Search results

1 – 10 of 151
Article
Publication date: 8 July 2019

Xiaoyue Liu, Xiaolu Wang, Li Zhang and Qinghua Zeng

With respect to multiple attribute group decision-making (MAGDM) in which the assessment values of alternatives are denoted by normal discrete fuzzy variables (NDFVs) and the…

Abstract

Purpose

With respect to multiple attribute group decision-making (MAGDM) in which the assessment values of alternatives are denoted by normal discrete fuzzy variables (NDFVs) and the weight information of attributes is incompletely known, this paper aims to develop a novel fuzzy stochastic MAGDM method based on credibility theory and fuzzy stochastic dominance, and then applies the proposed method for selecting the most desirable investment alternative under uncertain environment.

Design/methodology/approach

First, by aggregating the membership degrees of an alternative to a scale provided by all decision-makers into a triangular fuzzy number, the credibility degree and expect the value of a triangular fuzzy number are calculated to construct the group fuzzy stochastic decision matrix. Second, based on determining the credibility distribution functions of NDFVs, the fuzzy stochastic dominance relations between alternatives on each attribute are obtained and the fuzzy stochastic dominance degree matrices are constructed by calculating the dominance degrees that one alternative dominates another on each attribute. Subsequently, calculating the overall fuzzy stochastic dominance degrees of an alternative on each attribute, a single objective non-linear optimization model is established to determine the weights of attributes by maximizing the relative closeness coefficients of all alternatives to positive ideal solution. If the information about attribute weights is completely unknown, the idea of maximizing deviation is used to determine the weights of attributes. Finally, the ranking order of alternatives is determined according to the descending order of corresponding relative closeness coefficients and the best alternative is determined.

Findings

This paper proposes a novel fuzzy stochastic MAGDM method based on credibility theory and fuzzy stochastic dominance, and a case study of investment alternative selection problem is provided to illustrate the applicability and sensitivity of the proposed method and its effectiveness is demonstrated by comparison analysis with the proposed method with the existing fuzzy stochastic MAGDM method. The result shows that the proposed method is useful to solve the MAGDM problems in which the assessment values of alternatives are denoted by NDFVs and the weight information of attributes is incompletely known.

Originality/value

The contributions of this paper are that to describe the dominance relations between fuzzy variables reasonably and quantitatively, the fuzzy stochastic dominance relations between any two fuzzy variables are redefined and the concept of fuzzy stochastic dominance degree is proposed to measure the dominance degree that one fuzzy variable dominate another; Based on credibility theory and fuzzy stochastic dominance, a novel fuzzy stochastic MAGDM method is proposed to solve MAGDM problems in which the assessment values of alternatives are denoted by NDFVs and the weight information of attributes is incompletely known. The proposed method has a clear logic, which not only can enrich and develop the theories and methods of MAGDM but also provides decision-makers a novel method for solving fuzzy stochastic MAGDM problems.

Article
Publication date: 16 November 2012

D. Elaine Pressman and John Flockton

The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach…

3302

Abstract

Purpose

The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach proposed is referred to as the VERA 2 or violent extremism risk assessment protocol (Consultative Version 2).

Design/methodology/approach

A review of the knowledge base relating to risk assessment and risk assessment methodology was undertaken with a focus on relevance to individual terrorists and violent extremists. The need for a specific approach for the risk assessment of terrorists that differs from approaches used for ordinary violent criminals was identified. A model that could be used for the risk assessment of terrorists was identified with pertinent risk indicators. This was structured into a protocol referred to as the VERA (Consultative Version 2). The approach is intended to be applied to different types of violent extremists, terrorists and unlawful violent offenders motivated by religious, political or social ideologies.

Findings

First, risk assessments of adjudicated terrorists and violent extremists should be undertaken with risk indicators that are relevant to ideological motivated violence. Indicators used for ordinary common violence differ in substantive ways from those relevant to terrorists and therefore may have questionable relevance for the assessment of risk in terrorists. Second, it is possible to construct an evidence‐based risk assessment approach for the range of violent extremists and terrorists using a structured professional judgment approach with pertinent risk indicators. The VERA 2 is an example of this type of risk assessment protocol for terrorists and unlawful violent extremists.

Research limitations/implications

Risk assessment tools that have been developed for ordinary violent criminals and members of organised criminal gangs should be used with caution with terrorists, violent extremists and other perpetrators of ideologically motivated unlawful violence. Specific risk assessment approaches for terrorists with relevant indicators should be used. At this time, terrorist oriented approaches such as the VERA 2 are to be considered consultative and used as an add‐on to other established approaches.

Originality/value

There are few transparent, structured risk assessment approaches that use indicators specifically relevant to violent political extremists and terrorists. One new approach, the VERA 2 is outlined in the paper using risk indicators that differ in substantive ways from those used for other ordinary violent criminals.

Article
Publication date: 2 October 2017

Michael Tierney

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural…

642

Abstract

Purpose

In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural characteristics and activities, rather than their extremist ideologies. The study was said to have significant impact on intelligence analysis in the field of counterterrorism. The purpose of this paper is to apply Gill et al.’s findings to financial intelligence investigations, to assist investigators with the detection and prevention of lone-actor terrorist financing.

Design/methodology/approach

This article provides an overview of the key findings provided by Gill et al. It then discusses the indicators of lone-actor terrorism in the context of financial intelligence investigations, and sets out methods to improve financial intelligence investigations to better identify and stop lone-actor terrorism in the future.

Findings

By applying traditional financial intelligence techniques, which focus on assessing an individual’s activity and behaviour, with open-source intelligence gathering, financial intelligence investigators will be better equipped to identify lone-actor terrorism and its financing moving forward.

Originality/value

This article will be of value to investigators specializing in terrorism and financial crime, as it will assist them in the identification of a proliferating security threat, the lone-actor terrorist. While the article relies on the findings provided by Gill et al., it takes a new approach by applying those findings specifically to the financial intelligence sector, to improve investigations related to terrorism.

Details

Journal of Financial Crime, vol. 24 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 October 2004

Andrew Calabrese

Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued…

2129

Abstract

Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued relevance, and providing a basis for considering its uses as an information‐age strategy of radical activism. The novelty of the forms of speech and action possible in cyberspace make it difficult to compare these new methods of expression easily. Whether in cyberspace or the real world, civil disobedience has historically specific connotations that should be sustained because the concept has special relevance to the political theory and practice of constitutional democracy. Civil disobedience is a unique means of political expression that is used to provoke democratic deliberation about important questions of just law and policy. Among the significant problems that new forms of radical political practice in cyberspace introduce is that their practitioners and advocates neglect the need to distinguish between violence and nonviolence. Examines that problem and others that are central to considering theoretical and political implications of radical activism in general, and civil disobedience in particular, in cyberspace.

Details

info, vol. 6 no. 5
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 18 January 2011

Karen Okamoto and Marta Bladek

Prior to 9/11, terrorism was subject to political, scholarly, and media debates. A large body of literature on the topic reflected researchers' long‐standing interest in the…

2277

Abstract

Purpose

Prior to 9/11, terrorism was subject to political, scholarly, and media debates. A large body of literature on the topic reflected researchers' long‐standing interest in the topic. In the near decade since 9/11, terrorism and its threat have only gained urgency. This paper aims to provide a selected bibliography of resources, in print and electronic format, that focus on terrorism. Public and academic libraries have been providing access to terrorism‐related resources, but no thematic bibliography has been published in professional journals since 2001. This guide aims to aid librarians in making decisions about developing and maintaining collections on the topic.

Design/methodology/approach

The authors consulted a variety of sources, including the Library of Congress catalog, WorldCat, Bowker's Global Books in Print database, book reviews in Choice, Booklist, and in journals within terrorism studies. As John Jay College of Criminal Justice is home to The Center on Terrorism and the college offers an MA Certificate Program in Terrorism Studies, the authors also consulted the college library collection that supports these scholarly activities on terrorism at the college.

Practical implications

Because of the volume of terrorism‐related scholarship and the number of available resources on the topic, this bibliography does not purport to be complete.

Findings

Included in this guide are print and electronic encyclopedias, books, periodicals, databases, and websites covering terrorism.

Originality/value

This guide aims to assist students, faculty, and the general public in navigating the vast array of terrorism‐related resources. Focusing on research conducted and published since 2001, it is also intended as a guide for public and academic librarians who develop, maintain, or evaluate a collection on the topic.

Details

Collection Building, vol. 30 no. 1
Type: Research Article
ISSN: 0160-4953

Keywords

Article
Publication date: 3 April 2017

Ihab Hanna Sawalha

The purpose of this paper is threefold: identifying the root causes and other causal factors of terrorism, exploring the recent shifts in terrorist activity, and proposing a…

1640

Abstract

Purpose

The purpose of this paper is threefold: identifying the root causes and other causal factors of terrorism, exploring the recent shifts in terrorist activity, and proposing a context-centred framework for deterring terrorism risk.

Design/methodology/approach

The first part of this research is based on extensive up-to-date observations made by the author and extracted from real-life settings and social interactions. The second part is based on a survey questionnaire reflecting public views on terrorism and related issues.

Findings

The risk of terrorism risk is increasingly becoming a major concern of all societies including Jordanian. The results have shown that terrorism is context related and that there are several and different root causes for this phenomenon. Many other causal factors have the potential to increase the impact or probability of terrorism risk in Jordan. The existing framework(s) for deterring terrorism risk in Jordan is not adequate and need to be reformed extensively.

Practical implications

This study provides insight to the root causes of the potential terrorist activity in Jordan, as well as other causal factors. It is expected to establish a foundation for policy-makers and decision-makers to start considering the causes of social unrest and subsequently develop appropriate frameworks for mitigating terrorism risk.

Originality/value

This study is made in a time of unprecedented political instability and terrorist activity in the Middle East and the Arab World. It reflects genuine observations and public opinions, thus providing authentic findings and better understanding of the concerns of the society. Most importantly, the study proposes context-related framework for counteracting terrorism activity and future evolution of this phenomenon in the Middle East, in general, and Jordan, in particular.

Details

Disaster Prevention and Management: An International Journal, vol. 26 no. 2
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 27 June 2008

Krisana Kitiyadisai

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence…

2038

Abstract

Purpose

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.

Design/methodology/approach

The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”

Findings

The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.

Research limitations/implications

The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.

Originality/value

The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 16 April 2018

Valbona Zeneli, Michael R. Czinkota and Gary Knight

The purpose of this paper is to research the relationship between terrorism and multinational enterprises (MNEs), focusing on operational costs, marketing planning, supply chain…

1498

Abstract

Purpose

The purpose of this paper is to research the relationship between terrorism and multinational enterprises (MNEs), focusing on operational costs, marketing planning, supply chain management, and distribution activities. Terrorism is a growing threat to internationally active firms, but there has been no empirical research to address the distinctive challenges that terrorism poses for the international marketing activities of firms.

Design/methodology/approach

The paper opted for an exploratory investigation, following a two-phase research design. In the first phase it was based on qualitative interviews with internationally active firms. In the second phase, an online survey of a large sample of international firms based in the USA was performed. All measures were developed specifically for the study.

Findings

The paper provides empirical insights about how terrorism affects MNEs, especially those operating in emerging markets. It suggests that terrorism accounts for significant costs in the international marketing budget of MNEs, as well as in planning, and the design of supply chains and distribution channels. Findings also reveal that firms with significant resources and international experience appear to cope better with terrorism’s effects.

Research limitations/implications

Given the early stage of empirical research on terrorism and international marketing, this study was necessarily exploratory.

Practical implications

The paper includes implications and suggestions for multinational companies to increase the security of their businesses through the development of corporate preparedness.

Social implications

Terrorism represents not only an organizational crisis at the level of a firm, but it affects the whole society.

Originality/value

This paper fulfills an identified need to study the relationship between the growing threat of terrorism and international business.

Details

International Journal of Emerging Markets, vol. 13 no. 2
Type: Research Article
ISSN: 1746-8809

Keywords

Article
Publication date: 19 August 2021

Munir Ahmad Zia, Rana Zamin Abbas and Noman Arshed

Pakistan is facing the momentous hazard of money laundering and a substantial risk of terror financing, which are seriously threatening its socioeconomic well-being. The purpose…

1149

Abstract

Purpose

Pakistan is facing the momentous hazard of money laundering and a substantial risk of terror financing, which are seriously threatening its socioeconomic well-being. The purpose of this paper is to gauge the challenges posed by these threats in contrast with the existing potential and expertise of legal entities. It also examines legal and procedural measures enforced as a counter-strategy for terror financing and money laundering and the AMLA 2010 and National Action Plan (NAP) for countering terrorism financing.

Design/methodology/approach

This paper uses an analytical and comparative method using figures and comparative data on the success of the NAP and AMLA 2010 as national counterterrorism strategies. Terror financing and anti-money laundering regimes are confronted with grave legal and procedural odds, noncooperation and performance issues and conflicts of interest on the part of the enforcers/politicians. This paper highlights the issues that seriously jeopardize strategies to stop money laundering and terror financing, such as geography, informal financial transfers and exchange systems, un-regulated charities and real estate sectors, the modest performance of enforcement agencies and lukewarm political support for the NAP.

Findings

The situation requires the improvement of weak legislation and poor coordination and the adaptation of technological advancements and novel counter-strategies, along with properly trained enforcement personnel.

Originality/value

This paper will prove to be a valuable reference for exploring the shortcomings and insights. This will provide useful information for legal and financial practitioners, academicians, research scholars, policymakers and journalists.

Details

Journal of Money Laundering Control, vol. 25 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 November 2013

Beth Sundstrom, Rowena Lyn Briones and Melissa Janoske

The purpose of this paper is to explore a postmodern approach to crisis management through the lens of complexity theory to understand six non-profit organizations’ communication…

1067

Abstract

Purpose

The purpose of this paper is to explore a postmodern approach to crisis management through the lens of complexity theory to understand six non-profit organizations’ communication responses to anti-abortion terrorism.

Design/methodology/approach

Researchers conducted a qualitative content analysis of publicly available documents from six non-profit organizations, which included 62 news releases and statements on organization web sites, 152 tweets, and 63 articles in national and local newspapers.

Findings

A history of violence and rituals of remembrance emerged as important pieces of organizational, personal, and social history surrounding anti-abortion terrorism. The process of self-organization facilitated calling publics to action and combating the “terrorism” naming problem. The non-profits’ dynamic environment exemplified the importance of coalition building to construct digital attractor basins, or networks extending beyond permeable boundaries, through a variety of strategies, including new media. Twitter served as a strange attractor, where the concept of interacting agents emerged as a key component of relationship building.

Research limitations/implications

Findings provide opportunities to expand complexity theory.

Practical implications

Findings suggest practical implications for anti-abortion counterterrorism and crisis management, and provide opportunities to develop communication counter measures.

Originality/value

Applying a complexity lens to the study of anti-abortion counterterrorism builds on the growing emphasis of the postmodern approach to crisis management and answers the call for further inquiry into the application of complexity theory to crisis situations. Furthermore, this study fills a gap in the study of crisis management by investigating how multiple organizations handle a crisis.

Details

Journal of Communication Management, vol. 17 no. 4
Type: Research Article
ISSN: 1363-254X

Keywords

1 – 10 of 151