-
161
The role of the accountant in preventing money laundering
Published 2024-01-01“…One of the state's responses to this negative phenomenon is an effective system for combating money laundering and terrorist financing. A system characterized by partnership between the private and public sectors, coordination and cooperation between competent state authorities and all its participants/obligors. …”
Get full text
Article -
162
Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)
Published 2018-03-01“…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of fundamentalist terrorist groups has attracted a large part of the world's security literature. …”
Get full text
Article -
163
Why be jihadist? Public intellectuals’ blind spot for Islamist terrorism
Published 2016-10-01“…However, thus far no effective answer to jihadism seems to have emerged, a lacuna which may be imputed to a blind spot common to most intellectual positions: reluctance to address the sources of attraction that seduce some people into terrorist activity. The article compares a few recent attempts at understanding these sources, and concludes that their common denominator is a crisis of belonging and transcendence of the West itself: addressing and responding to this social and ideological crisis is a task for the West’s public intellectuals, and precondition for effectively countering terrorism.…”
Get full text
Article -
164
Sensing and Degradation of Organophosphorus Compounds by Exploitation of Heat-Loving Enzymes
Published 2025-01-01“…The increasing incidence of organophosphate (OP) pesticide poisoning and the use of OP chemical warfare agents (CWA) in conflicts and terrorist acts need sustainable methods for sensing, decontamination, and detoxification of OP compounds. …”
Get full text
Article -
165
The Role of the United Nations Security Council in the Protection of Cultural Heritage
Published 2024-09-01“…This can be seen in the reactions of the United Nations (UN) to the destruction, looting, and trafficking of the cultural heritage of countries such as Iraq, Syria and the other countries committed by terrorist groups. What is important here is the United Nations Security Council's reactions to this issue. …”
Get full text
Article -
166
Radicalization and extremism of youth: Comparative case study of Palestine and Israel
Published 2024-01-01“…Additional emphasis is also placed on the influence of stereotyping of the Hamas terrorist organization, as well as mandatory service in IDF units. …”
Get full text
Article -
167
Europol’s Counter-Terrorism Role: over 25 Years of Partnership
Published 2024-10-01“…Findings: Over the past two decades, significant terrorist attacks have profoundly influenced the European Union’s counter-terrorism policies and institutions. …”
Get full text
Article -
168
Organophosphorus Nerve Agents: Types, Toxicity, and Treatments
Published 2020-01-01“…Nerve agents, a subcategory of the organophosphorus compounds, have been produced and used during wars, and they have also been used in terrorist activities. These compounds possess physiological threats by interacting and inhibiting acetylcholinesterase enzyme which leads to the cholinergic crisis. …”
Get full text
Article -
169
Implementation and optimisation of intelligent police systems based on artificial intelligence
Published 2024-06-01“…Modern video surveillance systems can help counter terrorist attacks by tracking and identifying people and suspicious objects. …”
Get full text
Article -
170
Evolution of U.S. Policy Approaches to Ensuring Cybersecurity and Defense of Critical Information Infrastructure
Published 2020-11-01“…The United States were among the first to elaborate legal framework for cyberpolicy aiming at providing national security after terrorist attacks of 2001. As time passed, dozens of legislation acts were adopted, and a number of agencies and committees responsible for ensuring information security emerged. …”
Get full text
Article -
171
Victim Verification with the Use of Deep Metric Learning in DVI System Supported by Mobile Application
Published 2025-01-01“…This paper presents the design of a system to support the identification of victims of disasters and terrorist attacks. The system, called ID Victim (IDV), is a web application using a mobile app and data server. …”
Get full text
Article -
172
Rationalization of Evil through Media: A Twitter Discourse Analysis on Israel's Genocide against Palestine after October 7
Published 2024-12-01“…By dehumanizing Hamas with labels such as “terrorist, human-animal”, Israel legitimizes everything done to them. …”
Get full text
Article -
173
Geopolitical Risk and Stock Market Volatility in Emerging Economies: Evidence from GARCH-MIDAS Model
Published 2021-01-01“…Previous studies have found that geopolitical risk (GPR) caused by geopolitical events such as terrorist attacks can affect the movements of asset prices. …”
Get full text
Article -
174
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01“…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
Get full text
Article -
175
Formation and development of special police units: a retrospective analysis
Published 2024-03-01“…Stage I (1709–1917) – formation of the land militia, which can be considered the first example of the existence of modern special police units; Stage II (1917–1941) – characterised by the creation of Ukrainian voluntary militia and military formations; Stage III (1941–1978) – a period of stagnation in the history of the formation of special police units due to the events of the First and Second World Wars; Stage IV (1978–1991) – creation of the first special unit in the system of the Ministry of Internal Affairs of the USSR at the official level – a special police detachment; Stage V (1991–2014) – associated with Ukraine’s independence and the creation of Berkut special police unit, Titan special police unit, Sokil rapid response unit; Stage VI (2014 – present) – formation of special police units that actively participate in armed conflicts; this stage was influenced by three key events: 1) the anti-terrorist operation in eastern Ukraine, which was later called the “Joint Forces Operation”, which led to the creation of a number of volunteer special units of the Ministry of Internal Affairs of Ukraine; 2) the creation of the National Police of Ukraine and the formation of special units within its structure (the Rapid Action Corps, the Special Police Patrol Service and the Tactical Response Unit); 3) Russia’s full-scale invasion of Ukraine, which led to the creation of a militarised special police unit, the “Luty” Joint Assault Brigade of the National Police of Ukraine and the “Safari” assault regiment of the National Police.…”
Get full text
Article -
176
Stabilisation measures on the de-occupied territories: conceptual interpretation, classification, and application features
Published 2024-03-01“…Special stabilisation measures are carried out to prevent sabotage and reconnaissance groups and illegal armed groups from entering the de-occupied territory and committing terrorist acts on infrastructure and communications facilities, ensuring public safety and order, preventing and suppressing crimes and other offences, eliminating the consequences of emergencies, and searching for persons who have committed crimes against the foundations of national security, war crimes and other offences during the occupation of the territory. …”
Get full text
Article -
177
The Cooperation Council for the Arab States of the Gulf: History, Key Achievements and Development Prospects
Published 2020-11-01“…Finally, the paper dwells on the events of the so called Qatar crisis, resulting from the discontent among the majority of GCC states with Qatar, which they accuse of supporting terrorist organizations. The author concludes that the Qatar crisis has demonstrated that national interests and the desire to maintain national sovereignty tend to have preference in the policy of the Gulf States over the common goals of the GCC. …”
Get full text
Article -
178
DIFUZIA PUTERII DE LA ACTORII STATALI LA CEI NON-STATALI
Published 2023-01-01“…Specifically, the case study method will be used, analysing terrorist organizations, cross-border criminal organizations, hackers/hacktivists, respectively the so-called "empowered individuals" and the street movements they can cause. …”
Get full text
Article -
179
Pengaturan cyber terrorism ditinjau dari perspektif organizational transnational crime
Published 2024-06-01“…Dalam situasi kekosongan hukum ini, ASEAN Convention on Counter Terrorism dan International Convention for the Suppression of Terrorist Bombings mulai dipergunakan sebagai dasar hukum untuk mempidanakan pelaku cyber terrorism. …”
Get full text
Article -
180
Counteraction to Political Terrorism in the Russian empire on the Example of Ukrainian provinces in Late ХІХ – Early ХХ Century
Published 2021-07-01“…In particular, the authors have analyzed historical conditions for the formation and development of various political forces of terrorist orientation, have demonstrated the basic measures on the part of state authorities and specialized law enforcement agencies on counteracting political terrorism. …”
Get full text
Article