Search results

1 – 10 of 24
Content available
Book part
Publication date: 9 September 2020

Abstract

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Open Access
Article
Publication date: 6 April 2021

Ahmed Elbassoussy

The purpose of this study is to identify various Russian manifestations on expanding its role in sub-Saharan Africa, as well as shed light on the major obstacles it may face.

7321

Abstract

Purpose

The purpose of this study is to identify various Russian manifestations on expanding its role in sub-Saharan Africa, as well as shed light on the major obstacles it may face.

Design/methodology/approach

The research paper uses the “national role theory” to analyze the factors that helped in the growing Russian role in sub-Saharan African countries. It assumes that every state seeks to play a particular role, and that role is reflected in its foreign policy, which is known as “role performance,” and this role originates from several sources. On the other hand, this role faces various obstacles, mostly from the external environment, especially the international system’s structure, global values and international obligations, known as “role prescriptions.”

Findings

Despite Russia’s ability to use all its capacities in expanding its role in the African continent, the degree of its influence varied from one field to another. While it was very influential in the military, security, political, diplomatic and technical fields, it is relatively less in the economic and counter-terrorism areas.

Research limitations/implications

This study paves the way for further researches related to international competition over sub-Saharan Africa, whether economically, militarily or politically, in addition to other studies related to potential cooperation opportunities, especially in security and combating terrorism.

Originality/value

This research’s significance stems from using the existing theoretical structure represented in national role theory in analyzing the Russian orientation toward sub-Saharan Africa, giving more attention to the latest developments in Russian strategy, as well as clarifying the major obstacles that may hinder its activities.

Details

Journal of Humanities and Applied Social Sciences, vol. 4 no. 3
Type: Research Article
ISSN:

Keywords

Open Access
Article
Publication date: 2 November 2020

Mohamed O. Elkhosht, Mahmoud Mahmoud, Ahmed Zayed, Mo’taz S. Abdallah, Mohamed S. A. Kharbush and Dalal Mahmoud

This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of…

1526

Abstract

Purpose

This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of better understanding of this relationship on Egypt’s borders more than its center. Achieving development and stability leads to creating a preventive environment to extremist thoughts existence and spread, in addition to preventing its transformation into terrorism.

Design/methodology/approach

The study depends on an analytical methodology to examine the validity of the research hypothesis through two basic steps. The first step depends on describing the geographical, demographical, economic, social, political and security aspects of North Sinai. The second step is a prospective approach to build a strategy that helps in achieving development and accordingly a comprehensive confront for the opportunities of extremist thought spreading in North Sinai.

Findings

The study concludes that Egypt is well aware of the dimensions of encountering extremist thoughts and has adopted a comprehensive approach in achieving this. It has already started the paces of this confrontation in general, with some specificity in North Sinai Governorate that observed lately increased activities by extremists and terrorist groups. The proposed strategy is a set of policies that can help the country achieve its goals against extremism and terrorism.

Research limitations/implications

The study covers a time frame that starts from 2014, which is considered the beginning of a new phase for the Egyptian state. The study relies on the field of strategic studies and it focuses on North Sinai Governorate.

Originality/value

The study has a scientific importance because it presents a proposal for a comprehensive strategy to encounter extremist thoughts, which adds value to the literature of the study of extremism. The current study makes its contributions in some directions, such as reviewing the contents of this extremist thought or the juristic comment on it, the impacts of the spread of extremist thoughts, the role of the official media in disseminating extremist thoughts or standing up to it. In terms of application, the study presents a proposal with many policies in various fields to counter extremist ideology. These proposals are implementable in North Sinai Governorate as well as other frontier governorates.

Details

Journal of Humanities and Applied Social Sciences, vol. 3 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Content available
Book part
Publication date: 13 May 2019

Abstract

Details

The Impact of Global Terrorism on Economic and Political Development
Type: Book
ISBN: 978-1-78769-919-9

Open Access
Article
Publication date: 2 January 2020

Zaid Odeh Ebniya

The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman…

1729

Abstract

Purpose

The purpose of this study is to know the effect of religious values that the Jordan Political discipline adopted and were mentioned in the Jordan political discourses (Amman Message 2005, discourse of King Abdullah II in the European Parliament 2008 and his discourse in United Nations 2015) on the public opinion of the university students, especially their attitudes toward terrorism and extremism. Defending Islam is the responsibility of the Jordan political leadership according to Hashemite legacy and promoting Islamic values that rejected terrorism and extremism to Jordanian youth, especially tolerance and moderation values, to counter defamations and claims against Islam and correct its image in the West.

Design/methodology/approach

A political discourse analysis approach was used by analyzing the Amman Message and identifying the most important religious values contained therein. Also, a quantitative research method was used in this study. The study population consisted of university students, particularly Jordanian University students because being one of the high-bred Jordanian universities, it is characterized with gender, age, regional affiliation and family income diversities. This study depends on a purposive sample containing 350 students (175 males and 175 females). The survey was conducted in the academic year (2018-2019). A questionnaire that was reviewed by three jurors was used in data collection.

Findings

The results of the analysis of the political discourse showed that the values of tolerance and moderation are among the most valued in the Amman Message, where they were frequently repeated. Also, findings have shown that the religious values adopted by the Jordanian political system mentioned in the political discourses had an impact on public opinion of university students on terrorism and extremism causes in a large percent. When gender differed (males and females), the impact ratio of the public opinion for males was higher than that for females. When the age group differed (18-22 and 23-30 years), the effect ratio with the old age group was higher than the effect ratio for the students with the youngest age group. When regional affiliation differed (Jordanian and Jordanian of Palestinian origin), the impact ratio of the public opinion for Jordanian students was higher than that for Jordanian students of Palestinian origin. When regional family income differed (500 dinars and less, more than 500 dinars), the impact ratio of the public opinion for students with family income more than 500 dinars was higher than that for students with family income 500 dinars and less.

Originality/value

This study represents an approach to recognize the effect of religious values that were adopted by the Jordanian political system mentioned in the political discourses on public opinion of university students on terrorism and extremism causes, considering that university students represent the influential youth group in the Jordanian society.

Details

Review of Economics and Political Science, vol. 9 no. 1
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Content available
Book part
Publication date: 6 September 2021

Abstract

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

1 – 10 of 24