Search results

1 – 10 of over 5000

Abstract

Details

Terrorism and Counter-Terrorism
Type: Book
ISBN: 978-0-76231-040-1

Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Book part
Publication date: 3 February 2023

Cláudia Seabra

There is no industry in the world where a crisis caused by terrorism has such a strong impact as in tourism. Providing security for visitors before and during a trip can be a…

Abstract

There is no industry in the world where a crisis caused by terrorism has such a strong impact as in tourism. Providing security for visitors before and during a trip can be a critical success factor for the competitiveness of a particular destination or organization or for business tourism when tourists consider multiple alternatives. Information about political instability, violence, crime or terrorist attacks could cause a substitution effect by tourists. International terrorism and tourism share some characteristics, as both cross national borders, involve citizens from different countries and use the new travel and communications technologies. In recent decades, terrorism organizations have been using tourism targets to gain global visibility. Based on a broad analysis of literature and data, the main goal of this research is to update the work of Seabra (2019) and help to analyse the main connections between terrorism and tourism, specifically by presenting the main terrorist events targeting tourism activity and destinations in the last 35 years and their main consequences for tourism industry.

Article
Publication date: 2 July 2018

Fayaz Ahmad Loan and Refhat-un-nisa Shah

This study aims to explore the scholarly literature published on “Terrorism” by India and Pakistan and has an in-depth bibliometric analysis of its various facets.

Abstract

Purpose

This study aims to explore the scholarly literature published on “Terrorism” by India and Pakistan and has an in-depth bibliometric analysis of its various facets.

Design/methodology/approach

Data for the study were harvested from the “Web of Science” one of the widely used and trusted indexing and abstracting source used by research scholars all over the world. The search was confined to the literature published on “Terrorism” by India and Pakistan. A total of 125 results were retrieved and out of them 105 were found relevant. The data were later analyzed on different parameters.

Findings

India and Pakistan have started to conduct and publish research on “Terrorism” since 1990. However, only five articles were published till 2000. Presently, out of total 105 publications, India contributed 57 (54 per cent) and Pakistan contributed 48 (46 per cent) articles on Terrorism. Majority of the articles (93 per cent) were contributed by the individual researchers without any financial support from the funding agencies. The authorship pattern of the articles revealed that 40.95 per cent (43) articles were contributed by single author, whereas 59.05 per cent (62) were authored in collaboration. In terms of research collaboration, Pakistani authors collaborated with authors of six nations of the world, whereas Indian authors collaborated only with researchers of three countries. Most of the research articles were published from the authors affiliated with universities and other higher educational institutions (64.76 per cent), followed by colleges (12.38 per cent) and other government departments. Most of the articles were published during last five years from 2011-2015 (52.38 per cent), followed by 2006-2010 (28.57 per cent). These articles were published in more than 80 journals and the majority were published from England (36, 34.29 per cent) followed by United States of America (26, 24.76 per cent) and Netherlands (13, 12.38 per cent) simultaneously.

Research limitations/implications

The findings of the study need to be cautioned as the data were harvested from “Web of Science” only.

Practical implications

The paper is useful for politicians, defense ministries, academicians, researchers and many other interested agencies such as human rights organizations or activists.

Originality/value

This is the first paper providing information on research output of India and Pakistan on Terrorism and will serve as bed rock for future research in the field.

Details

Collection and Curation, vol. 37 no. 3
Type: Research Article
ISSN: 2514-9326

Keywords

Book part
Publication date: 9 September 2020

Alex Wilner and Claire-Jehanne Dubouloz

Purpose – Drawing on Transformative Learning (TL) theory, the authors suggest a new and novel way to approach the study of violent radicalization.Methodology/Approach – First…

Abstract

Purpose – Drawing on Transformative Learning (TL) theory, the authors suggest a new and novel way to approach the study of violent radicalization.

Methodology/Approach – First, their argument is supported by the development of a Transformative Radicalization (TR) framework that borrows and adapts the core tenets of TL theory. Second, they provide a preliminary illustrative exploration of TR using two autobiographical accounts of militant radicalization (Islamist and Anarchist) from the UK and Canada.

Findings – Radicalization is a cognitive and emotional process of change that prepares and motivates an individual to pursue violent behavior. That process of change is incremental; individuals learn and adopt novel political, social, ideological, and/or religious ideals that justify and legitimize indiscriminate violence. The TR framework provides a more nuanced appreciation for the cognitive aspects involved in this process. The authors’ empirical illustrations provide guidance on how subsequent research might use original interview data on individual radicalization processes to develop more in-depth, cross-case comparisons.

Originality/Value – This theory builds a cross-disciplinary understanding of violent radicalization that highlights the way adults learn, alter their meaning perspectives, and change their behavior.

Article
Publication date: 24 September 2018

Muhammad Naveed Khan, Pervaiz Akhtar and Yasmin Merali

The purpose of this paper is to investigate the knowledge gaps in the published research on terrorism-related risk in supply chains, and to develop a framework of strategies and…

1405

Abstract

Purpose

The purpose of this paper is to investigate the knowledge gaps in the published research on terrorism-related risk in supply chains, and to develop a framework of strategies and effective decision-making to enable practitioners to address terrorism-related risks in supply chain risk management (SCRM) and security.

Design/methodology/approach

The study adopts a novel combination of triangulated methods comprising a systematic literature review (SLR), text mining and network analysis. These methods have not been jointly utilized in past studies, and the approach constitutes a rigorous methodology that cross-validates results and ensures the reliability and validity of qualitative data.

Findings

The study reveals a number of key themes in the field of SCRM and security linked with terrorism. The authors identify relevant mitigation strategies and practices for effective strategic decision making. This subsequently leads us to develop a strategic framework of strategies and effective decision-making practices to address terrorism-related risk, affecting SCRM and security. The authors also identify key knowledge gaps in the literature and explore the main contributions by disciplines (e.g. business schools, engineering and maritime institutions) and countries.

Practical implications

The authors provide a strategic framework of strategies and effective decision-making practices that managers can use to minimize terrorism-related risk in the context of SCRM and security.

Originality/value

This paper introduces a novel methodological combination for improving the quality of SLRs. It uses the approach to systematically review the strategies and effective decision-making practices interlinked with terrorism risk, affecting SCRM and security. It identifies significant knowledge gaps and defines directions for future research.

Article
Publication date: 2 May 2017

Nicholas Gilmour, Tristram Hicks and Simon Dilloway

The purpose of this paper is to examine – using crime script analysis – the practical effectiveness of internationally endorsed and universally recognised counter-terrorism

Abstract

Purpose

The purpose of this paper is to examine – using crime script analysis – the practical effectiveness of internationally endorsed and universally recognised counter-terrorism financing (CTF) standards in preventing the movement of money for the purposes of terrorism. The paper does not seek to examine the originating circumstances of terrorist finances or how laundered value is assigned.

Design/methodology/approach

Preliminary evaluation focuses on the discrepancies between the practices of money laundering and terrorist financing. Following an introduction to crime scripts, internationally endorsed anti money laundering (AML)/CTF practices are discussed to identify the process used to trace, prevent and limit money laundering and terrorist financing. Several terrorist financing case studies are then aligned to the process of crime script analysis to determine whether existing AML/CTF practices are effective in preventing terrorist financing.

Findings

The AML model “Placement, layering, integration” is only relevant to CTF in the comparatively rare cases when the origin of the money is crime. This creates a false sense of security through over reliance on AML/CTF for CTF purposes. A crime script approach can be applied to terrorist finance, but it is currently hindered by insufficient reporting of low level financing of terrorists, their addresses and associates. Law enforcement make insufficient use of financial intelligence – as a routine practice – in their crime and terrorist investigations; they have not adopted parallel investigation as a routine approach and consequently remain largely unconnected with the AML/CTF regime.

Practical implications

Utilising terrorist financing case studies, this paper identifies that existing AML/CTF international standards and practices are not adequate for controlling the movement of funds for financing terrorism because of the lack of focus on a specific script that aligns to known terrorist finance methodologies. While the paper identifies that existing AML/CTF international standards are thorough, the process underpinning the financing of terrorism is too dissimilar to the process of money laundering, namely, placement, layering, and integration, to support practices associated with terrorism prevention and detection.

Originality/value

This paper provides an examination of the practicalities behind the countering of terrorist financing from a compliance and investigative perspective. The paper is of interest to those involved in policy, compliance and investigations associated with terrorist financing.

Details

Journal of Financial Crime, vol. 24 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 20 August 2021

Hussain Syed Gowhor

This paper aims to inform the readers about the preferred type of financial intelligence for early detection of terrorist financing activities.

Abstract

Purpose

This paper aims to inform the readers about the preferred type of financial intelligence for early detection of terrorist financing activities.

Design/methodology/approach

Literature review methodology was adopted to find the existing approaches of financial intelligence and logical reasoning was applied to sort out what type of financial intelligence is more preferable for early detection of terrorist financing activities.

Findings

It was found that proactive financial intelligence executed through financial intelligence tools is the most preferred type of financial intelligence for early detection of terrorist financing activities.

Research limitations/implications

The research will pave the way for further research on how to design financial intelligence tools for the early detection of terrorist financing activities.

Practical implications

The financial intelligence units will use the preferred type of financial intelligence for the early detection of terrorist financing activities.

Social implications

It will help to establish peace in the society by thwarting terrorist conspiracies because early detection of terrorist financing through financial intelligence tools will stop the flow of funds to and from terrorists.

Originality/value

The originality of the paper lies in distinguishing proactive financial intelligence from reactive financial intelligence.

Details

Journal of Money Laundering Control, vol. 25 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Book part
Publication date: 9 September 2020

Ayse Lokmanoglu and Yannick Veilleux-Lepage

Purpose – In order to explore how gender and sexual politics are played out in everyday practice within both the extreme right and jihadi-Salafist movements online, this chapter…

Abstract

Purpose – In order to explore how gender and sexual politics are played out in everyday practice within both the extreme right and jihadi-Salafist movements online, this chapter analyzes the content of two women’s only forums: The Women’s Forum on Stormfront.org and Women Dawah, a Turkish language pro-IS group chat on Telegram.

Methodology – The Women’s Forum and the Women Dawah data sets were analyzed using structural topic modeling to uncover the differences and similarities in salient topics between White Nationalist and Islamic State women-only forums.

Findings – The cross-ideological and multi-linguistic thematic analysis suggests that the safety of online spaces enables women to be more active, and serves digital support network for like-minding individuals. It also highlights that religion and ideology, whilst interwoven throughout posts on both platforms, they were more explicitly discussed within Women Dawah data.

Originality/Value – This research uses a unique data set which was collected over one year to conduct a cross-ideological and multi-linguistic thematic analysis, a relatively uncommon approach.

Details

Radicalization and Counter-Radicalization
Type: Book
ISBN: 978-1-83982-988-8

Keywords

Article
Publication date: 29 November 2023

Hussain Syed Gowhor

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…

Abstract

Purpose

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.

Design/methodology/approach

Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.

Findings

There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.

Research limitations/implications

The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.

Practical implications

The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.

Social implications

The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.

Originality/value

In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 5000