to present elements that influence the effectiveness of counter-terrorism in the information age. Related to this is the specification of the role that digital forensics can play in this area. The conclusion is that an effective counter-terrorism strategy must necessarily encompass the institutional incorporation of digital forensics since it alone can contribute to the timely detection or assertion of responsibility for terrorism in a networked computing environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Costa, Christopher P. "A Review of: “Joshua Alexander Geltzer.U.S. Counter-Terrorism Strategy and al-Qaeda: Signalling and the Terrorist World-View.”." Terrorism and Political Violence 23, no. 1 (2010): 112–14. http://dx.doi.org/10.1080/09546553.2011.533075.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Helzhynskyi, A. Yu. "Legal Regulation of Interaction of Security Service of Ukraine with Civil Society in Counteracting Terrorism." Law and Safety 74, no. 3 (2019): 10–17. http://dx.doi.org/10.32631/pb.2019.3.01.

Texto completo
Resumen
The relevance of the research is determined by the prerequisites for the rise in the levels of terrorist threats in Ukraine and the development of international terrorism. In response to these threats, the state creates protective mechanisms, increasing the level of protection of the population, since this is one of its main tasks. However, this system does not fully meet its objectives without cooperation with civil society. That is why, one of the current tasks is to unite the efforts of the state and civil society institutions in fighting against terrorism. Every citizen and civil society in the whole is a stakeholder and partner in the fight against terrorism. Citizens should be active participants. Therefore, the article provides a legal analysis of the interaction of the main agency in the state system of combating terrorist activity – the Security Service of Ukraine with civil society and clarifies the ways of implementing the state policy on counteracting terrorism. The comparative legal method of the study analyzes the source base of national law concerning the interaction of the Security Service of Ukraine with civil society in fighting against terrorism. The practical relevance of the study is determined by the ability to use the main points and conclusions of the study to further studies of the problems of the interaction of counter-terrorism actors with civil society. As a result of the analysis of the normative base on the interaction of the Security Service of Ukraine with civil society in fighting against terrorism, it can be stated about the state's efforts to implement the main points of the UN Global Counter-Terrorism Strategy. In general, Ukraine's anti-terrorist system meets international standards in the field of counteracting terrorism. However, national legislation is the subject to improvement in the field of counteracting terrorism with the involvement of civil society institutions in eliminating the conditions and causes of terrorist activity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Ummah, Athik Hidayatul. "Digital Media and Counter Narrative of Radicalism." Jurnal THEOLOGIA 31, no. 2 (2021): 233–56. http://dx.doi.org/10.21580/teo.2020.31.2.6762.

Texto completo
Resumen
This article aims to describe the meaning of narratives are used by digital media or online media to counter the narrative of radicalism. The research method used is discourse analysis to find the meaning in the text. The theoretical framework used is narrative theory to explain process audience can trust about a narrative because of the consistency and truth of narrative or story. Narratives are analyzed using a framework of identity prism theory. The identity prism describes that online media as a brand has a strategy to build and promote it is unique among other brands. The results of the study are Islami.co and Ruangobrol.id have different characteristics or uniqueness and segmentation to convey the counter-narratives to the public. The narratives are built is to fight or deconstruct the narratives of radicalism-terrorism as an effort to prevent radicalism and the recruitment of new members through the internet. The counter-narrative also has coherence and truth as important standards for the public to select and judge that the narrative is consistent and credible. In the digital age, digital media have an important role in the counter-narratives of radicalism. It’s because radical-terrorist groups using the internet and social media platforms to spread their thoughts and their actions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Lorenzo-Dus, Nuria, and Stuart Macdonald. "Othering the West in the online Jihadist propaganda magazines Inspire and Dabiq." Journal of Language Aggression and Conflict 6, no. 1 (2018): 79–106. http://dx.doi.org/10.1075/jlac.00004.lor.

Texto completo
Resumen
Abstract This paper examines how the jihadist terrorist groups Al Qaeda and the so-called Islamic State discursively construct ‘the West’ as an alien, aberrant ‘other’ in their respective online propaganda magazines Inspire and Dabiq over a 5 year period (2010–2015). The analysis integrates insights from the field of Terrorism Studies into a Corpus Assisted Discourse Studies approach, working centrally with the notions of othering and conventionalised impoliteness. Our findings reveal not only that othering is a key discursive process in the groups’ online propaganda machinery but that it is discursively realised via homogenisation, suppression (stereotyping) and pejoration strategies. The latter are further examined via the notion of conventional impoliteness. Pointed criticism emerges as the most frequent conventionalised impoliteness strategy in both magazines. Threats, condescension and exclusion strategies are also saliently used, albeit with different relative frequencies within each magazine. The findings show the value of Discourse Analysis to research into (jihadist) terrorism, including the possibility of drawing upon its findings to develop tailored counter-messages to those advanced by (jihadist) terrorist groups.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Texto completo
Resumen
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terrorist actors to expand the network by developing and recruiting new members. The threat of Islamic terrorism is categorized as a national security threat. The Indonesian Government through its security apparatus still have to work hard to hunt down other terrorists, to undertake preventive efforts to prevent Islamic fundamentalist beliefs not to develop and increased education level and the understanding of Islam more comprehensively.</em></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Heath-Kelly, Charlotte. "Algorithmic autoimmunity in the NHS: Radicalisation and the clinic." Security Dialogue 48, no. 1 (2016): 29–45. http://dx.doi.org/10.1177/0967010616671642.

Texto completo
Resumen
This article explores the extension of counter-radicalisation practice into the National Health Service (NHS). In the 2011 reformulation of the UK Prevent strategy, the NHS became a key sector for the identification and suppression of ‘radicalisation’. Optometrists, dentists, doctors and nurses have been incorporated into counter-terrorism and trained to report signs of radicalisation in patients and staff. This article explores how calculative modalities associated with big data and digital analytics have been translated into the non-digital realm. The surveillance of the whole of the population through the NHS indicates a dramatic policy shift away from linear profiling of those ‘suspect communities’ previously considered vulnerable to radicalisation. Fixed indicators of radicalisation and risk profiles no longer reduce the sample size for surveillance by distinguishing between risky and non-risky bodies. Instead, the UK government chose the NHS as a pre-eminent site for counter-terrorism because of the large amount of contact it has with the public. The UK government is developing a novel counter-terrorism policy in the NHS around large-N surveillance and inductive calculation, which demonstrates a translation of algorithmic modalities and calculative regimes. This article argues that this translation produces an autoimmune moment in British security discourse whereby the distinction between suspicious and non-suspicious bodies has collapsed. It explores the training provided to NHS staff, arguing that fixed profiles no longer guide surveillance: rather, surveillance inductively produces the terrorist profile.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Fatima, Noor, and Zahid Ali Khan. "Soft Power and Cultural Diplomacy as Counter-terrorism Measure in Contemporary International Politics." Global Social Sciences Review III, no. II (2018): 1–20. http://dx.doi.org/10.31703/gssr.2018(iii-ii).01.

Texto completo
Resumen
Public diplomacy lies at the heart of modern development of information age and shapes the concept of social and political thought. This paper analysis the concept of soft power vis-a-vis counter terrorism strategy of nation states and discusses the significance of the soft power and public/cultural diplomacy in building image, nation branding and ultimately building a narrative. It will bring the reference point of Pakistan on the issue of relevance with today's world at the same time carrying a negative image of terrorist state. This paper establishes co-relation between nation branding and public diplomacy. Since the hard power is meeting with failure in order to curb the terrorism, there is limitation of state capacity to use hard power in bringing the structural changes needed for curbing terrorism. The paper recommends that there is a great need for revisiting religious narrative that extremists invoke for justification of their acts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Hamilton, Richard, and Roger McCain. "Smallpox, Risks of Terrorist Attacks, and the Nash Equilibrium: An Introduction to Game Theory and an Examination of the Smallpox Vaccination Program." Prehospital and Disaster Medicine 24, no. 3 (2009): 231–38. http://dx.doi.org/10.1017/s1049023x00006865.

Texto completo
Resumen
AbstractIntroduction:The smallpox vaccination emergency preparedness program has been unsuccessful in enrolling sufficient numbers of healthcare workers.Objective:The objective of this study was to use game theory to analyze a pre-event vaccination versus post-event vaccination program using the example of a terrorist considering an attack with smallpox or a hoax.Methods:A three-person game (normal and extensive form), and an in-person game are played for pre-event and post-event vaccinations of healthcare workers facing the possibility of a smallpox attack or hoax.Results:Full pre-event vaccinations of all targeted healthcare workers are not necessary to deter a terrorist attack. In addition, coordinating vaccinations among healthcare workers, individual healthcare worker risk aversion, and the degree to which terrorists make the last move based on specific information on the status of pre-event vaccination all greatly impact strategy selection for both sides. A Nash Equilibrium of pre- and post-event vaccination strategies among a large number of healthcare professionals will tend to eliminate the advantage (of the terrorists) of a smallpox attack over a hoax, but may not eliminate some probability of a smallpox attack.Conclusions:Emergency preparedness would benefit from game theory analysis of the costs and payoffs of specific terrorism/counter-terrorism strategies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Alexander, James. "Prevent." Feminist Dissent, no. 4 (March 11, 2019): 202–15. http://dx.doi.org/10.31273/fd.n4.2019.323.

Texto completo
Resumen
This reflection presents a cautious look at Prevent from a youth workers’ point of view. It has been written with reference to first-hand experience and conversations with fellow youth workers and attempts to shed some light on why many in the youth and community sector may be reluctant to engage with the UK Government’s Prevent Strategy. Although the ideas presented in this article have been developed through personal experience, they also constitute the basis of planned future research on the way Prevent is being received within the youth sector. As such the paper will first set a policy context for the strategy outlining how community safety and crime prevention initiatives which once relied on voluntary involvement, are now increasingly being reinforced by a legal duty on particular professional groups of people to participate. I then look at the focus on the concern around the potential radicalisation of young people considering why they feature so significantly within the UK Government’s counter terrorism strategy. This viewpoint will be assessed against terrorism related conviction statistics and data on Prevent referrals and interventions, both of which suggest that the counter terrorist focus on youth radicalisation could be misguided. The article will close with some reflections on experiences gained as a youth worker regarding the realities of what can happen when youth organisations engage with Prevent as well as presenting an example of the pressure felt when organisations actively state that they have nothing to offer in terms of information on potential radicals.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Arifin, Bustanul, and Nur Afni Damanik. "THE IMPLEMENTATION OF INDONESIA’S COUNTER PIRACY STRATEGIES THROUGH MULTILATERAL COOPERATION IN THE MALACCA STRAIT (2004-2009)." Verity: Jurnal Ilmiah Hubungan Internasional (International Relations Journal) 12, no. 23 (2020): 5. http://dx.doi.org/10.19166/verity.v12i23.2482.

Texto completo
Resumen
<p><span>International Maritime Organization data shows that the trend in piracy in the Malacca Strait was significant from 2000-2004. In 2005, the Malacca Strait was categorised as a high-risk zone by the Lloyd’s Joint War Risk Committee. In the 2000s, post 9/11 terrorist attacks have galvanised the rising concern of the international community over the security of the Malacca Strait since there was a concern that sea piracy could lead to sea terrorism. Prior to 2004, apart from conducting unilateral patrols, Indonesia had bound itself to engage in bilateral cooperation with Malaysia and Singapore respectively. During 2004-2009, there were multiple multilateral cooperation initiatives proposed to Indonesia of which Indonesia responded in different ways. This research employs the qualitative method utilising journals, reports, official documents, and books to analyse the implementation of Indonesia’s counter piracy strategy in the Strait of Malacca from 2004-2009. Indonesia’s counter piracy strategy was implemented through MALSINDO Coordinated Patrol, Eyes in the Sky, which is later followed by the Malacca Strait Patrol – Intelligence Exchange Group (MSP-IEG). The launch of coordinated sea patrols of MALSINDO in 2004 was followed with the air patrol of the Eyes in the Sky in 2005 and ended with the information sharing system through MSP-IEG in 2006. The multilateral cooperation conducted by Indonesia, Malaysia, and Singapore has shown a positive result regarding the strategy to counter piracy in the Malaca Strait.</span></p><p><strong>Bahasa Indonesia Abstract: </strong>Data Organisasi Kelautan Internasional menunjukkan tren perompakan di Selat Malaka dengan keberadaan yang signifikan dari 2000-2004. Pada tahun 2005, Selat Malaka dikategorikan sebagai zona berisiko tinggi oleh Komite Risiko Perang Bersama Lloyd. Pada tahun 2000-an, pasca serangan teroris 11 September telah membangkitkan keprihatinan masyarakat internasional atas keamanan Selat Malaka karena ada gagasan perompakan laut dapat beresiko terhadap terorisme laut. Sebelum tahun 2004, selain melakukan patroli sepihak, Indonesia telah mengikat diri untuk terlibat dalam kerjasama bilateral dengan Malaysia dan Singapura. Dalam periode 2004-2009, ada beberapa inisiatif kerjasama multilateral yang diajukan untuk penanggulangan perompakan di Selat Malaka dimana Indonesia memberikan respon yang berbeda. Penelitian ini menggunakan metode kualitatif berdasarkan jurnal, laporan, dokumen resmi, dan buku untuk menganalisa pelaksanaan strategi Indonesia dalam penanggulangan perompakan di Selat Malaka dalam periode 2004-2009. Strategi penanggulangan perompakan Indonesia diimplementasikan melalui Patroli Terkoordinasi MALSINDO, Eyes in the Sky, yang kemudian diikuti dengan Patrol Selat Malaka - Pertukaran Informasi Intelijen. Peluncuran patroli laut terkoordinasi MALSINDO pada tahun 2004 diikuti dengan patroli udara Eyes in the Sky pada tahun 2005 dan dilengkapi dengan sistem pembagian informasi melalui MSP-IEG pada tahun 2006. Kerjasama multilateral yang dilakukan oleh Indonesia, Malaysia, dan Singapura menunjukkan hasil positif terhadap strategi untuk menanggulangi perompakan di Selat Malaka.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Limbada, Zubeda, and Lynn Davies. "Addressing the Foreign Terrorist Fighter Phenomenon from a Human Rights Perspective." International Community Law Review 18, no. 5 (2016): 483–93. http://dx.doi.org/10.1163/18719732-12341343.

Texto completo
Resumen
Foreign terrorist fighters raise security concerns with regard to their actions abroad but also their possible return to their home countries. This paper asks whether tough state responses and new powers such as detention and withdrawal of citizenship raise significant human rights issues. It looks firstly at the different types of rights in play before examining counter-terror legislation from countries such as uk, Australia and Canada. Discourses of the profiles of extremists can be reductionist, ignoring the complexity of the journeys in and out of violent extremism. Does imprisonment does have a deterrent effect? What is the impact on communities of rendering individuals stateless? How does legislation impact on freedom of speech? The paper looks at good practices in deradicalisation from different countries, before outlining three key propositions. First is a much wider public education forum which explains different types of rights and encourages dialogue about what rights take precedence in a security strategy. Second is the forging of long term partnerships with communities, to build trust rather than stigmatise; and third is a greater democratisation of security policy, using two-way information and learning, from sources such as former extremists as well as from the voices of youth.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Scott, Russ. "The Sydney Lindt café siege: The role of the consultant psychiatrist." Australian & New Zealand Journal of Psychiatry 54, no. 3 (2019): 244–58. http://dx.doi.org/10.1177/0004867419853886.

Texto completo
Resumen
Background: In December 2014, after a 16-hour siege of the Lindt café in Sydney, Iranian-born gunman Man Haron Monis shot dead a hostage precipitating the police action which broke the siege. Objective: This paper reviews the demographic and other factual details of Monis as documented by the NSW Coroner’s Inquest and critically analyses the published findings of the Coroner particularly in relation to the role of the psychiatrist who advised senior police and negotiators during the siege. Results: At the time of the siege, there was no formal protocol that delineated the role of a psychiatrist in hostage negotiations. Despite the psychiatrist’s credentials including his extensive experience with siege-hostage incidents and his counter-terrorist training, the Coroner was unfairly critical of the psychiatrist. Conclusion: The Coroner’s censure of the psychiatrist was clearly prejudiced by hindsight bias. During the siege, the psychiatrist properly considered and evaluated all the available intelligence and other information known about the gunman. As the psychiatrist advised, Monis was a narcissist and the siege was not an Islamic State-inspired terrorist attack. Given that he announced he was armed with a bomb, Monis represented a ‘ credible threat’ to the hostages. The psychiatrist’s endorsement of the police strategy to ‘ contain and negotiate’ was prudent in the circumstances. The Coroner’s disparagement of the senior psychiatrist may have the unintended consequence that psychiatrists may be reluctant to assist in hostage-sieges or other critical incidents.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Maza, Kangdim Dingji, Umut Koldas, and Sait Aksit. "Challenges of Countering Terrorist Recruitment in the Lake Chad Region: The Case of Boko Haram." Religions 11, no. 2 (2020): 96. http://dx.doi.org/10.3390/rel11020096.

Texto completo
Resumen
This article attempts to shed light on the challenges confronting relevant actors (state and non-state) in countering the threat of terrorism recruitment by focusing on the Boko Haram terrorist organization, whose presence and activities threaten the security of the Lake Chad region. The article uses a qualitative research technique combining key informant interviews with stakeholders familiar with the conflict, academic and non-academic documents, reports, and policy briefs. The findings of the article suggest that despite the various initiatives by stakeholders aimed at containing the strategies of recruitment, the group continues to expand its base by launching coordinated attacks that further destabilize the region. These challenges stem from a lack of a clear-cut counterterrorism strategy, a dearth in technological and mutual trust between actors and locals in the management and utilization of intelligence, and the inability of state institutions to ‘coerce and convince’ citizens in terms of its capacity to counter the danger of terrorism recruitment and expansion. The article, amongst other things, recommends a community policing model similar to the ‘Nyumba-Kumi security initiative’ adopted by most countries in East Africa for the effective assessment and detection of threat forces; the state and its agencies should show the capacity to coerce and convince in dealing with the (ideological, religious, social, and economic) conditions, drivers, and factors promoting the spread of terrorism as well as other forms of violent extremism in the society; furthermore, there is a need for stakeholders to adopt a comprehensive and holistic counterterrorism/violent extremism strategy to reflect present-day security challenges as well as to guarantee sustainable peace.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Yousafzai, Iftikhar Ahmad, and A. Z. Hilali. "India’s Role as a Determinant in Pakistan-US Relations (2005-2015)." Review of Applied Management and Social Sciences 4, no. 1 (2021): 285–93. http://dx.doi.org/10.47067/ramss.v4i1.122.

Texto completo
Resumen
The United States adopted a policy of de-hyphenation in its relations with India and Pakistan in the post-09/11 period which continued to be operational in the period 2005-2015. This policy apparently meant that the United States would deal each of the two South Asian adversaries, India and Pakistan. The main reason for this phenomenon was that the policy-makers in the US saw India as a heavy-weight to counter the rising economic, political and military power of China in Asia. Pakistan could not be fitted in this strategic calculus. The United States changed its previous position on Kashmir and instead of calling for resolving this issue according to the United Nations resolutions, it stressed on bilateral negotiations. Similarly, the United States endorsed Indian stance that Pakistan was backing terrorist outfits that perpetrated acts of terrorism in India. Strategic partnership between The US and India extended cooperation in civil nuclear technology, missile defense, space technology and defense production. No such cooperation could be extended to Pakistan. Permanent membership in the UN Security Council for India was endorsed despite Pakistan’s objections.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Chertoff, Michael, Patrick Bury, and Daniela Richterova. "Bytes not waves: information communication technologies, global jihadism and counterterrorism." International Affairs 96, no. 5 (2020): 1305–25. http://dx.doi.org/10.1093/ia/iiaa048.

Texto completo
Resumen
Abstract Rapoport's conceptualization of the last, religious wave of four global waves remains highly influential. But it, and other typologies, have placed too little emphasis on the influence of information and communication technologies (ICTs) on the evolution of global jihadist activities. This article makes two new contributions by developing both a new ICT-based typology for understanding jihadist evolutions, and by focusing on successful attacks. Our central argument is that ICTs’ impact on global jihadism has facilitated dramatic transformations of its strategy, organization and tactics since the 1990s, and that these can be understood as four overlapping iterations. ‘Jihadism 1.0’ describes the hierarchical, top-down directed and overseas financed and trained terrorist organizations that conducted iconic attacks at the turn of the millennium. Jihadism has since evolved into ‘Jihadism 2.0’ and then ‘Jihadism 3.0’. Jihadism 2.0 recognizes that a number of smaller, coordinated attacks can have a global impact. Jihadism 3.0 is inspired terrorism that has no links to the central terror organization, utilizing individuals and crude tactics. Finally, jihadism is evolving toward ‘Jihadism 4.0’, or cyberterrorism. We argue this typology provides a useful basis for scholars and practitioners to conceptualize the ICT dynamics influencing global jihadism, and these may be applicable to other global terrorists. The conclusion analyses how counter-terrorism services can respond to these evolutions and charts areas for future research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Bussotti, Luca, and Charles Torres. "THE RISK MANAGEMENT OF ISLAMIC TERRORISM IN A FRAGILE STATE: THE CASE OF MOZAMBIQUE." Problems of Management in the 21st Century 15, no. 1 (2020): 9–22. http://dx.doi.org/10.33225/10.33225/pmc/20.15.09.

Texto completo
Resumen
Islamic terrorism has been a serious threat for Eastern and Southern Africa since the 1990s. Many of these African countries have developed different forms of struggle against Islamic terrorism, from a military intervention to social policies, in order to improve the general socio-economic conditions for society as a whole. In Mozambique, no specific measure was adopted to cope the diffusion of terrorism, leaving that radicalized forms of Islamism spread in particular in Cabo Delgado, a Northern Province bordering with Tanzania. Research aimed at approaching Islamic terrorism in Cabo Delgado according to the strategy of risk prevention and risk management by Mozambican State. This study demonstrates that during the second term of Guebuza as a Chief of State, Mozambique had to face three different, potential threats. Nevertheless, Mozambican government identified two of these threats as a priority (namely Somali piracy in Mozambique Channel and Renamo´s action), neglecting possible Islamic terrorist attacks in Cabo Delgado Province. This study demonstrates – using privileged witnesses as well as open sources available in the public sphere - that this choice was typical of a fragile and authoritarian State. Firstly, it was not based on an objective risk analysis, but on political as well as on patrimonial interests of political elite, and secondly local civil society could not oppose any resistance. This choice allowed radical Islamic groups to grow undisturbed in Cabo Delgado, until carrying out violent attacks from October 2017, which Mozambican government seems unable to counter until today. Keywords: Cabo Delgado Province, Mozambican State, religious extremism, risk prevention.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Shumilin, Aleksandr. "France: Republic against «Political Islam» (Part I)." Scientific and Analytical Herald of IE RAS, no. 1 (February 28, 2021): 54–61. http://dx.doi.org/10.15211/vestnikieran120215461.

Texto completo
Resumen
On February 16, 2021, the French National Assembly (lower house of parliament) approved a draft law on countering separatism. On March 30, this document is to be discussed by members of the Senate. The degree of public discussions around him began to grow immediately after the speech of President E. Macron on October 2, 2020 and the subsequent publication in the press of the main provisions of the project. In fact, the document is aimed at preventing the radicalization of the Muslim community of France, at its more thorough adaptation to the socio-political conditions and basic values of the Republic. Most of the Muslim community and the clergy of France approved the proposals of the president and the government, while about a third of Muslim organizations opposed them. The last, as a rule, are linked to the international Islamist association «Muslim Brotherhood», which seeks to expand its cells and network in France, and in Europe as a whole. Organizations operating legally in the Turkish communities of the Old World articulate especially clearly the attitudes of the «brothers». In fact, at the religious level, they reproduce and continue the loud verbal confrontation between Macron and Turkish President R.T. Erdogan in October-November last year. The article examines the strategy of the French government to counter the attempts of radical Islamists to legalize the phenomenon of «political Islam». This problem, aggravated after the terrorist attacks in a number of European countries in October 2020, has become no less acute for France today than the fight against the pandemic.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Henning, Johan, and Mignon Hauman. "Fortifying a risk-based approach in the South African AML/CFT process." Journal of Financial Crime 24, no. 4 (2017): 520–28. http://dx.doi.org/10.1108/jfc-01-2017-0007.

Texto completo
Resumen
Purpose The purpose of this paper is evaluate the provisions of Financial Intelligence Centre Act Amendment Bill, 2016 which intends to give effect to the implementation of the envisioned risk-based approach in anti-money laundering/combating financing of terrorism (AML/CFT) processes, as well as the extent to which the provisions address certain technical shortcomings elucidated in 2009 Mutual Evaluation Report concerning South Africa’s AML/CFT’s framework. Design/methodology/approach Sources of information consisted of scholarly articles, articles retrieved from the Web, news reports, reports published by national and international regulatory bodies, legislation and draft legislation. Findings Findings suggest that the South African legislature not only addresses the particular shortcomings specifically highlighted in the 2009 Mutual Evaluation Report comprised by the Financial Action Task Force but also requires the establishment of a framework for the realisation of a risk-based approached in every “risk” scenario and on an on-going basis. Practical implications Accountable institutions will be required to establish and implement a Risk Management and Compliance Program which must provide both the framework and the strategy for the execution of the risk-based approach when establishing a business relationship, during the course of administrating the business relationship as well as when concluding any single transaction in pursuit of the business relationship. Originality/value This paper serves to alert accountable institutions, compliance and corporate governance professionals and AML and counter-terrorist financing practitioners of the risk-based approach South African accountable institutions will be obliged to implement in their AML/CFT processes, the extent to which a risk-based approach must be incorporated and the aspects that must be provided for in terms of the mandated Risk Management and Compliance Program once the Financial Intelligence Centre Act Amendment Bill, 2016 is signed into law.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Rose, Kalle Johannes. "Disclosing anti-money launderers through CSR regulation – a new way to combat money laundering." Journal of Money Laundering Control 23, no. 1 (2020): 11–25. http://dx.doi.org/10.1108/jmlc-07-2019-0062.

Texto completo
Resumen
Purpose Recent research questions the innocence of companies outside the current EU money laundering regulation in terms of contributing to the externality problem of money laundering. The purpose of this paper is to examine how including anti-money laundering as an element of the EU corporate social responsibilities (CSR) directive can contribute to solving the externality problem of money laundering. Based on the principles of CSR and the economic effects of disclosure duties, this paper analyzes the implications an introduction of anti-money laundering policies and disclosure duties can have on corporate clients and the combatting against money laundering. Furthermore, it is the intention of this paper to argue how such a regulatory change can help the financial companies dividing “good” and “bad” clients to prevent money laundering from happening. Design/methodology/approach The method of this paper is a functional approach to law and economics. It seeks to enhance the efficiency of the regulatory framework combatting money laundering by including economic incentive theory. Findings Based on the regulatory framework of the fourth anti-money laundering and counter terrorist financing directive and the directive on criminalizing money laundering, this paper argues that inclusion of anti-money laundering in the EU CSR directive will contribute to solving the externality problem of money laundering in the EU. Additionally, the expansion of the regulatory framework can start a culture, where corporate clients to the financial sector will take active steps toward combatting money laundering. Originality/value The paper identifies a way to change the corporate perception of anti-money laundering prevention from having an incentive of minimal compliance/“race-to-the-bottom” to be a possible element of competition between companies through their CSR strategy. While most research focuses on the financial sector in terms of money laundering, this paper takes the next step and includes corporate clients in the financial sector.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Blahova, Marta. "Security forecasts of terrorist attack." MATEC Web of Conferences 292 (2019): 01035. http://dx.doi.org/10.1051/matecconf/201929201035.

Texto completo
Resumen
This article deals with security developments in terrorism. In the introductory part, the article deals with the history and current situation of terrorism. Furthermore, the national ones are analyzed and International Security Strategy Papers on Counter-Terrorism. In the next part of this article, long-term safety forecasts from the Czech Republic are analyzed and foreign authors with a focus on terrorism. The main outcome of the article is a proposal for an alternative scenario of possible security developments in the area of terrorism within the European Union.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Rose, Kalle Johannes. "De-risking or recontracting – the risk dilemma of EU money laundering regulation." Journal of Risk Finance 21, no. 4 (2020): 445–58. http://dx.doi.org/10.1108/jrf-12-2019-0237.

Texto completo
Resumen
Purpose Recent research and market effects within the European Union (EU) show a rising concern toward the de-risking of certain sectors/actors owing to the increased anti-money laundering regulation. Because of the enhanced due diligence and monitoring costs related to anti-money laundering and counter-terrorist financing regulation by the AMLD4 and AMLD5, several financial institutions now turn to de-risking their corporate client base to minimize not only costs from monitoring and onboarding but also the risks of sanctions and reputation. The purpose of this paper is to analyze the incentives behind de-risking and the relevant solution models to the de-risking “crisis.” Overall, to find, to what extend de-risking is efficient and when it is not and how to mitigate the concept. Design/methodology/approach This paper applies a functional approach to law and economics with the aim of reaching a higher level of efficiency in combatting money laundering through analyzing present regulatory and economic conditions. Findings It is found that de-risking within the EU opposes the aim of the present regulatory scheme regarding anti-money laundering. The paper finds that it is needed to divide the analysis of de-risking to a national and regional/union level. In addition, this paper establishes that the present strategy of de-risking at national level eventually will result in enhanced regulation to fulfill the aim of the present regulatory framework, which is why a proactive approach by recontracting the client base is recommended. At a regional level, it is found that de-risking is valid, why a solution needs to come from the EU enhancing control, monitoring and sanctions to establish trust and the possibility for financial inclusion. Originality/value Most of the recent research within the field highlights the problem of de-risking and therefore presents a range of initiatives to regulators and financial institutions at a global level. This paper solely focuses on the EU and shows that the de-risking dilemma demands financial institutions to take a proactive approach to contracting if unnecessary regulation is to be hindered. Furthermore, this paper shows that the concept of de-risking cannot be analyzed nor mitigated as one singular concept, but it needs to be addressed according to different levels of activity and geography.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Shpiro, Shlomo. "Conflict Media Strategies and the Politics of Counter-Terrorism." Politics 22, no. 2 (2002): 76–85. http://dx.doi.org/10.1111/1467-9256.00162.

Texto completo
Resumen
This article argues that the events of 11 September 2001, and the subsequent ‘war on terror’, have highlighted the role of the media in both the coverage and conduct of modern conflict. The article concentrates on the ‘conflict media strategies’ pursued by belligerents and examines the development and refinement of such strategies over time, from the Second World War through to the conflict in Afghanistan. Using data from Vietnam, the Falklands, the Gulf, Kosovo and other conflicts, I argue that an effective conflict media strategy is an essential tool of warfare that is used by states and terrorist groups alike.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Rothenberger, Liane, Yulia An, Natalia Angulo Mejía, Arlinda Arizi, and María Martín Villalobos. "Perpetrators’ strategic communication: Framing and identity building on ethno-nationalist terrorists’ websites." Communications 43, no. 2 (2018): 133–71. http://dx.doi.org/10.1515/commun-2017-0057.

Texto completo
Resumen
Abstract The study explores communication strategies of ethno-nationalist terrorists with respect to their framing and identity building. Strategies of eight ethno-nationalist terrorist groups were analyzed using 70 articles published on the groups’ websites. Three cluster-analytic procedures and a correlational analysis were applied to (1) strategies of problem definition, (2) cause and responsibility attribution, (3) treatment recommendations, and (4) identity building. The analysis revealed various dimensions on which terrorists frame their content. No group-specific strategies of framing and identity building have been found yet, suggesting that the strategies were universal across terrorist groups, and they were applied on a case-by-case basis. Knowledge about these strategies should advance counter-terrorism efforts, and assist in development of alternative identities among ethnic groups at risk of conflict.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Monar, Jörg. "Common Threat and Common Response? The European Union's Counter-Terrorism Strategy and its Problems." Government and Opposition 42, no. 3 (2007): 292–313. http://dx.doi.org/10.1111/j.1477-7053.2007.00225.x.

Texto completo
Resumen
AbstractOn the basis of an analysis of the European Union's common definition of the post-9/11 terrorist threat, this article provides a critical assessment of the EU's response. The EU has arrived at a reasonably specific definition of the common threat that avoids simplistic reductions and is a response that is sufficiently multidimensional to address the different aspects – internal and external, legislative and operational, repressive and preventive – of this threat. Yet the definition is undermined by differences between national threat perceptions. The preference for instruments of cooperation and coordination rather than integration, and poor implementation are having a negative impact on the effectiveness of the common response, the legitimacy of which is also weakened by limited parliamentary and judicial control.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Kumar, Deepa. "Terrorcraft: empire and the making of the racialised terrorist threat." Race & Class 62, no. 2 (2020): 34–60. http://dx.doi.org/10.1177/0306396820930523.

Texto completo
Resumen
Terrorism is so associated with Arabs, Muslims and South Asians that it has become common sense in the post 9/11 world. Drawing on various bodies of scholarship, this article traces the complex evolution of ‘race’ in relation to Arabs and Muslims from the 1960s to mid-’80s, alongside changing notions of ‘terrorism’, to advance an argument about the historically contingent nature of the racialised terrorist threat. The author argues that ‘terrorcraft’ – or terrorist racialisation – is a process. First, the racialised terrorist was crafted deep in the US empire. Counter-insurgency doctrine was instrumental in the US security state’s creation of the ‘Arab terrorist’ through racial profiling. Second, the ideology of terrorcraft followed, rather than preceded, the security state’s racialising practices, though racial stereotypes of Arabs and Muslims pre-date the 1960s. The ‘Arab terrorist’ is a new project of racial formation, the author argues. Third, the US’s strategic alliance with Israel after 1967 and two conferences organised by the Israeli Jonathan Institute laid the basis for the transatlantic production of terrorcraft. Over time, it evolved from its initial focus on Arabs to include Muslims during the 1980s and South Asians in the 1990s.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Baldaccini, Anneliese. "Counter-Terrorism and the EU Strategy for Border Security: Framing Suspects with Biometric Documents and Databases." European Journal of Migration and Law 10, no. 1 (2008): 31–49. http://dx.doi.org/10.1163/138836407x261308.

Texto completo
Resumen
AbstractThis article examines the way in which the EU amd its Member States have approached border security issues since the terrorist attacks in the US on 11 September 2001. A key aspect of this approach has been to tighten control of borders and the safety of documents by the use of biometric systems. The new policies on border security and document security are resulting in the mass collection and storage of biometric data in relation to third-country nationals seeking entry into the territory of EU Member States, and in relation to EU nationals within the context of travel and identity documents. These developments are significant as the Union is considering the potential offered by biometrics not only for the effective management of borders but also for the prevention and combating of crime.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Khairil, Muhammad. "Wahdah Islamiyah’s Counter-Radicalism Strategy Through The New Media Network in Da’wah Development Of Palu City." Al-Ulum 18, no. 2 (2018): 417–35. http://dx.doi.org/10.30603/au.v18i2.610.

Texto completo
Resumen
Radical labels and terrorist movements are often pinned down on various Islamic organizations in Indonesia, one of which is Wahdah Islamiyah (WI). This stigma is growing rapidly among Indonesians because the news in the media seems to accuse Islamic organizations of being the source of radical movements. Understanding the media becomes a crucial need in society. In addition, Islamic organizations are required to balance technological developments and utilize communication media in the modern era to re-establish the image of Muslims in Indonesia. This study focused on Wahdah Islamiyah in Palu City and was carried out with qualitative methods and case study approach to see and explain how the Wahdah Islamiyah in Palu City understood and utilized the media in responding to radical ideas that were often attached to Islamic organizations. This research shows that WI has a special strategy in responding to radicalism and has been able to utilize online media even though it is not yet optimal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Chunlin, Liu, and Rohan Gunaratna. "The terrorist threat forecast in 2021." UNISCI Journal 19, no. 55 (2021): 215–20. http://dx.doi.org/10.31439/unisci-112.

Texto completo
Resumen
The pandemic year 2021 is likely to witness an overall decline in global terrorism. While the threat grew in conflict zones, it diminished off-the-battlefields. However, threat groups worldwide are expanding in cyber space during the pandemic. From Indonesia to Pakistan, Muslim majority countries, Arabization and Islamization of Muslim communities during the pandemic is disrupting national cohesion. To prevent, counter and respond to the recent developments of key terrorist organizations, governmental and non-governmental partners should understand the threat. The intelligence services, law enforcement authorities and military forces should move from counter terrorism cooperation to collaboration and partnership. Working with community, academic and private sector partners, governments should build the higher strategic and ground level operational and tactical capabilities.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Grigor’eva, Kseniya S. "Problem of Selective Control as a Means of Countering Terrorism (On the example of Poland, Latvia, Bulgaria)." Sociologicheskaja nauka i social naja praktika 7, no. 4 (2019): 166–79. http://dx.doi.org/10.19181/snsp.2019.7.4.6809.

Texto completo
Resumen
The use of ethnic discrimination in anti-terrorism activities is often preceded by terrorist attacks. The need for increased control over certain groups of citizens on the basis of their ethnic and / or national origin, as a rule, is justified by the extraordinary situation. However, ethnically selective control also exists where terrorist risks are low. The article discusses the relevant experience of Poland, Latvia and Bulgaria – countries where a low level of terrorist threat is officially declared. In all three countries, the main subject of ethnically selective control are people from the so-called “high-risk” countries. Discrimination against the citizens of these countries is carried out with the approval of the central authorities. The concept of “high-risk countries” is associated with the concept of “high-risk third countries” having strategic deficiencies in their anti-money laundering/counter-terrorism financing regimes”, introduced by the European Commission, as well as with the concept of “target countries” used in the United States. The inclusion of Palestine and the Caucasian republics of the Russian Federation in the list of high-risk countries suggests that in Poland, Latvia and Bulgaria Russian and Israeli methods of countering terrorism are also taken into account. Poland, Latvia and Bulgaria use similar approaches to the fight against terrorism, they are located close to each other and they have a common recent historical past. This makes it very likely either a direct exchange of experience in the implementation of ethnically selective control between them, or the incorporation of relevant experience in developing their own counter-terrorism measures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía