Showing 161 - 180 results of 230 for search '"terrorist"', query time: 0.05s Refine Results
  1. 161

    The role of the accountant in preventing money laundering by Cvetković Dragan, Vujičić Slađana, Stanković Sunčica

    Published 2024-01-01
    “…One of the state's responses to this negative phenomenon is an effective system for combating money laundering and terrorist financing. A system characterized by partnership between the private and public sectors, coordination and cooperation between competent state authorities and all its participants/obligors. …”
    Get full text
    Article
  2. 162

    Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya) by Morad Kaviani Rad, Hadi Aazami, Majid Rasouli, Ahmad Bakhshi

    Published 2018-03-01
    “…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  …”
    Get full text
    Article
  3. 163

    Why be jihadist? Public intellectuals’ blind spot for Islamist terrorism by Peter Demant

    Published 2016-10-01
    “…However, thus far no effective answer to jihadism seems to have emerged, a lacuna which may be imputed to a blind spot common to most intellectual positions: reluctance to address the sources of attraction that seduce some people into terrorist activity. The article compares a few recent attempts at understanding these sources, and concludes that their common denominator is a crisis of belonging and transcendence of the West itself: addressing and responding to this social and ideological crisis is a task for the West’s public intellectuals, and precondition for effectively countering terrorism.…”
    Get full text
    Article
  4. 164

    Sensing and Degradation of Organophosphorus Compounds by Exploitation of Heat-Loving Enzymes by Giuseppe Manco, Eros A. Lampitella, Nagendra S. K. Achanta, Giuliana Catara, Maria Marone, Elena Porzio

    Published 2025-01-01
    “…The increasing incidence of organophosphate (OP) pesticide poisoning and the use of OP chemical warfare agents (CWA) in conflicts and terrorist acts need sustainable methods for sensing, decontamination, and detoxification of OP compounds. …”
    Get full text
    Article
  5. 165

    The Role of the United Nations Security Council in the Protection of Cultural Heritage by Bagher Beidaghi, Peyman Bolouri, Malek Zolghader

    Published 2024-09-01
    “…This can be seen in the reactions of the United Nations (UN) to the destruction, looting, and trafficking of the cultural heritage of countries such as Iraq, Syria and the other countries committed by terrorist groups. What is important here is the United Nations Security Council's reactions to this issue. …”
    Get full text
    Article
  6. 166

    Radicalization and extremism of youth: Comparative case study of Palestine and Israel by Dobrucka Weronika

    Published 2024-01-01
    “…Additional emphasis is also placed on the influence of stereotyping of the Hamas terrorist organization, as well as mandatory service in IDF units. …”
    Get full text
    Article
  7. 167

    Europol’s Counter-Terrorism Role: over 25 Years of Partnership by Antonio Ortiz

    Published 2024-10-01
    “…Findings: Over the past two decades, significant terrorist attacks have profoundly influenced the European Union’s counter-terrorism policies and institutions. …”
    Get full text
    Article
  8. 168

    Organophosphorus Nerve Agents: Types, Toxicity, and Treatments by Sudisha Mukherjee, Rinkoo Devi Gupta

    Published 2020-01-01
    “…Nerve agents, a subcategory of the organophosphorus compounds, have been produced and used during wars, and they have also been used in terrorist activities. These compounds possess physiological threats by interacting and inhibiting acetylcholinesterase enzyme which leads to the cholinergic crisis. …”
    Get full text
    Article
  9. 169

    Implementation and optimisation of intelligent police systems based on artificial intelligence by D. O. Zhadan, M. V. Mordvyntsev, D. V. Pashniev, O. V. Khlestkov

    Published 2024-06-01
    “…Modern video surveillance systems can help counter terrorist attacks by tracking and identifying people and suspicious objects. …”
    Get full text
    Article
  10. 170

    Evolution of U.S. Policy Approaches to Ensuring Cybersecurity and Defense of Critical Information Infrastructure by M. V. Smekalova

    Published 2020-11-01
    “…The United States were among the first to elaborate legal framework for cyberpolicy aiming at providing national security after terrorist attacks of 2001. As time passed, dozens of legislation acts were adopted, and a number of agencies and committees responsible for ensuring information security emerged. …”
    Get full text
    Article
  11. 171

    Victim Verification with the Use of Deep Metric Learning in DVI System Supported by Mobile Application by Zbigniew Piotrowski, Marta Bistroń, Gabriel Jekateryńczuk, Paweł Kaczmarek, Dymitr Pietrow

    Published 2025-01-01
    “…This paper presents the design of a system to support the identification of victims of disasters and terrorist attacks. The system, called ID Victim (IDV), is a web application using a mobile app and data server. …”
    Get full text
    Article
  12. 172

    Rationalization of Evil through Media: A Twitter Discourse Analysis on Israel's Genocide against Palestine after October 7 by Filiz Orhan Çağlayan

    Published 2024-12-01
    “…By dehumanizing Hamas with labels such as “terrorist, human-animal”, Israel legitimizes everything done to them. …”
    Get full text
    Article
  13. 173

    Geopolitical Risk and Stock Market Volatility in Emerging Economies: Evidence from GARCH-MIDAS Model by Menglong Yang, Qiang Zhang, Adan Yi, Peng Peng

    Published 2021-01-01
    “…Previous studies have found that geopolitical risk (GPR) caused by geopolitical events such as terrorist attacks can affect the movements of asset prices. …”
    Get full text
    Article
  14. 174

    Enhancing concealed object detection in active THz security images with adaptation-YOLO by Aiguo Cheng, Shiyou Wu, Xiaodong Liu, Hangyu Lu

    Published 2025-01-01
    “…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
    Get full text
    Article
  15. 175

    Formation and development of special police units: a retrospective analysis by K. O. Chyshko, R. S. Pinchuk

    Published 2024-03-01
    “…Stage I (1709–1917) – formation of the land militia, which can be considered the first example of the existence of modern special police units; Stage II (1917–1941) – characterised by the creation of Ukrainian voluntary militia and military formations; Stage III (1941–1978) – a period of stagnation in the history of the formation of special police units due to the events of the First and Second World Wars; Stage IV (1978–1991) – creation of the first special unit in the system of the Ministry of Internal Affairs of the USSR at the official level – a special police detachment; Stage V (1991–2014) – associated with Ukraine’s independence and the creation of Berkut special police unit, Titan special police unit, Sokil rapid response unit; Stage VI (2014 – present) – formation of special police units that actively participate in armed conflicts; this stage was influenced by three key events: 1) the anti-terrorist operation in eastern Ukraine, which was later called the “Joint Forces Operation”, which led to the creation of a number of volunteer special units of the Ministry of Internal Affairs of Ukraine; 2) the creation of the National Police of Ukraine and the formation of special units within its structure (the Rapid Action Corps, the Special Police Patrol Service and the Tactical Response Unit); 3) Russia’s full-scale invasion of Ukraine, which led to the creation of a militarised special police unit, the “Luty” Joint Assault Brigade of the National Police of Ukraine and the “Safari” assault regiment of the National Police.…”
    Get full text
    Article
  16. 176

    Stabilisation measures on the de-occupied territories: conceptual interpretation, classification, and application features by K. L. Buhaichuk

    Published 2024-03-01
    “…Special stabilisation measures are carried out to prevent sabotage and reconnaissance groups and illegal armed groups from entering the de-occupied territory and committing terrorist acts on infrastructure and communications facilities, ensuring public safety and order, preventing and suppressing crimes and other offences, eliminating the consequences of emergencies, and searching for persons who have committed crimes against the foundations of national security, war crimes and other offences during the occupation of the territory. …”
    Get full text
    Article
  17. 177

    The Cooperation Council for the Arab States of the Gulf: History, Key Achievements and Development Prospects by E. S. Melkumyan

    Published 2020-11-01
    “…Finally, the paper dwells on the events of the so called Qatar crisis, resulting from the discontent among the majority of GCC states with Qatar, which they accuse of supporting terrorist organizations. The author concludes that the Qatar crisis has demonstrated that national interests and the desire to maintain national sovereignty tend to have preference in the policy of the Gulf States over the common goals of the GCC. …”
    Get full text
    Article
  18. 178

    DIFUZIA PUTERII DE LA ACTORII STATALI LA CEI NON-STATALI by Octavian-Alexandru-Ștefan BROȘTEANU

    Published 2023-01-01
    “…Specifically, the case study method will be used, analysing terrorist organizations, cross-border criminal organizations, hackers/hacktivists, respectively the so-called "empowered individuals" and the street movements they can cause. …”
    Get full text
    Article
  19. 179

    Pengaturan cyber terrorism ditinjau dari perspektif organizational transnational crime by Putu Sekarwangi Saraswati, I Nengah Susrama

    Published 2024-06-01
    “…Dalam situasi kekosongan hukum ini, ASEAN Convention on Counter Terrorism dan International Convention for the Suppression of Terrorist Bombings mulai dipergunakan sebagai dasar hukum untuk mempidanakan pelaku cyber terrorism. …”
    Get full text
    Article
  20. 180

    Counteraction to Political Terrorism in the Russian empire on the Example of Ukrainian provinces in Late ХІХ – Early ХХ Century by S. Yu. Ivanov, R. Yu. Kazankov

    Published 2021-07-01
    “…In particular, the authors have analyzed historical conditions for the formation and development of various political forces of terrorist orientation, have demonstrated the basic measures on the part of state authorities and specialized law enforcement agencies on counteracting political terrorism. …”
    Get full text
    Article