Spelling suggestions: "subject:" terrorism"" "subject:" errorism""
551 |
The potential anti-money laundering and counter-terrorism financing risks and implications of virtual currencies on the prevailing South African regulatory and supervisory regimeBotha, Rynhard January 2019 (has links)
The purpose of this mini-dissertation is to analyse and establish the potential money laundering and terrorism financing risks and implications of virtual currencies on the prevalent South African regulatory and supervisory architecture. The South African financial system is exceedingly regulated and supervised to ensure that it is prudent and reputable, and to enhance the safety and soundness thereof. Recently, technological innovations and developments have created immense issues especially from a financial regulatory and supervisory perspective. Financial technology has produced mysterious phenomena such as blockchain, insuretech, crowdfunding and virtual currencies. Presently, virtual currencies, which will be the focus of this study, do not fall within the ambits of the South African financial regulatory or supervisory regime and have thus created a regulatory arbitrage. This poses a significant number of risks and implications to the South African context, namely tax evasion; crossborder illicit flow of funds; contravention of exchange control regulations; financial instability; monetary policy uncertainty; inaccurate economic statistics; non-reporting of balance of payment requirements; and money laundering and terrorist financing (ML/TF). The study aims to construct a clear description and categorisation of virtual currencies within a South African context. Secondly, the study will set out the risks and implications that virtual currencies pose to the South African financial system from a ML/TF perspective. Finally, the study will present a possible solution to close the current regulatory arbitrage presented by virtual currencies in the South African financial sector. / Mini Dissertation (LLM)--University of Pretoria, 2019. / Mercantile Law / LLM Banking Law / Unrestricted
|
552 |
Performative Power and Terrorism in Europe in the 2010's / Performative Power and Terrorism in Europe in the 2010'sSmit, Roeland Pieter January 2018 (has links)
This diploma thesis called 'Performative Power and Terrorism in Europe in the 2010s', deals with the evolution of terrorism, counterterrorism and the use of the theory of performative power, as coined by Beatrice de Graaf in 2010. Since the recent attacks in Paris (13th of November 2015) and Nice (14th of July 2016), terrorism has become a hot topic again for both scholars and policymakers. De Graaf has provided a schedule of fourteen signifiers in order to measure the performativity of authorities, and the extent to which they are capable of influencing public fears and opinion when it comes to terrorism. A schedule that should concretise the way in which theory can be 'translated' to practice. By means of two case studies, regarding the terrorist attacks mentioned above, the theory and its signifiers will be analysed. The result of this analysis was stunning. This paper argues the theory and the signifiers are partially flawed and anachronistic. Although De Graaf considers her theory to be universal, the research conducted in this document reveals shortcomings and proves it does not stand the test of time. In order to make performative power and the signifiers time-resistant it has to be altered. Recommendations are therefore provided at the end of this paper.
|
553 |
Boj proti terorismu v Gruzii / Counter-Terrorism in GeorgiaPutkaradze, Kakha January 2019 (has links)
Master thesis by the name of "Counter-terrorism in Georgia" aims at investigating antiterrorism environment in Post-Soviet Georgia. Thesis deals with the terrorist challenges faced by our country and implemented preventive measures. Moreover, it outlines geopolitical, regional processes in line with ongoing events in Georgia, showcases possible impacts of abovementioned events on the following regions: Pankisi Gorge, South-West of Georgia, border lines with Armenia and Azerbaijan. Also, our work demonstrates the statistics and ratio of terrorist activities performed in Georgia with the frequency of worldwide terrorist activities. Master thesis attempts to thoroughly cover terrorism and antiterrorism topics, which will greatly contribute to researchers interested in this field.
|
554 |
Srovnávací studie Saúdské Arábie a íránské zahraniční politiky vůči organizacím na Blízkém východě označenými USA za teroristické / Comparative Study of Saudia Arabia's and Iran's foreign policies towards U.S. designated terrorist organizations in Middle EastBajramović, Edin January 2020 (has links)
The Middle East, as one of the most dynamic and troubling world regions, has a wide range of problems. However, in my view, the essential, if not the most essential, security issue here, is terrorism. It seems that the relative decline of terrorist groups, such as ISIS and Al-Qaeda, has made us forget that there are indeed underlying problems that cause the emergence of these deadly organizations. This paper aims to identify these causes by analyzing Saudi and Iranian foreign policy towards U.S.-designated terrorist organizations: Hezbollah, Hamas, Al-Qaeda, and Islamic State. In the process, the thesis will establish the general motives of these two states to support and fight terrorism, as well as their means of doing it. Furthermore, it will dive into the specifics of the policies that these two formulate towards every one of the previously stated groups. That will be done in order to prove arguments contending how Riyadh, in many ways, hinders U.S. counterterrorism efforts, while Iranians, contrary to popular belief, contribute to it. Acknowledging that there are many things on which these two states need to improve, the thesis will offer recommendations pointing to the need for Washington to take a more balanced approach to these two countries if it wishes to create a region where its...
|
555 |
En la boca del lobo. Construcción de una visión sobre el conflicto armado interno en el Perú / Into the wolf´s mouth. Construction of a vision about the internal armed conflict in PerúBlas Vera, Mauricio Martín 27 November 2019 (has links)
Un pueblo espera protección por parte de un grupo antiterrorista, pero, por el simple hecho de ser andinos, se ven afectados por una violencia injustificada.
La boca del lobo (1988) de Francisco Lombardi es una película que se inspira en la matanza de Soccos; suceso en el cual los Sinchis, una división de la Policía Nacional del Perú asesinó a más de 30 hombres, mujeres y niños
La presente investigación analizará y tratará de comprender “el problema colonial” que está vigente hasta el día de hoy. El trabajo busca entender las contradicciones del conflicto armado interno en el Perú a partir del análisis de la película La boca del lobo (1988) de Franciso Lombardi. Se va a apoyar con el análisis de una escena en específico; la escena del himno nacional en la plaza de armas. / A town expects protection from an anti-terrorist group, but, simply by being Andean, they are affected by unjustified violence.
La boca del lobo (1988) by Francisco Lombardi is a film that is inspired by the massacre of Soccos; event in which the Sinchis, a division of the National Police of Peru murdered more than 30 men, women and children
The present investigation will analyse and try to understand "the colonial problem" that is in force until today. The work seeks to understand the contradictions of the internal armed conflict in Peru from the analysis of the film La boca del lobo (1988) by Franciso Lombardi. It will be supported by the analysis of a specific scene; the scene of the national anthem in the main square. / Trabajo de investigación
|
556 |
Terorismus v kyberprostoru / Terrorism in CyberspaceCitta, Adam January 2013 (has links)
Although it seems to be a global phenomenon, the internet is a part of human society for relatively short time. Existing in different forms there are phenomena that are present in human society for decades, and that we might not expect in cyberspace. In addition to a mutation of social pathologies such as bullying, child pornography and stalking, internet is used by extremist movements and terrorist groups for their activities such as propaganda, mutual communication, but also for invasive activities. This thesis is focused among other things on terrorism in cyberspace. The introduction places the issue in the current state of society, connecting it with technological and social changes. The second section presents a brief overview of the relevant literature, which is focused on the issue of conventional terrorism and terrorism in cyberspace. The following chapters attempt to define its form, find its essence, and describe the similarities and differences especially in relation to conventional terrorism. These findings are achieved by confrontating both forms of terrorism, its fundamental aspects and classification criteria. This work provides an unusual insight into the relationship of technology and society, which despite its relative youth requires more and more attention. It shows that...
|
557 |
From "Total Liberation" to "Phased Liberation": Temporality and Identity in the Provisional IRA and HamasBlessing, Jason A. 14 June 2013 (has links)
In this thesis, I examine how violent substate actors—specifically those labeled as ‘terrorist’— are able to change from a strategy of total liberation to phased liberation. Using discourse analysis, shifts in political identity are examined in the Provisional IRA and Hamas. Each case study shows that the organization is undergoing an identity change from a more religiouslyinfluenced identity to one that emphasizes national elements; this shift to a national political identity enables a move from total liberation to phased liberation. The conclusion is reached that these changes in political identity rest on changing conceptions of temporality; ultimately, it is a change in temporal understanding that drives the transformation from total liberation to phased liberation. / Master of Arts
|
558 |
Port Security: The Terrorist Naval Mine/Underwater Improvised Explosive Device Threatvon Bleichert, Peter 01 January 2015 (has links)
Terrorist naval mines/underwater improvised explosive devices (M/UWIEDs) are a threat to U.S. maritime ports, and could cause economic damage, panic, and mass casualties. The purpose of this case study was to examine this threat and propose reforms that improve port security management. The study aligned with the mission area analysis objective of identifying and assessing potential terrorist threats in order to preempt and prevent attacks. Von Bertalanffy's general systems theory was the framework for research questions, which focused on improvements in port security management to mitigate the threat of terrorist M/UWIEDs. Data collection included a document content analysis of open source/nonclassified crime reports, government threat assessments, and legislation; physical artifacts (port infrastructure) information; policy papers; maps, satellite imagery, and navigational charts; peer-reviewed academic literature; and direct observation of 2 California-based maritime ports and an inspection of their physical artifacts. Data were organized by general themes; coded axially and selectively; and analyzed by phrases, topics, and words associated with minelaying, mine countermeasures, and port security. Key findings were that, since 9/11, overall port security has improved, although there has been little progress in countering the threat presented by M/UWIEDs. Further, vulnerabilities exist that terrorists who seek to commit an M/UWIED attack or campaign could misuse. The findings from this study contribute to positive social change by providing data to key stakeholders responsible for counterterrorism, mine warfare, and port security, thereby contributing to overall U.S. homeland security.
|
559 |
Gender and the Enactment of Suicide Bombings by Boko HaramGalehan, Jordan N 01 August 2019 (has links) (PDF)
The Boko Haram terror group has utilized more women as suicide bombers than any other group in history. While prior research has examined why this phenomenon is occurring, and what makes Boko Haram a unique terror group, the present study examines how these attacks are being perpetrated, or enacted, by the female bombers. Utilizing the Global Terrorism Database (GTD), which is the largest terrorism incident database available, the study examined the incidents of female suicide bombings perpetrated by Boko Haram. The open-sourced citations provided by the GTD were compiled and turned into a complementary qualitative dataset. Overall, there were 151 incidents of female suicide bombings by Boko Haram between 2014 and 2017, of which 102 were included in the final sample for the study. Results of content analysis indicate that there are similarities between the perpetration of suicide bombings by females and other acts of crime, violence, and terrorist acts committed by other women, but there are also distinct differences. The cultural and social constructs of the region create a unique situation for Boko Haram compared to other terrorist groups that have deployed the female suicide bombing tactic; however, these features also make it difficult to flesh out the overarching issues of coercion, victimization, and kidnapping that the group heavily relies on. Though the ways in which the suicide attacks are enacted can be examined, at this point, it is still unclear whether the young women and girls perpetrating the attacks are acting out of their own volition, high levels of coercion, or a blend of the two.
|
560 |
Justice and identity : psychological motives for terrorismKing, Michael, 1977- January 2008 (has links)
No description available.
|
Page generated in 0.0298 seconds