Search results

1 – 10 of 24
Open Access
Article
Publication date: 2 November 2020

Mohamed O. Elkhosht, Mahmoud Mahmoud, Ahmed Zayed, Mo’taz S. Abdallah, Mohamed S. A. Kharbush and Dalal Mahmoud

This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of…

1399

Abstract

Purpose

This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of better understanding of this relationship on Egypt’s borders more than its center. Achieving development and stability leads to creating a preventive environment to extremist thoughts existence and spread, in addition to preventing its transformation into terrorism.

Design/methodology/approach

The study depends on an analytical methodology to examine the validity of the research hypothesis through two basic steps. The first step depends on describing the geographical, demographical, economic, social, political and security aspects of North Sinai. The second step is a prospective approach to build a strategy that helps in achieving development and accordingly a comprehensive confront for the opportunities of extremist thought spreading in North Sinai.

Findings

The study concludes that Egypt is well aware of the dimensions of encountering extremist thoughts and has adopted a comprehensive approach in achieving this. It has already started the paces of this confrontation in general, with some specificity in North Sinai Governorate that observed lately increased activities by extremists and terrorist groups. The proposed strategy is a set of policies that can help the country achieve its goals against extremism and terrorism.

Research limitations/implications

The study covers a time frame that starts from 2014, which is considered the beginning of a new phase for the Egyptian state. The study relies on the field of strategic studies and it focuses on North Sinai Governorate.

Originality/value

The study has a scientific importance because it presents a proposal for a comprehensive strategy to encounter extremist thoughts, which adds value to the literature of the study of extremism. The current study makes its contributions in some directions, such as reviewing the contents of this extremist thought or the juristic comment on it, the impacts of the spread of extremist thoughts, the role of the official media in disseminating extremist thoughts or standing up to it. In terms of application, the study presents a proposal with many policies in various fields to counter extremist ideology. These proposals are implementable in North Sinai Governorate as well as other frontier governorates.

Details

Journal of Humanities and Applied Social Sciences, vol. 3 no. 2
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Book part
Publication date: 4 June 2021

Alison J. Marganski and Lisa A. Melander

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…

Abstract

While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 11 June 2019

Raghda Elbahy

This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).

8833

Abstract

Purpose

This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).

Design/methodology/approach

The study uses qualitative methods.

Findings

It suggests that two measures must be applied; the first one is to rephrase the assumptions of the theory towards a broader definition. The second one is to theorize certain approaches for deterring VNSAs which shall remain a key component in, but not the cornerstone of, national security strategies.

Originality/value

In the aftermath of 9/11 attacks and US war on terrorism, the need arose to “revisit” the “Deterrence Theory” to address several changes such as rogue states, cyber threats and VNSAs, especially after the end of the Cold War, when the theory was originally developed. The recent research on VNSAs relates to the fourth wave of deterrence, which highlights its proper role in a new security environment.

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 14 October 2021

Lisa Sugiura

Abstract

Details

The Incel Rebellion: The Rise of the Manosphere and the Virtual War Against Women
Type: Book
ISBN: 978-1-83982-257-5

Open Access
Article
Publication date: 13 September 2023

Kabir Md Shahin and Moyenul Hasan

This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya…

1955

Abstract

Purpose

This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya refugee crisis.

Design/methodology/approach

Relevant literature has been reviewed for conceptual understanding. This study is descriptive and qualitative in nature and based on secondary sources of data.

Findings

The main causes of the Rohingya crisis such as political and humanitarian aspects. Issues such as discrimination and homelessness, and national security concerns that regional politics scapegoated the Rohingya to exacerbate regional tensions. Moreover, armed conflicts, political radicalization, security concerns, human rights violations and low media attention compared to other displaced families have made the future of the Rohingyas very uncertain.

Practical implications

The Rohingya crisis has far-reaching implications for domestic and regional politics as well as for relations with major world powers. In the context of regional security and geopolitics, this study provides insight into the polarization and politicization of the Rohingya minority.

Originality/value

This research offers a vital exploration of the Rohingya refugee crisis, delving into its multifaceted political and humanitarian dimensions, contributing fresh insights to address a pressing global concern.

Details

Southeast Asia: A Multidisciplinary Journal, vol. 23 no. 3
Type: Research Article
ISSN: 1819-5091

Keywords

1 – 10 of 24