CINXE.COM

Search results for: counter-terrorism policies

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: counter-terrorism policies</title> <meta name="description" content="Search results for: counter-terrorism policies"> <meta name="keywords" content="counter-terrorism policies"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="counter-terrorism policies" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="counter-terrorism policies"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2439</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: counter-terrorism policies</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2439</span> Role of Obama&#039;s Administration Counter-Terrorism Strategies towards Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Bux%20Jamali">Ahmed Bux Jamali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counterterrorism%20cooperation" title="counterterrorism cooperation">counterterrorism cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security%20strategy" title=" national security strategy"> national security strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Obama%20administration" title=" Obama administration"> Obama administration</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan-US%20relations" title=" Pakistan-US relations"> Pakistan-US relations</a> </p> <a href="https://publications.waset.org/abstracts/96843/role-of-obamas-administration-counter-terrorism-strategies-towards-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96843.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2438</span> The Importance of Information in Psychological Operations for Counterterrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abbas%20Fazelinia">Abbas Fazelinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20operations" title="psychological operations">psychological operations</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist" title=" terrorist"> terrorist</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/48243/the-importance-of-information-in-psychological-operations-for-counterterrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2437</span> Mothers, the Missing Link: A Critical Discourse Analysis of the Women-Centric Counterterrorism Measures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bukola%20Solomon">Bukola Solomon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In counterterrorism, policymakers typically design a confined role for women as family members and nurturers. In recent years, they have embraced the idea of mothers as the missing link to preventing and countering violent extremism. This ‘programmed’ role of women is derived from the convictions that women’s central roles in the family and community afford them the ‘unique set of skills’ to detect early signs of radicalization and extremism. This paper attempts to focus on the ‘mother’ narrative that frames women’s agency as mothers of ‘terrorists’ and ‘potential’ terrorists. The general underlying assumption of the ‘mother’ narrative is that naturally, every ‘terrorist’ has or once had a mother, and their radicalization is a maternal ‘oversight.’ By deconstructing the notion of motherhood as a social construct instead of an inherent female desire and ability, this paper argues that the assumption of ‘mothers know best’ is invalid. Also, this paper suggests that the ‘mother’ narrative is a deliberate effort to restrict women’s participation in counterterrorism as ‘preventers.’ Finally, this paper notes a global trend in which mothers are contesting the dominant view of women empowerment that restricts their agency by seeking alternative versions in terrorist organizations. And as such, they create parallel terror cells. Thus, the overemphasis on the role women plays as mothers in counterterrorism limits the scope and potential of counterterrorism programs by marginalizing gender issues and reinforcing gender disparities to the extent that the programs become counterproductive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=countering%20violent%20extremism" title="countering violent extremism">countering violent extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20roles" title=" gender roles"> gender roles</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a> </p> <a href="https://publications.waset.org/abstracts/111775/mothers-the-missing-link-a-critical-discourse-analysis-of-the-women-centric-counterterrorism-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111775.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2436</span> Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jordan%20Daud">Jordan Daud</a>, <a href="https://publications.waset.org/abstracts/search?q=Satriya%20Wibawa"> Satriya Wibawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahyu%20Wardhana"> Wahyu Wardhana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caliphate" title="caliphate">caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title=" ASEAN"> ASEAN</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20community" title=" social community"> social community</a> </p> <a href="https://publications.waset.org/abstracts/88339/understanding-the-caliphate-and-jihad-to-prevent-radicalization-that-lead-to-terrorism-the-role-of-social-community-in-southeast-asia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">234</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2435</span> Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eisa%20Younes%20Alblooshi">Eisa Younes Alblooshi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a> </p> <a href="https://publications.waset.org/abstracts/93228/framing-the-dynamics-and-functioning-of-different-variants-of-terrorist-organizations-a-business-model-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93228.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2434</span> Counter-Terrorism Policies in the Wider Black Sea Region: Evaluating the Robustness of Constantza Port under Potential Terror Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20V.%20Popa">A. V. Popa</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Barna"> C. Barna</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Mihalache"> V. Mihalache</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Being the largest port at the Black Sea and functioning as a civil and military nodal point between Europe and Asia, Constantza Port has become a potential target on the terrorist international agenda. The authors use qualitative research based on both face-to-face and online semi-structured interviews with relevant stakeholders (top decision-makers in the Romanian Naval Authority, Romanian Maritime Training Centre, National Company "Maritime Ports Administration" and military staff) in order to detect potential vulnerabilities which might be exploited by terrorists in the case of Constantza Port. Likewise, this will enable bringing together the experts’ opinions on potential mitigation measures. Subsequently, this paper formulates various counter-terrorism policies to enhance the robustness of Constantza Port under potential terror attacks and connects them with the attributions in the field of critical infrastructure protection conferred by the law to the lead national authority for preventing and countering terrorism, namely the Romanian Intelligence Service. Extending the national counterterrorism efforts to an international level, the authors propose the establishment – among the experts of the NATO member states of the Wider Black Sea Region – of a platform for the exchange of know-how and best practices in the field of critical infrastructure protection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Constantza%20Port" title="Constantza Port">Constantza Port</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies" title=" counter-terrorism policies"> counter-terrorism policies</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20protection" title=" critical infrastructure protection"> critical infrastructure protection</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=Wider%20Black%20Sea%20Region" title=" Wider Black Sea Region"> Wider Black Sea Region</a> </p> <a href="https://publications.waset.org/abstracts/90708/counter-terrorism-policies-in-the-wider-black-sea-region-evaluating-the-robustness-of-constantza-port-under-potential-terror-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2433</span> The Evolution of Strike and Intelligence Functions in Special Operations Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Hardy">John Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counterinsurgency" title="counterinsurgency">counterinsurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=irregular%20warfare" title=" irregular warfare"> irregular warfare</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20operations" title=" military operations"> military operations</a>, <a href="https://publications.waset.org/abstracts/search?q=special%20operations%20forces" title=" special operations forces"> special operations forces</a> </p> <a href="https://publications.waset.org/abstracts/94241/the-evolution-of-strike-and-intelligence-functions-in-special-operations-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2432</span> US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jordan%20Daud">Jordan Daud</a>, <a href="https://publications.waset.org/abstracts/search?q=Satriya%20Wibawa"> Satriya Wibawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Wahyu%20Wardhana"> Wahyu Wardhana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title="ASEAN">ASEAN</a>, <a href="https://publications.waset.org/abstracts/search?q=U.S." title=" U.S."> U.S.</a>, <a href="https://publications.waset.org/abstracts/search?q=counter%20terrorism" title=" counter terrorism"> counter terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=Muslim%20stereotypes" title=" Muslim stereotypes"> Muslim stereotypes</a> </p> <a href="https://publications.waset.org/abstracts/86978/us-asean-counter-terrorism-cooperation-maintaining-international-security-and-avoiding-muslim-stereotypes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2431</span> The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aulia%20Dwi%20Nastiti">Aulia Dwi Nastiti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20pattern" title="communication pattern">communication pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=darknet" title=" darknet"> darknet</a>, <a href="https://publications.waset.org/abstracts/search?q=extremist%20groups" title=" extremist groups"> extremist groups</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/42334/the-rise-of-darknet-a-call-for-understanding-online-communication-of-terrorist-groups-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2430</span> Effectiveness of European Active Labor Market Policies </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marwa%20Sahnoun">Marwa Sahnoun</a>, <a href="https://publications.waset.org/abstracts/search?q=Chokri%20Abdennadher"> Chokri Abdennadher </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article comes, very timely, to look at the effectiveness of active labor market policies (ALMP) in improving labor market outcomes. Using panel data estimates for 19 European countries during the period 2000-2012, this article showed the role of institutional factors, especially the role of employment policies implementation based on three variables: the allocation of resources for the implementation of policies, continuity and timing in the implementation of policies to capture their effectiveness on the labor market. Empirical results shows favor effect of training, employment incentives, sheltered employment and rehabilitation and direct job creation on the entire population employment growth. Results shows also that start-up incentives seems to be more effective in increasing employment than other types of policies. Importantly, two aspects are important in terms of implementation: public expenditure on program administration, e.g. (PES) watches the most favorable aspect and the continuity of policies implemented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20labor%20market%20policies" title="active labor market policies">active labor market policies</a>, <a href="https://publications.waset.org/abstracts/search?q=implementation" title=" implementation"> implementation</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20expenditure%20on%20program%20administration" title=" public expenditure on program administration"> public expenditure on program administration</a>, <a href="https://publications.waset.org/abstracts/search?q=start-up%20incentives" title=" start-up incentives"> start-up incentives</a>, <a href="https://publications.waset.org/abstracts/search?q=training" title=" training"> training</a> </p> <a href="https://publications.waset.org/abstracts/25733/effectiveness-of-european-active-labor-market-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25733.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2429</span> Digital Preservation Policies in the Institutional Repositories of Brazilian Federal Universities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laerte%20Pereira%20da%20Silva%20J%C3%BAnior">Laerte Pereira da Silva Júnior</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Manuel%20Borges"> Maria Manuel Borges</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Institutional Repositories (IR) are complex constructs that depend on political, cultural and technological aspects. Because IRs are a mirror of the organization's intellectual production, their main function is to make that production available worldwide, and also to consider its long term preservation. To this end, there is a need to define clearly the digital preservation policies supported by political decisions. There are several guidelines about the definition of digital preservation policies focusing in different themes from preservation planning to rights and restriction management, sustainability planning, etc., but this work aims to verify the implementation of digital preservation policies on the Institutional Repositories of the Federal Universities of Brazil. The methodology used was to check the information available on the websites of the IRs selected against two fields of the OpenDOAR, policies and OpenDOAR ID, to verify the existence of digital preservation policies. For this purpose a sample of the 21 of the 25 IRs registered at the Directory of Open Access Repositories (DOAR) was used, which is about 1/3 rd of the total of the brazilian universities. The 4 IRs that presented no information by the OpenDOAR team were desconsidered. The main conclusion is that most of the IRs of these universities have no polices clearly stated or no policies at all, and that there is a need to include these concerns at the top level management of IRs. The number of initiatives in digital preservation policies around the world stress the need of awareness of its importance in Brazil and requires measures to raise this awareness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brazil" title="Brazil">Brazil</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation%20policies" title=" digital preservation policies"> digital preservation policies</a>, <a href="https://publications.waset.org/abstracts/search?q=institutional%20repositories" title=" institutional repositories"> institutional repositories</a>, <a href="https://publications.waset.org/abstracts/search?q=openDOAR" title=" openDOAR"> openDOAR</a> </p> <a href="https://publications.waset.org/abstracts/24896/digital-preservation-policies-in-the-institutional-repositories-of-brazilian-federal-universities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24896.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">535</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2428</span> An Assessment on Awareness of Public Transport Policies for Persons with Disabilities in Three South-West Nigerian States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julius%20A.%20Ademokoya">Julius A. Ademokoya</a>, <a href="https://publications.waset.org/abstracts/search?q=Grace%20C.%20Ilori"> Grace C. Ilori</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Extreme public transport difficulty for persons with disabilities (PWDs) has always been one of the challenges which these individuals experience on a daily basis in Nigeria. Private and public transport vehicles are not disability- friendly. Operators of public transport are often very intolerant of PWDs' conditions. Indeed, many Nigerians believe it is luxury for PWDs to engage in public transport. They are rarely expected to be seen in public much less going to places via public transport means. Initiatives by a few Nigerian states to develop and implement public transport policies for PWDs, therefore, were a huge relief for them and some concerned Nigerians. A few years ago, three southwest Nigerian states (Lagos, Ondo, and Ekiti) came up with some legislative welfare provisions (including transport programmes) for PWDs. This study, therefore, sought to ascertain levels of awareness and implementation of public policies among the PWDs and those expected to implement the policies. The study adopted a mixed method research. Findings across the three states showed that: (1) awareness of public policies among PWDs is low and (2) a considerable scope of the policies is not yet implemented. Recommendations are, therefore, made on how to improve on awareness and implementation of transport policies for PWDs in three south-west Nigerian states. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=disability%20rights" title=" disability rights"> disability rights</a>, <a href="https://publications.waset.org/abstracts/search?q=implementation%20persons%20with%20disability" title=" implementation persons with disability"> implementation persons with disability</a>, <a href="https://publications.waset.org/abstracts/search?q=transport%20policies" title=" transport policies"> transport policies</a> </p> <a href="https://publications.waset.org/abstracts/105821/an-assessment-on-awareness-of-public-transport-policies-for-persons-with-disabilities-in-three-south-west-nigerian-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105821.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2427</span> The Economic Impact of State Paid Family Leave and Medical Acts on Working Families with Old and Disabled Adults</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ngoc%20Dao">Ngoc Dao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> State Paid Leave Programs (PFL) complement the Federal Family and Medical Leave Act (FMLA) by offering workers time off to take care of their newborns or sick family members with supplemental income, and further job protection. Up to date, four states (California, New Jersey, Rhode Island, and New York) implemented paid leave policies. This study adds further understanding of how state PFL policies help working families with elder parents improve their work balance by examining the paid leave policies on labor outcomes. Early findings suggest State Paid Leave Policies reduced the likelihood to exit the labor market by 1.6 percentage points, with larger effects among paid leave policies with job protection feature. In addition, the results imply job protection in paid leave policies matters in helping employed caregivers attach to the labor market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=family%20paid%20leave" title="family paid leave">family paid leave</a>, <a href="https://publications.waset.org/abstracts/search?q=working%20caregivers" title=" working caregivers"> working caregivers</a>, <a href="https://publications.waset.org/abstracts/search?q=employment" title=" employment"> employment</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20welfare" title=" social welfare"> social welfare</a> </p> <a href="https://publications.waset.org/abstracts/143334/the-economic-impact-of-state-paid-family-leave-and-medical-acts-on-working-families-with-old-and-disabled-adults" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2426</span> A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Louise%20Reyntjens">Louise Reyntjens</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belgium" title="Belgium">Belgium</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism%20strategies" title=" counterterrorism strategies"> counterterrorism strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=deprivation%20of%20citizenship" title=" deprivation of citizenship"> deprivation of citizenship</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=immigration%20law" title=" immigration law"> immigration law</a> </p> <a href="https://publications.waset.org/abstracts/98375/a-comparative-human-rights-analysis-of-deprivation-of-citizenship-as-a-counterterrorism-instrument-an-evaluation-of-belgium" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2425</span> Optimal Selection of Replenishment Policies Using Distance Based Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amit%20Gupta">Amit Gupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepak%20Juneja"> Deepak Juneja</a>, <a href="https://publications.waset.org/abstracts/search?q=Sorabh%20Gupta"> Sorabh Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a model based on distance based approach (DBA) method employed for evaluation, selection, and ranking of replenishment policies for a single location inventory, which hitherto not developed in the literature. This work recognizes the significance of the selection problem, identifies the selection criteria, the relative importance of selection criteria for this research problem. The developed model is capable of comparing any number of alternate inventory policies for various selection criteria where cardinal values are assigned as a rating to alternate inventory polices for selection criteria and weights of selection criteria. The illustrated example demonstrates the model and presents the result in terms of ranking of replenishment policies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DBA" title="DBA">DBA</a>, <a href="https://publications.waset.org/abstracts/search?q=ranking" title=" ranking"> ranking</a>, <a href="https://publications.waset.org/abstracts/search?q=replenishment%20policies" title=" replenishment policies"> replenishment policies</a>, <a href="https://publications.waset.org/abstracts/search?q=selection%20criteria" title=" selection criteria"> selection criteria</a> </p> <a href="https://publications.waset.org/abstracts/116031/optimal-selection-of-replenishment-policies-using-distance-based-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116031.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2424</span> A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Louise%20Reyntjens">Louise Reyntjens</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belgium" title="Belgium">Belgium</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism%20strategies" title=" counterterrorism strategies"> counterterrorism strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=immigration%20law" title=" immigration law"> immigration law</a> </p> <a href="https://publications.waset.org/abstracts/98078/a-comparative-human-rights-analysis-of-the-securitization-of-migration-in-the-fight-against-terrorism-in-europe-an-evaluation-of-belgium" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2423</span> Communication Policies of Turkey Related to European Union</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammet%20Erbay">Muhammet Erbay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The phenomenon of communication that has been studied by different disciplines has social, political and economical aspects. The scope of communication has extended from a traditional content to the modern world which is under the control of mass media. Nowadays, thanks to globalization and technological facilities, many companies, public or international institutions take advantage of new communication technologies and overhaul their policies. European Union (EU) is one of the effective institutions in this sphere. It aims to harmonize the communication infrastructure and policies of member countries which have gone through the process of political unification. It is a significant problem for the unification of EU to have legal restrictions or critical differences in communication facilities among countries while technology stands at the center of economic and social life. Therefore, EU institutions place a particular importance to their communication policies. Besides, communication processes have a vital importance in creating a European public opinion in the process of political integration. Based on the evaluation above, the aim of this paper is to analyze the cohesion process of Turkey that tries to take an active role in EU communication policies and has on-going negotiations. This article does not only confine itself to the technical details of communication policies but also aims to evaluate socio-political dimension of the process. Therefore, a corporate review has been featured in the study and Turkey's compliance process in communication policies on European Union has been evaluated by the means of deduction method. Some problematic areas have been identified in compliance process on communication policies such as human rights and minority rights, whereas compliance process on communication infrastructure and technology proceeds effectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20policies" title="communication policies">communication policies</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Union" title=" European Union"> European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/10167/communication-policies-of-turkey-related-to-european-union" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2422</span> Gender Responsiveness of Water, Sanitation Policies and Legal Frameworks at Makerere University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Harriet%20Kebirungi">Harriet Kebirungi</a>, <a href="https://publications.waset.org/abstracts/search?q=Majaliwa%20Jackson-Gilbert%20Mwanjalolo"> Majaliwa Jackson-Gilbert Mwanjalolo</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Livingstone%20Luboobi"> S. Livingstone Luboobi</a>, <a href="https://publications.waset.org/abstracts/search?q=Richard%20Joseph%20Kimwaga"> Richard Joseph Kimwaga</a>, <a href="https://publications.waset.org/abstracts/search?q=Consolata%20Kabonesa"> Consolata Kabonesa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper assessed gender responsiveness of water and sanitation policies and legal frameworks at Makerere University, Uganda. The objectives of the study were to i) examine the gender responsiveness of water and sanitation related policies and frameworks implemented at Makerere University; and ii) assess the challenges faced by the University in customizing national water and sanitation policies and legal frameworks into University policies. A cross-sectional gender-focused study design was adopted. A checklist was developed to analyze national water and sanitation policies and legal frameworks and University based policies. In addition, primary data was obtained from Key informants at the Ministry of Water and Environment and Makerere University. A gender responsive five-step analytical framework was used to analyze the collected data. Key findings indicated that the policies did not adequately address issues of gender, water and sanitation and the policies were gender neutral consistently. The national policy formulation process was found to be gender blind and not backed by situation analysis of different stakeholders including higher education institutions like Universities. At Makerere University, due to lack of customized and gender responsive water and sanitation policy and implementation framework, there were gender differences and deficiencies in access to and utilization of water and sanitation facilities. The University should take advantage of existing expertise within them to customize existing national water policies and gender, and water and sanitation sub-sector strategy. This will help the University to design gender responsive, culturally acceptable and environmental friendly water and sanitation systems that provide adequate water and sanitation facilities that address the needs and interests of male and female students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender" title="gender">gender</a>, <a href="https://publications.waset.org/abstracts/search?q=Makerere%20University" title=" Makerere University"> Makerere University</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=water" title=" water"> water</a>, <a href="https://publications.waset.org/abstracts/search?q=sanitation" title=" sanitation"> sanitation</a> </p> <a href="https://publications.waset.org/abstracts/70074/gender-responsiveness-of-water-sanitation-policies-and-legal-frameworks-at-makerere-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70074.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">403</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2421</span> State Capacity and the Adoption of Restrictive Asylum Policies in Developing Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duncan%20K.%20Espenshade">Duncan K. Espenshade</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scholars have established expectations regarding how the political and economic interests of a country's people and elites can influence its migration policies. Most of the scholarship exploring the adoption of migration policies focuses on the developed world, focusing on the cultural, political, and economic influences that drive restrictive policies in developed countries. However, despite the scholarly focus on migration policies in developed countries, most internationally displaced people reside in developing countries. Furthermore, while the political and economic factors that influence migration policy in developed countries are likely at play in developing states, developing states also face unique hurdles to policy formation not present in developed states. Namely, this article explores how state capacity, or in this context, a state's de facto ability to restrict or absorb migration inflows, influences the adoption of migration policies in developing countries. Using Cox-Proportional hazard models and recently introduced data on asylum policies in developing countries, this research finds that having a greater ability to restrict migration flows is associated with a reduced likelihood of adopting liberal asylum policies. Future extensions of this project will explore the adoption of asylum policies as a two-stage process, in which the available decision set of political actors is first constrained by a state's restrictive and absorptive capacity in the first stage, with the political, economic, and cultural factors influencing the policy adopted in the second stage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=state%20capacity" title="state capacity">state capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20relations" title=" international relations"> international relations</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20policy" title=" foreign policy"> foreign policy</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a> </p> <a href="https://publications.waset.org/abstracts/154951/state-capacity-and-the-adoption-of-restrictive-asylum-policies-in-developing-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154951.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2420</span> Accounting Policies in Polish and International Legal Regulations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Piotr%20Prewysz-Kwinto">Piotr Prewysz-Kwinto</a>, <a href="https://publications.waset.org/abstracts/search?q=Grazyna%20Voss"> Grazyna Voss</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Accounting policies are a set of solutions compliant with legal regulations that an entity selects and adopts, and which guarantee a proper quality of financial statements. Those solutions may differ depending on whether the entity adopts national or international accounting standards. The aim of this article is to present accounting principles (policies) in Polish and international legal regulations and their adoption in selected Polish companies listed on the Warsaw Stock Exchange. The research method adopted in this work is the analysis and evaluation of legal conditions in Polish companies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accounting%20policies" title="accounting policies">accounting policies</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20financial%20reporting%20standards" title=" international financial reporting standards"> international financial reporting standards</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20statement" title=" financial statement"> financial statement</a>, <a href="https://publications.waset.org/abstracts/search?q=method%20of%20measuring" title=" method of measuring"> method of measuring</a> </p> <a href="https://publications.waset.org/abstracts/13677/accounting-policies-in-polish-and-international-legal-regulations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13677.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">381</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2419</span> Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishtiaq%20Ahmad%20Gondal">Ishtiaq Ahmad Gondal</a>, <a href="https://publications.waset.org/abstracts/search?q=Mubasher%20Hussain"> Mubasher Hussain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20justice" title="social justice">social justice</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20policy" title=" educational policy"> educational policy</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/149366/education-as-a-tool-for-counterterrorism-to-promote-peace-and-social-justice-the-role-of-sheikh-zayed-islamic-centre-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2418</span> Privacy Label: An Alternative Approach to Present Privacy Policies from Online Services to the User</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diego%20Roberto%20Goncalves%20De%20Pontes">Diego Roberto Goncalves De Pontes</a>, <a href="https://publications.waset.org/abstracts/search?q=Sergio%20Donizetti%20Zorzo"> Sergio Donizetti Zorzo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Studies show that most users do not read privacy policies from the online services they use. Some authors claim that one of the main causes of this is that policies are long and usually hard to understand, which make users lose interest in reading them. In this scenario, users may agree with terms without knowing what kind of data is being collected and why. Given that, we aimed to develop a model that would present the privacy policies contents in an easy and graphical way for the user to understand. We call it the Privacy Label. Using information recovery techniques, we propose an architecture that is able to extract information about what kind of data is being collected and to what end in the policies and show it to the user in an automated way. To assess our model, we calculated the precision, recall and f-measure metrics on the information extracted by our technique. The results for each metric were 68.53%, 85.61% e 76,13%, respectively, making it possible for the final user to understand which data was being collected without reading the whole policy. Also, our proposal can facilitate the notice-and-choice by presenting privacy policy information in an alternative way for online users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy" title="privacy">privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20behavior" title=" user behavior"> user behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20human%20interaction" title=" computer human interaction"> computer human interaction</a> </p> <a href="https://publications.waset.org/abstracts/51017/privacy-label-an-alternative-approach-to-present-privacy-policies-from-online-services-to-the-user" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2417</span> Too Well to Die; Too Ill to Live</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Deepak%20Jugran">Deepak Jugran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The last century has witnessed rapid scientific growth, and social policies mainly targeted to increase the “life expectancy” of the people. As a result of these developments, the aging as well as ailing population, is increasing by every day. Despite an increase in “life expectancy”, we have not recorded compression in morbidity numbers as the age of onset of the majority of health issues has not increased substantially. In recent years, the prevalence of chronic diseases along with the improved treatment has also resulted in the increase of people living with chronic diseases. The last decade has also focused on social policies to increase the life expectancy in the population; however, in recent decades, social policies and biomedical research are gradually shifting on the potential of increasing healthy life or healthspan. In this article, we review the existing framework of lifespan and healthspan and wish to ignite a discussion among social scientists and public health experts to propose a wholistic framework to balance the trade-offs on social policies for “lifespan” and “healthspan”. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lifespan" title="lifespan">lifespan</a>, <a href="https://publications.waset.org/abstracts/search?q=healthspan" title=" healthspan"> healthspan</a>, <a href="https://publications.waset.org/abstracts/search?q=chronic%20diseases" title=" chronic diseases"> chronic diseases</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20policies" title=" social policies"> social policies</a> </p> <a href="https://publications.waset.org/abstracts/153332/too-well-to-die-too-ill-to-live" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153332.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2416</span> Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Widhi%20Hanantyo%20Suryadinata">Widhi Hanantyo Suryadinata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=global%20renewable%20energy%20security" title="global renewable energy security">global renewable energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20energy%20security" title=" global energy security"> global energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=policy%20development" title=" policy development"> policy development</a>, <a href="https://publications.waset.org/abstracts/search?q=comparative%20analysis" title=" comparative analysis"> comparative analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=shifting%20of%20global%20energy%20security" title=" shifting of global energy security"> shifting of global energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a> </p> <a href="https://publications.waset.org/abstracts/184007/shifting-of-global-energy-security-a-comparative-analysis-of-indonesia-and-chinas-renewable-energy-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2415</span> Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=John%20Hardy">John Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter%20terrorism" title="counter terrorism">counter terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=homeland%20security" title=" homeland security"> homeland security</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgency" title=" insurgency"> insurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20coercion" title=" political coercion"> political coercion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movement%20theory" title=" social movement theory"> social movement theory</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/96082/political-coercion-from-within-theoretical-convergence-in-the-strategies-of-terrorist-groups-insurgencies-and-social-movements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2414</span> Policy Compliance in Information Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Manjula">R. Manjula</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaustav%20Bagchi"> Kaustav Bagchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sushant%20Ramesh"> Sushant Ramesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Anush%20Baskaran"> Anush Baskaran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title="information technology">information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=involvement%20theory" title=" involvement theory"> involvement theory</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20bond%20theory" title=" social bond theory"> social bond theory</a> </p> <a href="https://publications.waset.org/abstracts/59601/policy-compliance-in-information-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59601.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2413</span> Developing Human Resources through Inclusive Education: A Study of Effectiveness of Government Policies in India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Kumar%20Srivastava">Sanjay Kumar Srivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajesh%20Srivastava"> Rajesh Srivastava</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Human resource is the key point of success of any economy. From the past few decades, policies started to move in the route of expanding inclusive education with effective involvement of government.Governments of developing nations are generating policies for educational upliftment. Applying educational policies, the motive of the government is to maintain and develop the effective human resource within a society. The attention of the government includes primary education to higher education. It also involves professional training programmes related to every discipline. The aim of this paper is to find out the government policies in terms of expenditure and achievements for inclusive education to develop human resources in developing countries. A case of Indian experience has been taken into consideration. This approach generates a picture as to how India is enriching its educational system for human resource development and this research study will be useful for the policy makers to determine the appropriate level of overall spending of government and achievements in the education system for human resource development. Analytical research methodology has been adopted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=government%20policies" title="government policies">government policies</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusive%20education" title=" inclusive education"> inclusive education</a>, <a href="https://publications.waset.org/abstracts/search?q=National%20Educational%20Policy" title=" National Educational Policy"> National Educational Policy</a>, <a href="https://publications.waset.org/abstracts/search?q=NCERT" title=" NCERT"> NCERT</a> </p> <a href="https://publications.waset.org/abstracts/51422/developing-human-resources-through-inclusive-education-a-study-of-effectiveness-of-government-policies-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">322</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2412</span> Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Venugopal%20Rao%20Gudlur">Venkata Venugopal Rao Gudlur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=Process%20Management" title=" Process Management"> Process Management</a>, <a href="https://publications.waset.org/abstracts/search?q=Forensic%20Investigation" title=" Forensic Investigation"> Forensic Investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M%20Framework" title=" M2M Framework"> M2M Framework</a> </p> <a href="https://publications.waset.org/abstracts/154606/importance-of-new-policies-of-process-management-for-internet-of-things-based-on-forensic-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2411</span> Trade and Environmental Policy Strategies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olakunle%20Felix%20Adekunle">Olakunle Felix Adekunle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the recent years several non-tariff provisions have been regarded as means holding back transboundary environmental damages. Affected countries have then increasingly come up with trade policies to compensate for or to In recent years, several non‐tariff trade provisions have been regarded as means of holding back transboundary environmental damages. Affected countries have then increasingly come up with trade policies to compensate for or to enforce the adoption of environmental policies elsewhere. These non‐tariff trade constraints are claimed to threaten the freedom of trading across nations, as well as the harmonization sought towards the distribution of income and policy measures. Therefore the ‘greening’ of world trade issues essentially ranges over whether there ought or ought not to be a trade‐off between trade and environmental policies. The impacts of free trade and environmental policies on major economic variables (such as trade flows, balances of trade, resource allocation, output, consumption and welfare) are thus studied here, and so is the EKC hypothesis, when such variables are played against the resulting emission levels. The policy response is seen as a political game, played here by two representative parties named North and South. Whether their policy choices, simulated by four scenarios, are right or wrong depends on their policy goals, split into economic and environmental ones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental" title="environmental">environmental</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=strategies" title=" strategies"> strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=constraint" title=" constraint"> constraint</a> </p> <a href="https://publications.waset.org/abstracts/34019/trade-and-environmental-policy-strategies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2410</span> Brazilian Environmental Public Policies Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Estela%20Macedo%20Alves">Estela Macedo Alves</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is an overview on public policy analysis focused on the study of Brazilian public policy making process. The methodology is based on the review of some theories on the subject, linking them to Brazilian reality. The study presents basic policy analysis concepts, such as policy, polity and politics. It is emphasized John Kingdon's Multiple Stream Model, because of its clarifying aspects concerning public policies formulation process in democratic countries. In this path it was possible to establish interpretations on environmental public policies in Brazil and understand its methods, instead of presenting only a case study. At the end, it is possible to connect theory with Brazilian reality, identifying negative and positive points of its political processes and structure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brazilian%20policies" title="Brazilian policies">Brazilian policies</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20public%20policy" title=" environmental public policy"> environmental public policy</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20stream%20model" title=" multiple stream model"> multiple stream model</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20policy%20analysis" title=" public policy analysis"> public policy analysis</a> </p> <a href="https://publications.waset.org/abstracts/7839/brazilian-environmental-public-policies-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7839.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=81">81</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=82">82</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=counter-terrorism%20policies&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10