Search results
1 – 10 of 151Xiaoyue Liu, Xiaolu Wang, Li Zhang and Qinghua Zeng
With respect to multiple attribute group decision-making (MAGDM) in which the assessment values of alternatives are denoted by normal discrete fuzzy variables (NDFVs) and the…
Abstract
Purpose
With respect to multiple attribute group decision-making (MAGDM) in which the assessment values of alternatives are denoted by normal discrete fuzzy variables (NDFVs) and the weight information of attributes is incompletely known, this paper aims to develop a novel fuzzy stochastic MAGDM method based on credibility theory and fuzzy stochastic dominance, and then applies the proposed method for selecting the most desirable investment alternative under uncertain environment.
Design/methodology/approach
First, by aggregating the membership degrees of an alternative to a scale provided by all decision-makers into a triangular fuzzy number, the credibility degree and expect the value of a triangular fuzzy number are calculated to construct the group fuzzy stochastic decision matrix. Second, based on determining the credibility distribution functions of NDFVs, the fuzzy stochastic dominance relations between alternatives on each attribute are obtained and the fuzzy stochastic dominance degree matrices are constructed by calculating the dominance degrees that one alternative dominates another on each attribute. Subsequently, calculating the overall fuzzy stochastic dominance degrees of an alternative on each attribute, a single objective non-linear optimization model is established to determine the weights of attributes by maximizing the relative closeness coefficients of all alternatives to positive ideal solution. If the information about attribute weights is completely unknown, the idea of maximizing deviation is used to determine the weights of attributes. Finally, the ranking order of alternatives is determined according to the descending order of corresponding relative closeness coefficients and the best alternative is determined.
Findings
This paper proposes a novel fuzzy stochastic MAGDM method based on credibility theory and fuzzy stochastic dominance, and a case study of investment alternative selection problem is provided to illustrate the applicability and sensitivity of the proposed method and its effectiveness is demonstrated by comparison analysis with the proposed method with the existing fuzzy stochastic MAGDM method. The result shows that the proposed method is useful to solve the MAGDM problems in which the assessment values of alternatives are denoted by NDFVs and the weight information of attributes is incompletely known.
Originality/value
The contributions of this paper are that to describe the dominance relations between fuzzy variables reasonably and quantitatively, the fuzzy stochastic dominance relations between any two fuzzy variables are redefined and the concept of fuzzy stochastic dominance degree is proposed to measure the dominance degree that one fuzzy variable dominate another; Based on credibility theory and fuzzy stochastic dominance, a novel fuzzy stochastic MAGDM method is proposed to solve MAGDM problems in which the assessment values of alternatives are denoted by NDFVs and the weight information of attributes is incompletely known. The proposed method has a clear logic, which not only can enrich and develop the theories and methods of MAGDM but also provides decision-makers a novel method for solving fuzzy stochastic MAGDM problems.
Details
Keywords
D. Elaine Pressman and John Flockton
The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach…
Abstract
Purpose
The purpose of this paper is to outline the process of risk assessment for terrorists and violent political extremists and to present an example of such an approach. The approach proposed is referred to as the VERA 2 or violent extremism risk assessment protocol (Consultative Version 2).
Design/methodology/approach
A review of the knowledge base relating to risk assessment and risk assessment methodology was undertaken with a focus on relevance to individual terrorists and violent extremists. The need for a specific approach for the risk assessment of terrorists that differs from approaches used for ordinary violent criminals was identified. A model that could be used for the risk assessment of terrorists was identified with pertinent risk indicators. This was structured into a protocol referred to as the VERA (Consultative Version 2). The approach is intended to be applied to different types of violent extremists, terrorists and unlawful violent offenders motivated by religious, political or social ideologies.
Findings
First, risk assessments of adjudicated terrorists and violent extremists should be undertaken with risk indicators that are relevant to ideological motivated violence. Indicators used for ordinary common violence differ in substantive ways from those relevant to terrorists and therefore may have questionable relevance for the assessment of risk in terrorists. Second, it is possible to construct an evidence‐based risk assessment approach for the range of violent extremists and terrorists using a structured professional judgment approach with pertinent risk indicators. The VERA 2 is an example of this type of risk assessment protocol for terrorists and unlawful violent extremists.
Research limitations/implications
Risk assessment tools that have been developed for ordinary violent criminals and members of organised criminal gangs should be used with caution with terrorists, violent extremists and other perpetrators of ideologically motivated unlawful violence. Specific risk assessment approaches for terrorists with relevant indicators should be used. At this time, terrorist oriented approaches such as the VERA 2 are to be considered consultative and used as an add‐on to other established approaches.
Originality/value
There are few transparent, structured risk assessment approaches that use indicators specifically relevant to violent political extremists and terrorists. One new approach, the VERA 2 is outlined in the paper using risk indicators that differ in substantive ways from those used for other ordinary violent criminals.
Details
Keywords
In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural…
Abstract
Purpose
In 2014, Paul Gill et al. introduced a study of 119 lone-actor terrorism cases, and found that lone-actor extremists could be more accurately identified by their behavioural characteristics and activities, rather than their extremist ideologies. The study was said to have significant impact on intelligence analysis in the field of counterterrorism. The purpose of this paper is to apply Gill et al.’s findings to financial intelligence investigations, to assist investigators with the detection and prevention of lone-actor terrorist financing.
Design/methodology/approach
This article provides an overview of the key findings provided by Gill et al. It then discusses the indicators of lone-actor terrorism in the context of financial intelligence investigations, and sets out methods to improve financial intelligence investigations to better identify and stop lone-actor terrorism in the future.
Findings
By applying traditional financial intelligence techniques, which focus on assessing an individual’s activity and behaviour, with open-source intelligence gathering, financial intelligence investigators will be better equipped to identify lone-actor terrorism and its financing moving forward.
Originality/value
This article will be of value to investigators specializing in terrorism and financial crime, as it will assist them in the identification of a proliferating security threat, the lone-actor terrorist. While the article relies on the findings provided by Gill et al., it takes a new approach by applying those findings specifically to the financial intelligence sector, to improve investigations related to terrorism.
Details
Keywords
Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued…
Abstract
Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued relevance, and providing a basis for considering its uses as an information‐age strategy of radical activism. The novelty of the forms of speech and action possible in cyberspace make it difficult to compare these new methods of expression easily. Whether in cyberspace or the real world, civil disobedience has historically specific connotations that should be sustained because the concept has special relevance to the political theory and practice of constitutional democracy. Civil disobedience is a unique means of political expression that is used to provoke democratic deliberation about important questions of just law and policy. Among the significant problems that new forms of radical political practice in cyberspace introduce is that their practitioners and advocates neglect the need to distinguish between violence and nonviolence. Examines that problem and others that are central to considering theoretical and political implications of radical activism in general, and civil disobedience in particular, in cyberspace.
Details
Keywords
Karen Okamoto and Marta Bladek
Prior to 9/11, terrorism was subject to political, scholarly, and media debates. A large body of literature on the topic reflected researchers' long‐standing interest in the…
Abstract
Purpose
Prior to 9/11, terrorism was subject to political, scholarly, and media debates. A large body of literature on the topic reflected researchers' long‐standing interest in the topic. In the near decade since 9/11, terrorism and its threat have only gained urgency. This paper aims to provide a selected bibliography of resources, in print and electronic format, that focus on terrorism. Public and academic libraries have been providing access to terrorism‐related resources, but no thematic bibliography has been published in professional journals since 2001. This guide aims to aid librarians in making decisions about developing and maintaining collections on the topic.
Design/methodology/approach
The authors consulted a variety of sources, including the Library of Congress catalog, WorldCat, Bowker's Global Books in Print database, book reviews in Choice, Booklist, and in journals within terrorism studies. As John Jay College of Criminal Justice is home to The Center on Terrorism and the college offers an MA Certificate Program in Terrorism Studies, the authors also consulted the college library collection that supports these scholarly activities on terrorism at the college.
Practical implications
Because of the volume of terrorism‐related scholarship and the number of available resources on the topic, this bibliography does not purport to be complete.
Findings
Included in this guide are print and electronic encyclopedias, books, periodicals, databases, and websites covering terrorism.
Originality/value
This guide aims to assist students, faculty, and the general public in navigating the vast array of terrorism‐related resources. Focusing on research conducted and published since 2001, it is also intended as a guide for public and academic librarians who develop, maintain, or evaluate a collection on the topic.
Details
Keywords
The purpose of this paper is threefold: identifying the root causes and other causal factors of terrorism, exploring the recent shifts in terrorist activity, and proposing a…
Abstract
Purpose
The purpose of this paper is threefold: identifying the root causes and other causal factors of terrorism, exploring the recent shifts in terrorist activity, and proposing a context-centred framework for deterring terrorism risk.
Design/methodology/approach
The first part of this research is based on extensive up-to-date observations made by the author and extracted from real-life settings and social interactions. The second part is based on a survey questionnaire reflecting public views on terrorism and related issues.
Findings
The risk of terrorism risk is increasingly becoming a major concern of all societies including Jordanian. The results have shown that terrorism is context related and that there are several and different root causes for this phenomenon. Many other causal factors have the potential to increase the impact or probability of terrorism risk in Jordan. The existing framework(s) for deterring terrorism risk in Jordan is not adequate and need to be reformed extensively.
Practical implications
This study provides insight to the root causes of the potential terrorist activity in Jordan, as well as other causal factors. It is expected to establish a foundation for policy-makers and decision-makers to start considering the causes of social unrest and subsequently develop appropriate frameworks for mitigating terrorism risk.
Originality/value
This study is made in a time of unprecedented political instability and terrorist activity in the Middle East and the Arab World. It reflects genuine observations and public opinions, thus providing authentic findings and better understanding of the concerns of the society. Most importantly, the study proposes context-related framework for counteracting terrorism activity and future evolution of this phenomenon in the Middle East, in general, and Jordan, in particular.
Details
Keywords
The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence…
Abstract
Purpose
The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.
Design/methodology/approach
The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”
Findings
The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.
Research limitations/implications
The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.
Originality/value
The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.
Details
Keywords
Valbona Zeneli, Michael R. Czinkota and Gary Knight
The purpose of this paper is to research the relationship between terrorism and multinational enterprises (MNEs), focusing on operational costs, marketing planning, supply chain…
Abstract
Purpose
The purpose of this paper is to research the relationship between terrorism and multinational enterprises (MNEs), focusing on operational costs, marketing planning, supply chain management, and distribution activities. Terrorism is a growing threat to internationally active firms, but there has been no empirical research to address the distinctive challenges that terrorism poses for the international marketing activities of firms.
Design/methodology/approach
The paper opted for an exploratory investigation, following a two-phase research design. In the first phase it was based on qualitative interviews with internationally active firms. In the second phase, an online survey of a large sample of international firms based in the USA was performed. All measures were developed specifically for the study.
Findings
The paper provides empirical insights about how terrorism affects MNEs, especially those operating in emerging markets. It suggests that terrorism accounts for significant costs in the international marketing budget of MNEs, as well as in planning, and the design of supply chains and distribution channels. Findings also reveal that firms with significant resources and international experience appear to cope better with terrorism’s effects.
Research limitations/implications
Given the early stage of empirical research on terrorism and international marketing, this study was necessarily exploratory.
Practical implications
The paper includes implications and suggestions for multinational companies to increase the security of their businesses through the development of corporate preparedness.
Social implications
Terrorism represents not only an organizational crisis at the level of a firm, but it affects the whole society.
Originality/value
This paper fulfills an identified need to study the relationship between the growing threat of terrorism and international business.
Details
Keywords
Munir Ahmad Zia, Rana Zamin Abbas and Noman Arshed
Pakistan is facing the momentous hazard of money laundering and a substantial risk of terror financing, which are seriously threatening its socioeconomic well-being. The purpose…
Abstract
Purpose
Pakistan is facing the momentous hazard of money laundering and a substantial risk of terror financing, which are seriously threatening its socioeconomic well-being. The purpose of this paper is to gauge the challenges posed by these threats in contrast with the existing potential and expertise of legal entities. It also examines legal and procedural measures enforced as a counter-strategy for terror financing and money laundering and the AMLA 2010 and National Action Plan (NAP) for countering terrorism financing.
Design/methodology/approach
This paper uses an analytical and comparative method using figures and comparative data on the success of the NAP and AMLA 2010 as national counterterrorism strategies. Terror financing and anti-money laundering regimes are confronted with grave legal and procedural odds, noncooperation and performance issues and conflicts of interest on the part of the enforcers/politicians. This paper highlights the issues that seriously jeopardize strategies to stop money laundering and terror financing, such as geography, informal financial transfers and exchange systems, un-regulated charities and real estate sectors, the modest performance of enforcement agencies and lukewarm political support for the NAP.
Findings
The situation requires the improvement of weak legislation and poor coordination and the adaptation of technological advancements and novel counter-strategies, along with properly trained enforcement personnel.
Originality/value
This paper will prove to be a valuable reference for exploring the shortcomings and insights. This will provide useful information for legal and financial practitioners, academicians, research scholars, policymakers and journalists.
Details
Keywords
Beth Sundstrom, Rowena Lyn Briones and Melissa Janoske
The purpose of this paper is to explore a postmodern approach to crisis management through the lens of complexity theory to understand six non-profit organizations’ communication…
Abstract
Purpose
The purpose of this paper is to explore a postmodern approach to crisis management through the lens of complexity theory to understand six non-profit organizations’ communication responses to anti-abortion terrorism.
Design/methodology/approach
Researchers conducted a qualitative content analysis of publicly available documents from six non-profit organizations, which included 62 news releases and statements on organization web sites, 152 tweets, and 63 articles in national and local newspapers.
Findings
A history of violence and rituals of remembrance emerged as important pieces of organizational, personal, and social history surrounding anti-abortion terrorism. The process of self-organization facilitated calling publics to action and combating the “terrorism” naming problem. The non-profits’ dynamic environment exemplified the importance of coalition building to construct digital attractor basins, or networks extending beyond permeable boundaries, through a variety of strategies, including new media. Twitter served as a strange attractor, where the concept of interacting agents emerged as a key component of relationship building.
Research limitations/implications
Findings provide opportunities to expand complexity theory.
Practical implications
Findings suggest practical implications for anti-abortion counterterrorism and crisis management, and provide opportunities to develop communication counter measures.
Originality/value
Applying a complexity lens to the study of anti-abortion counterterrorism builds on the growing emphasis of the postmodern approach to crisis management and answers the call for further inquiry into the application of complexity theory to crisis situations. Furthermore, this study fills a gap in the study of crisis management by investigating how multiple organizations handle a crisis.
Details