Search results

1 – 10 of 668
Expert briefing
Publication date: 23 January 2020

Revision of Ethiopia's controversial anti-terrorism law.

Details

DOI: 10.1108/OXAN-DB250205

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 February 2013

Alexandros Paraskevas

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The…

4414

Abstract

Purpose

Although the threat of terrorist attacks is not a new phenomenon for hotels, limited literature exists on measures that hotels can take to prevent them or limit their damage. The purpose of this paper is to propose a baseline strategy to address this threat.

Design/methodology/approach

Using the terrorist attack cycle and the security function models introduced in this paper, 19 hotel security experts, members of an international working group on terrorism, were tasked to reach consensus on a baseline anti‐terrorist strategy for a hotel. To reach this consensus, the study employed the Nominal Group Technique.

Findings

The study presents a six‐step baseline anti‐terrorism strategy and a series of measures and actions under each step. In the centre of this strategy lies the disruption of the terrorist attack cycle.

Research limitations/implications

There are limitations inherent to the Nominal Group Technique which may not allow the generalizability of the findings. However, every effort was made to ensure the reliability and validity of the study.

Practical implications

The study suggests a shift from physical protection alone to a more intelligence‐led approach. Counter‐surveillance, terrorist behavioral analysis, higher visibility of security measures, stronger relationships with local community leaders, collaborative relationships with emergency response agencies and strategic use of risk intelligence providers will have to take a higher place in the agendas of hotel security departments.

Originality/value

The paper presents, for the first time, two models that industry practitioners will find useful when designing security policies: the terrorist attack cycle and the security function model. Each component of the proposed strategy provides a starting point for the design of security strategies tailored on the security needs and budget of any hotel property.

Details

International Journal of Contemporary Hospitality Management, vol. 25 no. 1
Type: Research Article
ISSN: 0959-6119

Keywords

Expert briefing
Publication date: 17 July 2020

The legislation significantly increases the executive’s power to determine what constitutes terrorism. The government of the fledgling Bangsamoro Autonomous Region in Muslim…

Details

DOI: 10.1108/OXAN-DB253996

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 October 2004

Chi‐Jen Ching

Discusses Taiwan’s achievements in combating money laundering. Outlines the criminal justice system and the 1996 Money Laundering Control Act (MLCA(, which covers the seizure and…

Abstract

Discusses Taiwan’s achievements in combating money laundering. Outlines the criminal justice system and the 1996 Money Laundering Control Act (MLCA(, which covers the seizure and forfeiture of criminal proceeds and established a framework for Taiwan’s international cooperation in this area. Describes the work of the Ministry of Justice in drafting policy and overseeing investigations and prosecutions. Moves on to the 2002 Anti‐Terrorism Act and its punishments for terrorist activity, followed by the Anti‐Terrorism Action Group and the provisions of the MLCA for international cooperation.

Details

Journal of Money Laundering Control, vol. 7 no. 4
Type: Research Article
ISSN: 1368-5201

Keywords

Executive summary
Publication date: 17 August 2015

EGYPT: Anti-terrorism law will weaken new parliament

Details

DOI: 10.1108/OXAN-ES202708

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 28 July 2023

MOROCCO: Anti-terrorism measures will increase

Details

DOI: 10.1108/OXAN-ES280875

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 15 March 2021

SRI LANKA: Anti-terrorism move will stoke debate

Details

DOI: 10.1108/OXAN-ES260179

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 16 May 2022

MALI: G5 Sahel withdrawal will hamper anti-terrorism

Details

DOI: 10.1108/OXAN-ES270233

ISSN: 2633-304X

Keywords

Geographic
Topical
Executive summary
Publication date: 16 March 2016

BELGIUM: Anti-terrorism raid to revive fears

Details

DOI: 10.1108/OXAN-ES210028

ISSN: 2633-304X

Keywords

Geographic
Topical
Open Access
Article
Publication date: 30 June 2010

Won-Mog Choi

Radio frequency identification (RFID) provides a useful tool for the prescreening or detection of goods and containers moving across the border and for controlling the trade of…

Abstract

Radio frequency identification (RFID) provides a useful tool for the prescreening or detection of goods and containers moving across the border and for controlling the trade of illicit materials and preventing or mitigating the effects of terrorism. Although anti-terrorism measures are important in today’s dangerous world, RFID tools, if misused, may violate the WTO trade rules. Whenever goods or container control measures using RFID are proposed, their contents, objectives, and rationale must be published, and WTO members must be notified through the WTO Secretariat and allowed to make comments. WTO members should not take such measures that are designed or applied in a discriminatory manner and those measures must be adopted only under necessary situations and to the extent necessary. These measures must reduce the incidence and complexity of import and export formalities, and there should not be substantial penalties for minor breaches of the requirements under the measures. If the measures require country-of-origin information in RFID tags, they must apply in the same way to like products, and they must not cause unnecessary inconveniences or unreasonable cost. If the measures deal with containers in international transit, they must be reasonable, consider the conditions of the traffic, and guarantee transit through the most convenient routes for international transit.

A container control measure designed to restrict the flow of fissionable materials or their derivative materials, traffic in arms, ammunition, and implements of war, or traffic in military supply goods and materials may be justified, even if it violates some of the GATT rules. In addition, a measure established in time of war or other emergency in international relations or based on the United Nations Charter and designed to maintain international peace and security can also be justified. As a last resort, WTO members may request a waiver from GATT and TBT Agreement obligations for container control measures that include RFID.

Superpowers must be careful not to use RFID to practice power politics and create regulations to deal with national security and anti-terrorism issues that do not conform to international law. The key question is how to maintain a balance between the two inalienable values of free trade and national security in this era of globalization, harmonization, and terrorism .

Details

Journal of International Logistics and Trade, vol. 8 no. 1
Type: Research Article
ISSN: 1738-2122

1 – 10 of 668