Search results
1 – 10 of 24Mohamed O. Elkhosht, Mahmoud Mahmoud, Ahmed Zayed, Mo’taz S. Abdallah, Mohamed S. A. Kharbush and Dalal Mahmoud
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of…
Abstract
Purpose
This study aims to investigate the relationship between the spread of extremist thoughts and the weak economic and social factors surrounding it. There are higher chances of better understanding of this relationship on Egypt’s borders more than its center. Achieving development and stability leads to creating a preventive environment to extremist thoughts existence and spread, in addition to preventing its transformation into terrorism.
Design/methodology/approach
The study depends on an analytical methodology to examine the validity of the research hypothesis through two basic steps. The first step depends on describing the geographical, demographical, economic, social, political and security aspects of North Sinai. The second step is a prospective approach to build a strategy that helps in achieving development and accordingly a comprehensive confront for the opportunities of extremist thought spreading in North Sinai.
Findings
The study concludes that Egypt is well aware of the dimensions of encountering extremist thoughts and has adopted a comprehensive approach in achieving this. It has already started the paces of this confrontation in general, with some specificity in North Sinai Governorate that observed lately increased activities by extremists and terrorist groups. The proposed strategy is a set of policies that can help the country achieve its goals against extremism and terrorism.
Research limitations/implications
The study covers a time frame that starts from 2014, which is considered the beginning of a new phase for the Egyptian state. The study relies on the field of strategic studies and it focuses on North Sinai Governorate.
Originality/value
The study has a scientific importance because it presents a proposal for a comprehensive strategy to encounter extremist thoughts, which adds value to the literature of the study of extremism. The current study makes its contributions in some directions, such as reviewing the contents of this extremist thought or the juristic comment on it, the impacts of the spread of extremist thoughts, the role of the official media in disseminating extremist thoughts or standing up to it. In terms of application, the study presents a proposal with many policies in various fields to counter extremist ideology. These proposals are implementable in North Sinai Governorate as well as other frontier governorates.
Details
Keywords
Alison J. Marganski and Lisa A. Melander
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology…
Abstract
While research on digital dangers has been growing, studies on their respective solutions and justice responses have not kept pace. The agathokakological nature of technology demands that we pay attention to not only harms associated with interconnectivity, but also the potential for technology to counter offenses and “do good.” This chapter discusses technology as both a weapon and a shield when it comes to violence against women and girls in public spaces and private places. First, we review the complex and varied manifestations of technological gender violence, ranging from the use of technology to exploit, harass, stalk, and otherwise harm women and girls in communal spaces, to offenses that occur behind closed doors. Second, we discuss justice-related responses, underscoring how women and girls have “flipped the script” when their needs are not met. By developing innovative ways to respond to the wrongs committed against them and creating alternate systems that offer a voice, victims/survivors have repurposed technology to redress harms and unite in solidarity with others in an ongoing quest for justice.
Details
Keywords
This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).
Abstract
Purpose
This paper aims to address the limitations of classical deterrence theory in dealing with violent non-state actors (VNSAs).
Design/methodology/approach
The study uses qualitative methods.
Findings
It suggests that two measures must be applied; the first one is to rephrase the assumptions of the theory towards a broader definition. The second one is to theorize certain approaches for deterring VNSAs which shall remain a key component in, but not the cornerstone of, national security strategies.
Originality/value
In the aftermath of 9/11 attacks and US war on terrorism, the need arose to “revisit” the “Deterrence Theory” to address several changes such as rogue states, cyber threats and VNSAs, especially after the end of the Cold War, when the theory was originally developed. The recent research on VNSAs relates to the fourth wave of deterrence, which highlights its proper role in a new security environment.
Details
Keywords
David J. Harper, Darren Ellis and Ian Tucker
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…
Abstract
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.
Details
Keywords
Jane Bailey, Nicola Henry and Asher Flynn
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…
Abstract
While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.
Details
Keywords
Kabir Md Shahin and Moyenul Hasan
This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya…
Abstract
Purpose
This paper aims to examine the prevailing Rohingya refugee crisis from political and humanitarian perspectives and explores the political and humanitarian aspects of the Rohingya refugee crisis.
Design/methodology/approach
Relevant literature has been reviewed for conceptual understanding. This study is descriptive and qualitative in nature and based on secondary sources of data.
Findings
The main causes of the Rohingya crisis such as political and humanitarian aspects. Issues such as discrimination and homelessness, and national security concerns that regional politics scapegoated the Rohingya to exacerbate regional tensions. Moreover, armed conflicts, political radicalization, security concerns, human rights violations and low media attention compared to other displaced families have made the future of the Rohingyas very uncertain.
Practical implications
The Rohingya crisis has far-reaching implications for domestic and regional politics as well as for relations with major world powers. In the context of regional security and geopolitics, this study provides insight into the polarization and politicization of the Rohingya minority.
Originality/value
This research offers a vital exploration of the Rohingya refugee crisis, delving into its multifaceted political and humanitarian dimensions, contributing fresh insights to address a pressing global concern.
Details