Search results

1 – 10 of 54
Article
Publication date: 28 October 2019

Jaideep Roy and Prabal Roy Chowdhury

In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible…

Abstract

Purpose

In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible contract designed by the target nation that involves joint counter-terror tasks with costly participation by each country. The counter-terror operations are however subject to ex post moral hazard, so that to incentivise counter-terror, the rich country supplies developmental aid. Development aid also helps avoid unrest arising from counter-terror activities in the target nation. However, aid itself can be diverted to non-developmental projects, generating a novel interlinked moral hazard problem spanning both tasks and rewards.

Design/methodology/approach

The authors use a dynamic model where the aid giving countries and aid receiving countries behave strategically. Then they solve for the sub game perfect Nash equilibrium of this game.

Findings

The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. The authors then prove that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. The authors also discuss other problems faced by developing nations where this model can be readily adopted and the results can endorse appealing policy implications.

Originality/value

The authors characterise the optimal contract, showing that the dynamic structure of counter-terror resembles the shock-and-awe discussed by military strategists. It is proved that it is not necessarily the case that a more hawkish (resp. altruistic) donor is less pro-development (resp. softer on terror). In addition, the authors show that it may be easier to contract for higher counter-terror inputs when the recipient is more sympathetic to terrorists. Other problems faced by developing nations are also discussed where this model can be readily adopted, and the results can endorse appealing policy implications. These results have important policy implications, in particular in today’s world.

Details

Indian Growth and Development Review, vol. 13 no. 2
Type: Research Article
ISSN: 1753-8254

Keywords

Article
Publication date: 8 August 2018

Viktoria Gallova, Marek Palasinski, Neil Shortland, Michael Humann and Lorraine Bowman Grieve

The purpose of this paper is to determine the potential predictors of anxiety about digital security, terrorist threats and support for high-tech counter measures.

Abstract

Purpose

The purpose of this paper is to determine the potential predictors of anxiety about digital security, terrorist threats and support for high-tech counter measures.

Design/methodology/approach

In Study 1, 195 participants indicated their anxiety about digital security systems, data protection and social networking sites. In Study 2, 107 participants indicated their anxiety about domestic terrorism, international terrorism and extremist groups. In Study 3, 261 participants indicated their support for high-tech counter-terrorism measures.

Findings

Study 1 suggests that whereas anxiety about digital security systems, data protection and social networking sites was positively predicted by right-wing authoritarianism, anxiety about social networking was also negatively predicted by time spent online. Study 2 shows that time spent online was a negative predictor of anxiety about domestic terrorism. Study 3 indicates that the strongest positive predictor of support for all the measures was right-wing authoritarianism, followed by national identity.

Research limitations/implications

The findings show the relevance of terror management theory to digital security and counter-terrorism.

Practical implications

It appears that right-wing authoritarianism and national identity may serve as mechanisms for people to subjectively counter the presented threats. This notion may inform relevant policy and practice aimed at making communities safer and potentially helps introduce counter-terror measures with less public backlash.

Social implications

When designing counter-terror measures, policy makers should consider compound national identities (e.g. Catalan or Basque people).

Originality/value

The paper makes contribution to under-explored areas of terrorism anxiety and support for counter-terror measures.

Details

Safer Communities, vol. 17 no. 3
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 8 February 2013

Sefer Yilmaz, Huseyin Ozgen and Recai Akyel

The main purpose of this study is to develop an understanding of how managerial methods can be used during the change process to direct employees' attitudes positively towards…

2313

Abstract

Purpose

The main purpose of this study is to develop an understanding of how managerial methods can be used during the change process to direct employees' attitudes positively towards change. This study also aims to provide considerable implications for the homeland security managers suitable for the applications on the area of homeland security. Paying requisite attention to the attitudes of employees towards change and careful selection of change management methods is considered critical for determining the ultimate success.

Design/methodology/approach

The data used in this study were obtained by the questionnaire survey method, analyzed by using a statistics software program, and main findings of the study were evaluated. The last section of this study has a discussion and a conclusion which includes specific evaluations and recommendations regarding the homeland security organizations and their practices in Turkey. Due to the large data set available, only the main findings are presented in this paper.

Findings

Findings suggest that the methods used, such as informing the employees about what is going on regarding change, consulting them and maintaining participation of the employees to the change process, have a positive impact on the attitudes of security managers towards change. This means that if an organization complies with the advice of the change literature asserting that the employees should be informed of, consulted and participate in the change from the outset of the process, the employees would probably commit themselves to change rather than resisting it.

Originality/value

The topic of this study is believed to be of vital importance in the area of homeland security organizations of Turkey and other countries in the context of change management for the sake of success in change initiatives. It is hoped that this study will make contributions to the existent literature in that it combines two disciplines, namely, change management and homeland security management, in just one case study. This combination would add considerable insights into the success and/or failure of the change initiatives launched in the organizations of homeland security generally and in Turkey specifically.

Details

Journal of Organizational Change Management, vol. 26 no. 1
Type: Research Article
ISSN: 0953-4814

Keywords

Book part
Publication date: 4 July 2019

Ifeoma Ajunwa and Daniel Greene

This chapter lays out a research agenda in the sociology of work for a type of data and organizational intermediary: work platforms. As an example, the authors employ a case study…

Abstract

This chapter lays out a research agenda in the sociology of work for a type of data and organizational intermediary: work platforms. As an example, the authors employ a case study of the adoption of automated hiring platforms (AHPs) in which the authors distinguish between promises and existing practices. The authors draw on two main methods to do so: critical discourse analysis and affordance critique. The authors collected and examined a mix of trade, popular press, and corporate archives; 135 texts in total. The analysis reveals that work platforms offer five core affordances to management: (1) structured data fields optimized for capture and portability within organizations; (2) increased legibility of activity qua data captured inside and outside the workplace; (3) information asymmetry between labor and management; (4) an “ecosystem” design that supports the development of limited-use applications for specific domains; and (5) the standardization of managerial techniques between workplaces. These combine to create a managerial frame for workers as fungible human capital, available on demand and easily ported between job tasks and organizations. While outlining the origin of platform studies within media and communication studies, the authors demonstrate the specific tools the sociology of work brings to the study of platforms within the workplace. The authors conclude by suggesting avenues for future sociological research not only on hiring platforms, but also on other work platforms such as those supporting automated scheduling and customer relationship management.

Details

Work and Labor in the Digital Age
Type: Book
ISBN: 978-1-78973-585-7

Keywords

Article
Publication date: 18 October 2019

Hamid Mohtadi and Bryan Weber

The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even…

Abstract

Purpose

The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even radioactive and nuclear attacks (commonly abbreviated as CBRN) which are potentially much more dangerous. The authors make three contributions toward a better understanding of this risk and how it responds to counterterrorism measures.

Design/methodology/approach

The authors develop a game that captures the terrorists’ potential strategic substitution between conventional and CBRN-type attacks; the authors calibrate the parameters of the game to real data using a novel calibration method and a partially unique dataset; they estimate the heavy-tailed distribution of attack severity and thus the probability of a successful attack, the underlying effort to launch an attack and the intrinsic difficulty of launching different types of attacks.

Findings

The authors find that in equilibrium, CBRN attacks, though less likely and more difficult to execute, are more deadly. In the end, the trade-off between, on one hand, the greater difficulty of carrying out a CBRN attack, and on the other, the greater deadliness of such an attack, points to a level of optimal counterterrorism spending by governments that weighs toward defending against CBRN attacks. The authors discuss these results and compare them with the actual level of counterterrorism spending by the US Government.

Originality/value

The framework of the game allows for substitution between the conventional and CBRN weapon types. These aspects of this paper, together with the unique calibration methodology, and the use of some unique terrorism data for the first time, are what distinguish this work from similar game theoretic papers in this area.

Details

Indian Growth and Development Review, vol. 13 no. 2
Type: Research Article
ISSN: 1753-8254

Keywords

Book part
Publication date: 3 March 2016

Dina Al Raffie and Matthias P. Huehn

The chapter tries to highlight the critical importance of values to leadership, and argues that the research design of the ‘social scientific’ mainstream is incommensurable with…

Abstract

The chapter tries to highlight the critical importance of values to leadership, and argues that the research design of the ‘social scientific’ mainstream is incommensurable with the language of the scientific discipline that studies values: moral philosophy. The chapter shows that (a) through goals and actions, ethics is a central aspect of leadership and (b) that ethics cannot be reinterpreted as being ‘value-neutral’. Therefore, ‘effective’ leadership must always be connected to a specific value set. After arguing that leadership cannot be meaningfully looked at without reference to virtue ethics, two case studies are used to demonstrate the relationship between the two. By looking at two prominent terrorist leaders, the chapter shows how values are at the heart of their visions and actions. There are at least two practical implications: the study of leadership, and leadership education, must be reconnected with moral philosophy. The chapter connects three hitherto unconnected topics: leadership, (virtue) ethics and terrorism, presenting new insights into especially leadership.

Details

Leadership Lessons from Compelling Contexts
Type: Book
ISBN: 978-1-78560-942-8

Keywords

Abstract

Details

Police Occupational Culture
Type: Book
ISBN: 978-0-85724-055-2

Book part
Publication date: 2 August 2023

Itoiz Rodrigo Jusué

Historically, counter-terrorism's attitude towards women has been complicated, partly because both counter-terrorism and terrorism were for many years considered almost…

Abstract

Historically, counter-terrorism's attitude towards women has been complicated, partly because both counter-terrorism and terrorism were for many years considered almost exclusively a male business. This approach has also been reflected in the media's sensationalised representation of women involved in political violence. This chapter explores how women's participation in non-state political violence is still largely explained through traditional conservative notions of sexual difference that characterise women as irrational and highly influenceable, eliminating the possibility of any informed discussion. Focusing on the British case, the chapter shows how the actions of female militants are still bound to gendered narratives and limited to specific frames that generally portray violent women as highly sexualised and pathologised. Depictions of female terrorists and ‘radicalised’ women are based on stereotypes that reinforce the image of women as weak, easily influenced, naïve, driven by romantic emotions, deceitful and in constant need of protection and supervision. From an intersectional perspective, the chapter also explores the orientalist imaginaries of Muslim women who are seen as victims and as individuals lacking empowerment and agency. The discussion highlights ultimately that explanations of women's violence must go beyond myths that explain women's involvement in political violence via a wide range of personal and emotional factors, to examine political motivations and consideration of the complexity of their decisions, and the wider context.

Details

The Emerald International Handbook of Feminist Perspectives on Women’s Acts of Violence
Type: Book
ISBN: 978-1-80382-255-6

Keywords

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Article
Publication date: 22 December 2022

Nasir Sultan, Norazida Mohamed and Dildar Hussain

Tax amnesty (TA) schemes are typical in developing countries. Governments’ claims and suppositions are continually heightened; however, this may differ in actuality. This study…

Abstract

Purpose

Tax amnesty (TA) schemes are typical in developing countries. Governments’ claims and suppositions are continually heightened; however, this may differ in actuality. This study aims to present an overview of the effectiveness of TA schemes and the problems they raise in implementing anti-money laundering regulations.

Design/methodology/approach

This study used a qualitative research design. Content analysis was used to analyse research articles, reports, legal documents and news articles.

Findings

Every amnesty offered in Pakistan from 1956 to 2018 failed to meet government expectations. Instead, the continuity resulted in an irrepressible black economy. The black economy’s uncontrollability undermines tax collection and hinders a robust anti-money laundering regime. Significantly, tax holidays with discrepant legislation strengthen evaders, plunderers and launderers. These policies severely impede the implementation of anti-money laundering policies in the financial institutions of Pakistan. Additionally, Pakistan's geopolitical location, circumstance and war against terror cannot afford any policy that provides monetary relaxation to offenders.

Practical implications

There is no concrete evidence to support long-term economic progress through the implementation of amnesty schemes as a revenue collection policy. This study evaluates previous studies and findings to understand the effect of tax amnesties on the financial industry of Pakistan. The findings have practical implications for tax collection authorities, policymakers and international financial bodies.

Originality/value

Previous studies have discussed the advantages and disadvantages of Pakistan’s regular tax amnesties. However, this study discusses the implementation of TA schemes concerning anti-money laundering regulations and customer due diligence by financial institutes and provides suggestions to minimise its negative implications.

Details

Qualitative Research in Financial Markets, vol. 15 no. 3
Type: Research Article
ISSN: 1755-4179

Keywords

1 – 10 of 54