Search results
1 – 10 of 24
The purpose of this study is to identify various Russian manifestations on expanding its role in sub-Saharan Africa, as well as shed light on the major obstacles it may face.
Abstract
Purpose
The purpose of this study is to identify various Russian manifestations on expanding its role in sub-Saharan Africa, as well as shed light on the major obstacles it may face.
Design/methodology/approach
The research paper uses the “national role theory” to analyze the factors that helped in the growing Russian role in sub-Saharan African countries. It assumes that every state seeks to play a particular role, and that role is reflected in its foreign policy, which is known as “role performance,” and this role originates from several sources. On the other hand, this role faces various obstacles, mostly from the external environment, especially the international system’s structure, global values and international obligations, known as “role prescriptions.”
Findings
Despite Russia’s ability to use all its capacities in expanding its role in the African continent, the degree of its influence varied from one field to another. While it was very influential in the military, security, political, diplomatic and technical fields, it is relatively less in the economic and counter-terrorism areas.
Research limitations/implications
This study paves the way for further researches related to international competition over sub-Saharan Africa, whether economically, militarily or politically, in addition to other studies related to potential cooperation opportunities, especially in security and combating terrorism.
Originality/value
This research’s significance stems from using the existing theoretical structure represented in national role theory in analyzing the Russian orientation toward sub-Saharan Africa, giving more attention to the latest developments in Russian strategy, as well as clarifying the major obstacles that may hinder its activities.
Details
Keywords
Mohamed O. Elkhosht, Mahmoud Mahmoud, Ahmed Zayed, Mo’taz S. Abdallah, Mohamed S. A. Kharbush and Dalal Mahmoud
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of…
Abstract
Purpose
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of better understanding of this relationship on Egypt’s borders more than its center. Achieving development and stability leads to creating a preventive environment to extremist thoughts existence and spread, in addition to preventing its transformation into terrorism.
Design/methodology/approach
The study depends on an analytical methodology to examine the validity of the research hypothesis through two basic steps. The first step depends on describing the geographical, demographical, economic, social, political and security aspects of North Sinai. The second step is a prospective approach to build a strategy that helps in achieving development and accordingly a comprehensive confront for the opportunities of extremist thought spreading in North Sinai.
Findings
The study concludes that Egypt is well aware of the dimensions of encountering extremist thoughts and has adopted a comprehensive approach in achieving this. It has already started the paces of this confrontation in general, with some specificity in North Sinai Governorate that observed lately increased activities by extremists and terrorist groups. The proposed strategy is a set of policies that can help the country achieve its goals against extremism and terrorism.
Research limitations/implications
The study covers a time frame that starts from 2014, which is considered the beginning of a new phase for the Egyptian state. The study relies on the field of strategic studies and it focuses on North Sinai Governorate.
Originality/value
The study has a scientific importance because it presents a proposal for a comprehensive strategy to encounter extremist thoughts, which adds value to the literature of the study of extremism. The current study makes its contributions in some directions, such as reviewing the contents of this extremist thought or the juristic comment on it, the impacts of the spread of extremist thoughts, the role of the official media in disseminating extremist thoughts or standing up to it. In terms of application, the study presents a proposal with many policies in various fields to counter extremist ideology. These proposals are implementable in North Sinai Governorate as well as other frontier governorates.
Details
Keywords
The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman…
Abstract
Purpose
The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman Message 2005, discourse of King Abdullah II in the European Parliament 2008 and his discourse in United Nations 2015) on the public opinion of the university students, especially their attitudes toward terrorism and extremism. Defending Islam is the responsibility of the Jordan political leadership according to Hashemite legacy and promoting Islamic values that rejected terrorism and extremism to Jordanian youth, especially tolerance and moderation values, to counter defamations and claims against Islam and correct its image in the West.
Design/methodology/approach
A political discourse analysis approach was used by analyzing the Amman Message and identifying the most important religious values contained therein. Also, a quantitative research method was used in this study. The study population consisted of university students, particularly Jordanian University students because being one of the high-bred Jordanian universities, it is characterized with gender, age, regional affiliation and family income diversities. This study depends on a purposive sample containing 350 students (175 males and 175 females). The survey was conducted in the academic year (2018-2019). A questionnaire that was reviewed by three jurors was used in data collection.
Findings
The results of the analysis of the political discourse showed that the values of tolerance and moderation are among the most valued in the Amman Message, where they were frequently repeated. Also, findings have shown that the religious values adopted by the Jordanian political system mentioned in the political discourses had an impact on public opinion of university students on terrorism and extremism causes in a large percent. When gender differed (males and females), the impact ratio of the public opinion for males was higher than that for females. When the age group differed (18-22 and 23-30 years), the effect ratio with the old age group was higher than the effect ratio for the students with the youngest age group. When regional affiliation differed (Jordanian and Jordanian of Palestinian origin), the impact ratio of the public opinion for Jordanian students was higher than that for Jordanian students of Palestinian origin. When regional family income differed (500 dinars and less, more than 500 dinars), the impact ratio of the public opinion for students with family income more than 500 dinars was higher than that for students with family income 500 dinars and less.
Originality/value
This study represents an approach to recognize the effect of religious values that were adopted by the Jordanian political system mentioned in the political discourses on public opinion of university students on terrorism and extremism causes, considering that university students represent the influential youth group in the Jordanian society.
Details
Keywords
Alison J. Marganski and Lisa A. Melander
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…
Abstract
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
David J. Harper, Darren Ellis and Ian Tucker
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…
Abstract
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.
Details
Keywords