CINXE.COM
Search results for: isis
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: isis</title> <meta name="description" content="Search results for: isis"> <meta name="keywords" content="isis"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="isis" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="isis"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 42</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: isis</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> ISIS Resurgence in the Era of COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stacey%20Pollard">Stacey Pollard</a>, <a href="https://publications.waset.org/abstracts/search?q=Henry%20Baraket"> Henry Baraket</a>, <a href="https://publications.waset.org/abstracts/search?q=Girish%20Ganesan"> Girish Ganesan</a>, <a href="https://publications.waset.org/abstracts/search?q=Natalie%20Kim"> Natalie Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Terrorism" title="Terrorism">Terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20State" title=" Islamic State"> Islamic State</a>, <a href="https://publications.waset.org/abstracts/search?q=Instability" title=" Instability"> Instability</a>, <a href="https://publications.waset.org/abstracts/search?q=Iraq" title=" Iraq"> Iraq</a>, <a href="https://publications.waset.org/abstracts/search?q=Syria" title=" Syria"> Syria</a>, <a href="https://publications.waset.org/abstracts/search?q=Global" title=" Global"> Global</a>, <a href="https://publications.waset.org/abstracts/search?q=Resurgence" title=" Resurgence"> Resurgence</a> </p> <a href="https://publications.waset.org/abstracts/160150/isis-resurgence-in-the-era-of-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160150.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Spyridon%20Plakoudas">Spyridon Plakoudas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ISIS" title="ISIS">ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-jihad" title=" cyber-jihad"> cyber-jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Syrian%20Civil%20War" title=" Syrian Civil War"> Syrian Civil War</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgency%20and%20counter-insurgency" title=" insurgency and counter-insurgency"> insurgency and counter-insurgency</a> </p> <a href="https://publications.waset.org/abstracts/117835/isis-after-the-defeat-of-the-islamic-caliphate-the-rise-of-cyber-jihad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Kocapinar">Serkan Kocapinar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ISIS" title="ISIS">ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a> </p> <a href="https://publications.waset.org/abstracts/41156/an-analyze-on-isis-terror-organization-the-reasons-that-emerged-isis-and-its-effects-on-both-local-and-global-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41156.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Financial and Human Resources of Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdurrahman%20Karacabey">Abdurrahman Karacabey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=financial%20resources" title="financial resources">financial resources</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20resources" title=" human resources"> human resources</a>, <a href="https://publications.waset.org/abstracts/search?q=isis" title=" isis"> isis</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/27503/financial-and-human-resources-of-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27503.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">412</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Should the U.S. Rely on Drone Strikes to Combat the Islamic State? Why Deploying a Drone Campaign against ISIS Will Do Nothing to Address the Causes of the Insurgency or Prevent Its Resurgence?</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Danielle%20Jablanski">Danielle Jablanski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article addresses the use of drone strikes under international law and the intersection between Islamic law and current terrorist trends worldwide. It breaks down the legality of drone strikes under international law and dissects certain aspects of their usage in modern warfare; i.e. concepts of directly participating in hostilities and the role of CIA operators. The article then looks at international paradigms of law enforcement versus the use of military force in relation to terrorism. Lastly, it describes traditional aspects of Islamic law and several interpretations of the law today as applied to widespread campaigns of terrorism, namely that of the recent group ISIS or ISIL operating between the battlegrounds of Iraq and Syria. The piece concludes with appraisals for moving forward on the basis of honing in on reasons for terrorism and negative opinions of solely military campaigns to dismantle or disrupt terror organizations and breeding grounds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20law" title="international law">international law</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=islamic%20law" title=" islamic law"> islamic law</a> </p> <a href="https://publications.waset.org/abstracts/24847/should-the-us-rely-on-drone-strikes-to-combat-the-islamic-state-why-deploying-a-drone-campaign-against-isis-will-do-nothing-to-address-the-causes-of-the-insurgency-or-prevent-its-resurgence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> From the Local to the Global: New Terrorism </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shamila%20Ahmed">Shamila Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=war%20on%20terror" title=" war on terror"> war on terror</a>, <a href="https://publications.waset.org/abstracts/search?q=cosmopolitanism" title=" cosmopolitanism"> cosmopolitanism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20level%20terrorism" title=" global level terrorism"> global level terrorism</a> </p> <a href="https://publications.waset.org/abstracts/28001/from-the-local-to-the-global-new-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28001.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">584</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Feisal%20Khudher%20Mahmood">Feisal Khudher Mahmood</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Samad%20Rahman%20Sultan"> Abdul Samad Rahman Sultan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internal%20displacement" title="internal displacement">internal displacement</a>, <a href="https://publications.waset.org/abstracts/search?q=Iraq" title=" Iraq"> Iraq</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20security" title=" human security"> human security</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS" title=" GIS"> GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial-statical%20analysis" title=" spatial-statical analysis"> spatial-statical analysis</a> </p> <a href="https://publications.waset.org/abstracts/31723/internal-displacement-in-iraq-due-to-isis-occupation-and-its-effects-on-human-security-and-coexistence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31723.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">525</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Discursive Legitimation Strategies in ISIS’ Online Magazine, Dabiq: A Discourse Historical Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sahar%20Rasoulikolamaki">Sahar Rasoulikolamaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ISIS (also known as DAASH) is an Islamic fundamentalist group that has been known as a global threat to the whole world for their radicalizing approach and application of online platforms as a tool to portray their activities, to disseminate their ideology, and to commit recruiting activities. This study is an attempt to carry out a critical discourse analysis on the argumentative devices by which ISIS legitimizes or delegitimizes positive or negative constructions of social practices in Dabiq. It tries to shed light on how texts in Dabiq as linguistic elements in the micro level of analysis relate to ISIS’ ideology as the higher-up macro level and in other words, how local structures contributed to the construction and transference of a global structure or ideology and vice versa. Therefore, following the relevant analytical frameworks, the study focuses on both micro-level of analysis of arguments (topoi) and macro-structure of legitimation and delegitimation in Dabiq. This purpose is nailed using the analytical categories and tools provided by Wodak’s Discourse Historical Approach (DHA) such as argumentation strategies (topoi), by which the coded language of legitimation/delegitimation and persuasion as used in Dabiq are explored. The ensuing findings demonstrate that Dabiq rigorously relies on the positive representation of the in-group course of actions and justifying its violence and, at the same time, the negative representation of the out-group behavior through implementing various topoi to achieve its desired outcome, which is the ideological manipulation and powerful self-depiction, as well as the supporter recruitment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=argumentation" title="argumentation">argumentation</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse-historical%20approach" title=" discourse-historical approach"> discourse-historical approach</a>, <a href="https://publications.waset.org/abstracts/search?q=ideology" title=" ideology"> ideology</a>, <a href="https://publications.waset.org/abstracts/search?q=legitimation%20and%20delegitimation" title=" legitimation and delegitimation"> legitimation and delegitimation</a>, <a href="https://publications.waset.org/abstracts/search?q=topoi" title=" topoi"> topoi</a> </p> <a href="https://publications.waset.org/abstracts/96846/discursive-legitimation-strategies-in-isis-online-magazine-dabiq-a-discourse-historical-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Using the Family Justice System to Respond to ISIS Returnees: The UK Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fatima%20Ahdash">Fatima Ahdash</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last 6-7 years, the UK has resorted to using the family courts and the family justice system more generally as a way of dealing with children and young people either traveling to or returning from ISIS territories in the Middle East. This is an important innovation in counter-terrorism laws and practices in the UK: never before have the family courts been used for the purpose of preventing and countering terrorism anywhere in the world. This paper will examine this innovation; it will explore how, why, and the implications of the interaction between family law and counter-terrorism, particularly on the human rights of the parents and children involved. It will question whether the use of the family courts provides a more useful, and perhaps human rights compliant, method of tackling terrorism and extremism when compared to other more Draconian legal and administrative methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title="counter-terrorism">counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=family%20justice" title=" family justice"> family justice</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a> </p> <a href="https://publications.waset.org/abstracts/141894/using-the-family-justice-system-to-respond-to-isis-returnees-the-uk-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">212</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> The Influence of the Islamic State (IS) on India: Recent Developments and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alvite%20Singh%20Ningthoujam">Alvite Singh Ningthoujam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=India" title="India">India</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20State" title=" Islamic State"> Islamic State</a>, <a href="https://publications.waset.org/abstracts/search?q=Muslim" title=" Muslim"> Muslim</a>, <a href="https://publications.waset.org/abstracts/search?q=Security" title=" Security"> Security</a> </p> <a href="https://publications.waset.org/abstracts/20092/the-influence-of-the-islamic-state-is-on-india-recent-developments-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20092.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> The Rite of Jihadification in ISIS Modified Video Games: Mass Deception and Dialectic of Religious Regression in Technological Progression</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venus%20Torabi">Venus Torabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ISIS, the terrorist organization, modified two videogames, ARMA III and Grand Theft Auto 5 (2013) as means of online recruitment and ideological propaganda. The urge to study the mechanism at work, whether it has been successful or not, derives (Digital) Humanities experts to explore how codes of terror, Islamic ideology and recruitment strategies are incorporated into the ludic mechanics of videogames. Another aspect of the significance lies in the fact that this is a latent problem that has not been fully addressed in an interdisciplinary framework prior to this study, to the best of the researcher’s knowledge. Therefore, due to the complexity of the subject, the present paper entangles with game studies, philosophical and religious poles to form the methodology of conducting the research. As a contextualized epistemology of such exploitation of videogames, the core argument is building on the notion of “Culture Industry” proposed by Theodore W. Adorno and Max Horkheimer in Dialectic of Enlightenment (2002). This article posits that the ideological underpinnings of ISIS’s cause corroborated by the action-bound mechanics of the videogames are in line with adhering to the Islamic Eschatology as a furnishing ground and an excuse in exercising terrorism. It is an account of ISIS’s modification of the videogames, a tool of technological progression to practice online radicalization. Dialectically, this practice is packed up in rhetoric for recognizing a religious myth (the advent of a savior), as a hallmark of regression. The study puts forth that ISIS’s wreaking havoc on the world, both in reality and within action videogames, is negotiating the process of self-assertion in the players of such videogames (by assuming one’s self a member of terrorists) that leads to self-annihilation. It tries to unfold how ludic Mod videogames are misused as tools of mass deception towards ethnic cleansing in reality and line with the distorted Eschatological myth. To conclude, this study posits videogames to be a new avenue of mass deception in the framework of the Culture Industry. Yet, this emerges as a two-edged sword of mass deception in ISIS’s modification of videogames. It shows that ISIS is not only trying to hijack the minds through online/ludic recruitment, it potentially deceives the Muslim communities or those prone to radicalization into believing that it's terrorist practices are preparing the world for the advent of a religious savior based on Islamic Eschatology. This is to claim that the harsh actions of the videogames are potentially breeding minds by seeds of terrorist propaganda and numbing them to violence. The real world becomes an extension of that harsh virtual environment in a ludic/actual continuum, the extension that is contributing to the mass deception mechanism of the terrorists, in a clandestine trend. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culture%20industry" title="culture industry">culture industry</a>, <a href="https://publications.waset.org/abstracts/search?q=dialectic" title=" dialectic"> dialectic</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=islamic%20eschatology" title=" islamic eschatology"> islamic eschatology</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20deception" title=" mass deception"> mass deception</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20games" title=" video games"> video games</a> </p> <a href="https://publications.waset.org/abstracts/107838/the-rite-of-jihadification-in-isis-modified-video-games-mass-deception-and-dialectic-of-religious-regression-in-technological-progression" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> ISIS and Its Impact on Geographical Change in Iraq’s Population</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pshtiwan%20Shafiq%20Ahmed">Pshtiwan Shafiq Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The invasion of Iraq was a turning point in Iraq, destroying the economic infrastructure of several important strategic and historic cities, including Mosul, Anbar and Diyala, which will take decades to rebuild It left 18,805 people dead and 37,000 injured, destroying hundreds of villages and cities, displacing 2.3 million people, and increasing the number of orphans The increase in the number of windows and the destruction of society and the structure of the population so that the number of children, women and the elderly has increased. Religious clashes have increased and religious cleansing has begun, trying to eradicate Christianity, Yazidis and Kakais from the whole of Iraq, causing the largest number of Christians, Yazidis and Kakais to leave Iraq and many of them went missing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ISIS" title="ISIS">ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=population%20change" title=" population change"> population change</a>, <a href="https://publications.waset.org/abstracts/search?q=geographical%20change" title=" geographical change"> geographical change</a>, <a href="https://publications.waset.org/abstracts/search?q=Iraq" title=" Iraq"> Iraq</a> </p> <a href="https://publications.waset.org/abstracts/158414/isis-and-its-impact-on-geographical-change-in-iraqs-population" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158414.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Islamic Extremist Groups' Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Irfan">Muhammad Irfan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=populism" title="populism">populism</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization" title=" radicalization"> radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=Taliban" title=" Taliban"> Taliban</a>, <a href="https://publications.waset.org/abstracts/search?q=shariah" title=" shariah"> shariah</a>, <a href="https://publications.waset.org/abstracts/search?q=jihad" title=" jihad"> jihad</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=Europe" title=" Europe"> Europe</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20communication" title=" political communication"> political communication</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=migrants" title=" migrants"> migrants</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=extremism" title=" extremism"> extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20terror" title=" global terror"> global terror</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20analysis" title=" predictive analysis"> predictive analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=early%20warning%20detection" title=" early warning detection"> early warning detection</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20communication" title=" strategic communication"> strategic communication</a>, <a href="https://publications.waset.org/abstracts/search?q=populist%20narratives" title=" populist narratives"> populist narratives</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20extremism" title=" Islamic extremism"> Islamic extremism</a> </p> <a href="https://publications.waset.org/abstracts/104677/islamic-extremist-groups-usage-of-populism-in-social-media-to-radicalize-muslim-migrants-in-europe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104677.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Holroyd">Christopher Holroyd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20trafficking" title="human trafficking">human trafficking</a>, <a href="https://publications.waset.org/abstracts/search?q=reconstruction" title=" reconstruction"> reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/127631/human-trafficking-and-terrorism-a-study-on-the-security-challenges-imposed-upon-countries-in-conflict" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127631.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Talking to Ex-Islamic State Fighters inside Iraqi Prisons: An Arab Woman’s Perspective on Radicalization and Deradicalization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Suha%20Hassen">Suha Hassen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to untangle the complexity of conducting face-to-face interviews with 80 ex-Islamic State fighters, encompassing three groups: local Iraqis, Arabs from the Middle East, and international fighters from around the globe. Each interview lasted approximately two hours and was conducted in both Arabic and English, focusing on the motivations behind joining the Islamic State and the pathways and mechanisms facilitating their involvement. The phenomenon of individuals joining violent Islamist extremist and jihadist organizations is multifaceted, drawing substantial attention within terrorism and security studies. Organizations such as the Islamic State, Hezbollah, Hamas, and Al-Qaeda pose formidable threats to international peace and stability, employing various terrorist tactics for radicalization and recruitment. However, significant gaps remain in current studies, including a lack of firsthand accounts, an inadequate understanding of original narratives (religious and linguistic) due to abstraction and misinterpretation of motivations, and a lack of Arab women's perspectives from the region. This study addresses these gaps by exploring the cultural, religious, and historical complexities that shape the narratives of ex-ISIS fighters. The paper will showcase three distinct cases: one French prisoner, one Moroccan fighter, and a local Iraqi, illustrating the diverse motivations and experiences that contribute to joining and leaving extremist groups. The findings provide valuable insights into the nuanced dynamics of radicalization, emphasizing the need for gender-sensitive approaches in counter-terrorism strategies and deradicalization programs. Importantly, this research has practical implications for counter-narrative policies and early-stage prevention of radicalization. By understanding the narratives used by ex-fighters, policymakers can develop targeted counter-narratives that disrupt recruitment efforts. Additionally, insights into the mechanisms of radicalization can inform early intervention programs, helping to identify and support at-risk individuals before they become entrenched in extremist ideologies. Ultimately, this research enhances our understanding of the individual experiences of ex-ISIS fighters and calls for a reevaluation of the narratives surrounding women’s roles in extremism and recovery. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arab%20women%20in%20extremism" title="Arab women in extremism">Arab women in extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-narrative%20policy" title=" counter-narrative policy"> counter-narrative policy</a>, <a href="https://publications.waset.org/abstracts/search?q=ex-ISIS%20fighters%20in%20Iraq" title=" ex-ISIS fighters in Iraq"> ex-ISIS fighters in Iraq</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization" title=" radicalization"> radicalization</a> </p> <a href="https://publications.waset.org/abstracts/191755/talking-to-ex-islamic-state-fighters-inside-iraqi-prisons-an-arab-womans-perspective-on-radicalization-and-deradicalization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191755.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Alati">Daniel Alati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Canada" title="Canada">Canada</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20Kingdom%20and%20South%20East%20Asia" title=" United Kingdom and South East Asia"> United Kingdom and South East Asia</a>, <a href="https://publications.waset.org/abstracts/search?q=comparative%20law%20and%20politics" title=" comparative law and politics"> comparative law and politics</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization%20to%20violent%20extremism" title=" radicalization to violent extremism"> radicalization to violent extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/84599/countering-radicalization-to-violent-extremism-a-comparative-study-of-canada-the-uk-and-south-east-asia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Al-Azhar’s Ideological Capacity to Counter Extremism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dina%20Tawfic">Dina Tawfic</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20Hassan"> Robert Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The current chapter addresses Al-Azhar's strategy to counter extremism in tandem with reflecting on the ideology of the Islamic establishment itself. The topic is motivated by the fact that some of the Western governments have been relying on Al-Azhar to counter the ideology of Islamist radicalism and violent extremism, in particular during the rise of the Islamic State in Syria and Iraq (known as ISIS/ ISIL/ Daesh) in 2014/2015. In his visit to Egypt in June 2016, Brett McGurk, the then U.S. envoy for the global coalition to counter ISIS, commended Al-Azhar’s “intellectual and reforming role” in refuting the ideology of extremism. On the other hand, Egyptian liberal intellectuals, such as Farag Fouda (1945- 1992) and Nasr Hamed Abu Zeid (1943-2010), had always questioned the ideological capability of Al-Azhar to counter extremism, citing the rigidity and resistance of the Islamic establishment to carry out genuine reformation. This chapter aims to discuss the following research questions: what is the strategy of Al-Azhar to counter extremism? Does Al-Azhar have a solid strategy to combat online propaganda produced by violent extremist groups? Is it applicable to identify Al-Azhar ideological identity? and is it capable of countering extremism? To answer these questions, I conducted intensive interviews with seven senior scholars and officials at Al-Azhar and the Endowments ministry from September to December 2020. Using a qualitative approach as a backdrop, this project uses semi-structured interviews to collect data. Participants were briefed on the purpose of the study and consented to be interviewed and to record their interviews. Some of the participants chose to conceal their names. All the interviews were conducted in Arabic via Zoom. The researcher then transcribed and translated the interviews into English. A purposive sample is used to select the seven interviewees, based on their prominence and experience in the field of counter-extremism and Al-Azhar affairs. The researcher uses a snowball sample to select the sample, in which a personal contact recommends other officials within the establishment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Al-Azhar" title="Al-Azhar">Al-Azhar</a>, <a href="https://publications.waset.org/abstracts/search?q=Egypt" title="Egypt">Egypt</a>, <a href="https://publications.waset.org/abstracts/search?q=Counter-Extremism" title="Counter-Extremism">Counter-Extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=Political%20Islam" title="Political Islam">Political Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=Ideology" title="Ideology">Ideology</a> </p> <a href="https://publications.waset.org/abstracts/139968/al-azhars-ideological-capacity-to-counter-extremism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139968.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Predictive Maintenance Based on Oil Analysis Applicable to Transportation Fleets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Israel%20Ibarra%20Solis">Israel Ibarra Solis</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20Carlos%20Rodriguez%20Sierra"> Juan Carlos Rodriguez Sierra</a>, <a href="https://publications.waset.org/abstracts/search?q=Ma.%20del%20Carmen%20Salazar%20Hernandez"> Ma. del Carmen Salazar Hernandez</a>, <a href="https://publications.waset.org/abstracts/search?q=Isis%20Rodriguez%20Sanchez"> Isis Rodriguez Sanchez</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Perez%20Guerrero"> David Perez Guerrero</a> </p> <p class="card-text"><strong>Abstract:</strong></p> At the present paper we try to explain the analysis techniques use for the lubricating oil in a maintenance period of a city bus (Mercedes Benz Boxer 40), which is call ‘R-24 route’, line Coecillo Centro SA de CV in Leon Guanajuato, to estimate the optimal time for the oil change. Using devices such as the rotational viscometer and the atomic absorption spectrometer, they can detect the incipient form when the oil loses its lubricating properties and, therefore, cannot protect the mechanical components of diesel engines such these trucks. Timely detection of lost property in the oil, it allows us taking preventive plan maintenance for the fleet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=atomic%20absorption%20spectrometry" title="atomic absorption spectrometry">atomic absorption spectrometry</a>, <a href="https://publications.waset.org/abstracts/search?q=maintenance" title=" maintenance"> maintenance</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20velocity%20rate" title=" predictive velocity rate"> predictive velocity rate</a>, <a href="https://publications.waset.org/abstracts/search?q=lubricating%20oils" title=" lubricating oils"> lubricating oils</a> </p> <a href="https://publications.waset.org/abstracts/35777/predictive-maintenance-based-on-oil-analysis-applicable-to-transportation-fleets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">568</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mesz%C3%A1r%20T%C3%A1rik">Meszár Tárik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Middle%20East" title="Middle East">Middle East</a>, <a href="https://publications.waset.org/abstracts/search?q=Iraq" title=" Iraq"> Iraq</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20State" title=" Islamic State"> Islamic State</a>, <a href="https://publications.waset.org/abstracts/search?q=minorities" title=" minorities"> minorities</a> </p> <a href="https://publications.waset.org/abstracts/160748/colorful-ethnoreligious-map-of-iraq-and-the-current-situation-of-minorities-in-the-country" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160748.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Inmaculada%20Yuste%20Martinez">Inmaculada Yuste Martinez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caliphate" title="caliphate">caliphate</a>, <a href="https://publications.waset.org/abstracts/search?q=de-radicalization" title=" de-radicalization"> de-radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20fighter" title=" foreign fighter"> foreign fighter</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20perspective" title=" gender perspective"> gender perspective</a>, <a href="https://publications.waset.org/abstracts/search?q=ISIS" title=" ISIS"> ISIS</a>, <a href="https://publications.waset.org/abstracts/search?q=jihadism" title=" jihadism"> jihadism</a>, <a href="https://publications.waset.org/abstracts/search?q=recruitment" title=" recruitment"> recruitment</a> </p> <a href="https://publications.waset.org/abstracts/85000/isis-women-recruitment-in-spain-and-de-radicalization-programs-in-prisons" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85000.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">171</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> ISIS and Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neda%20Jebellie">Neda Jebellie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IS-islamic%20state" title="IS-islamic state">IS-islamic state</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20terrorism" title=" cyber terrorism"> cyber terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20technologies" title=" communication technologies"> communication technologies</a> </p> <a href="https://publications.waset.org/abstracts/32106/isis-and-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32106.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Laboratory Indices in Late Childhood Obesity: The Importance of DONMA Indices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Orkide%20Donma">Orkide Donma</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20M.%20Donma"> Mustafa M. Donma</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammet%20Demirkol"> Muhammet Demirkol</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20Aydin"> Murat Aydin</a>, <a href="https://publications.waset.org/abstracts/search?q=Tuba%20Gokkus"> Tuba Gokkus</a>, <a href="https://publications.waset.org/abstracts/search?q=Burcin%20Nalbantoglu"> Burcin Nalbantoglu</a>, <a href="https://publications.waset.org/abstracts/search?q=Aysin%20Nalbantoglu"> Aysin Nalbantoglu</a>, <a href="https://publications.waset.org/abstracts/search?q=Birol%20Topcu"> Birol Topcu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Obesity in childhood establishes a ground for adulthood obesity. Especially morbid obesity is an important problem for the children because of the associated diseases such as diabetes mellitus, cancer and cardiovascular diseases. In this study, body mass index (BMI), body fat ratios, anthropometric measurements and ratios were evaluated together with different laboratory indices upon evaluation of obesity in morbidly obese (MO) children. Children with nutritional problems participated in the study. Written informed consent was obtained from the parents. Study protocol was approved by the Ethics Committee. Sixty-two MO girls aged 129.5±35.8 months and 75 MO boys aged 120.1±26.6 months were included into the scope of the study. WHO-BMI percentiles for age-and-sex were used to assess the children with those higher than 99<sup>th</sup> as morbid obesity. Anthropometric measurements of the children were recorded after their physical examination. Bio-electrical impedance analysis was performed to measure fat distribution. Anthropometric ratios, body fat ratios, Index-I and Index-II as well as insulin sensitivity indices (ISIs) were calculated. Girls as well as boys were binary grouped according to homeostasis model assessment-insulin resistance (HOMA-IR) index of <2.5 and >2.5, fasting glucose to insulin ratio (FGIR) of <6 and >6 and quantitative insulin sensitivity check index (QUICKI) of <0.33 and >0.33 as the frequently used cut-off points. They were evaluated based upon their BMIs, arms, legs, trunk, whole body fat percentages, body fat ratios such as fat mass index (FMI), trunk-to-appendicular fat ratio (TAFR), whole body fat ratio (WBFR), anthropometric measures and ratios [waist-to-hip, head-to-neck, thigh-to-arm, thigh-to-ankle, height/2-to-waist, height/2-to-hip circumference (C)]. SPSS/PASW 18 program was used for statistical analyses. p≤0.05 was accepted as statistically significance level. All of the fat percentages showed differences between below and above the specified cut-off points in girls when evaluated with HOMA-IR and QUICKI. Differences were observed only in arms fat percent for HOMA-IR and legs fat percent for QUICKI in boys (p≤ 0.05). FGIR was unable to detect any differences for the fat percentages of boys. Head-to-neck C was the only anthropometric ratio recommended to be used for all ISIs (p≤0.001 for both girls and boys in HOMA-IR, p≤0.001 for girls and p≤0.05 for boys in FGIR and QUICKI). Indices which are recommended for use in both genders were Index-I, Index-II, HOMA/BMI and log HOMA (p≤0.001). FMI was also a valuable index when evaluated with HOMA-IR and QUICKI (p≤0.001). The important point was the detection of the severe significance for HOMA/BMI and log HOMA while they were evaluated also with the other indices, FGIR and QUICKI (p≤0.001). These parameters along with Index-I were unique at this level of significance for all children. In conclusion, well-accepted ratios or indices may not be valid for the evaluation of both genders. This study has emphasized the limiting properties for boys. This is particularly important for the selection process of some ratios and/or indices during the clinical studies. Gender difference should be taken into consideration for the evaluation of the ratios or indices, which will be recommended to be used particularly within the scope of obesity studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anthropometry" title="anthropometry">anthropometry</a>, <a href="https://publications.waset.org/abstracts/search?q=childhood%20obesity" title=" childhood obesity"> childhood obesity</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=insulin%20sensitivity%20index" title=" insulin sensitivity index"> insulin sensitivity index</a> </p> <a href="https://publications.waset.org/abstracts/42290/laboratory-indices-in-late-childhood-obesity-the-importance-of-donma-indices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42290.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Destruction of History and the Syrian Conflict: Upholding the Cultural Integrity of Dura Europos </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Justine%20A.%20Lloyd">Justine A. Lloyd</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since the onset of the Syrian Civil War in 2011, the ancient city of Dura-Europos has faced widespread destruction and looting. The site is one of many places in the country the terrorist group ISIS has specifically targeted, allegedly due to its particular representations of Syrian history and culture. However, looted art and artifacts are the extremist group’s second largest source of income, only after oil. The protection of this site is important to both academics and the millions who have called Syria a home, as it aids in the nation’s sense of identity, reveals developments in the arts, and contributes to humanity’s collective history. At a time when Syria’s culture is being flattened, this sense of cultural expression is especially important to maintain. Creating an awareness of the magnitude of the issue at hand begins with an examination of the rich history of the ancient fortress city. Located on the western bank of the Euphrates River, Dura-Europos contains artifacts dating back to the Hellenistic, Parthian, and Roman periods. Though a great deal of the art and artifacts have remained safe in institutions such as the National Museum of Damascus and the Yale University Art Gallery, hundreds of looting pits and use of heavy machinery on the site has severely set back the investigative progress made by archaeologists over the last century, as well as the prospect of future excavation. Further research draws on the current destruction of the site by both ISIS and opportunists involved with the black market. Because Dura-Europos is located in a war stricken region, the acquisition of data and possibility of immediate action is particularly challenging. Resources gained from local reports, in addition to technology such as satellite imagery, however, have provided a firm starting point for the evaluation of the state of the site. The Syrian Ministry of Culture, UNESCO, and numerous Syrian and global organizations provide insight into the historic city’s past, present issues, and future plans to ensure that the cultural integrity of the site is upheld. Though over seventy percent of Dura-Europos has been completely decimated, this research challenges the notion that physically destroyed sites are lost forever. This paper assesses preventative measures that can take place to ensure the preservation of the site’s art and architecture, including examining possible solutions to the damage, such as digital reconstruction, replication, and distribution of information through exhibitions and other forms of publically accessible information. In order to investigate any possible retribution, research also includes the necessary information pertaining the global laws and regulations dealing with cultural heritage, as it directly affects the ways in which this situation can be dealt with. With the countless experts and citizens dedicated to the importance of cultural heritage, the prospect of honoring and valuing elements of Dura-Europos is possible—whether physically preserved or otherwise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antiquities%20law" title="antiquities law">antiquities law</a>, <a href="https://publications.waset.org/abstracts/search?q=archaeological%20sites" title=" archaeological sites"> archaeological sites</a>, <a href="https://publications.waset.org/abstracts/search?q=restitution" title=" restitution"> restitution</a>, <a href="https://publications.waset.org/abstracts/search?q=Syrian%20Civil%20War" title=" Syrian Civil War"> Syrian Civil War</a> </p> <a href="https://publications.waset.org/abstracts/80151/destruction-of-history-and-the-syrian-conflict-upholding-the-cultural-integrity-of-dura-europos" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Manipulation of the Public Sphere to Win Cultural Hegemony: The Process by Which Islamic State Uses the Principles of the Overton Window to Engineer Extremism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Brigitte%20Coles">A. Brigitte Coles</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to be successful in a campaign against terror and maintain a favorable world order, we must recognize the effects of priming, framing, and agenda setting on the public sphere, and address how terrorist organizations are able to manipulate language and symbols to shift public opinion and increase recruitment success. Because of their unprecedented activity in the region and foreign recruitment success, this study specifically addresses how the Islamic State (IS/ISIS/ISIL) manipulates the public sphere to amplify support and increase western recruitment. By following a grounded theory methodology and coding triangulated data from IS propaganda, a model for the process of terrorist recruitment has emerged, concerning both environments and personalities susceptible to recruitment, and the steps by which an extremist can be created. This has resulted in the ability to reverse engineer a method by which counter recruitment operations can be facilitated in an effort to lessen the vulnerability of areas and individuals, as well as create dissent among current extremists. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=countering%20violent%20extremism" title="countering violent extremism">countering violent extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title=" counter-terrorism"> counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=recruitment" title=" recruitment"> recruitment</a>, <a href="https://publications.waset.org/abstracts/search?q=overton%20window" title=" overton window"> overton window</a> </p> <a href="https://publications.waset.org/abstracts/45665/manipulation-of-the-public-sphere-to-win-cultural-hegemony-the-process-by-which-islamic-state-uses-the-principles-of-the-overton-window-to-engineer-extremism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Contemporary Arabic Novel Probing the Self and the Other: A Contrapuntal Study of Identity, Sexuality, and Fundamentalism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jihan%20Mahmoud">Jihan Mahmoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the role played by Arabic novelists in revolutionary change in the Arab world, discussing themes of identity, sexuality and fundamentalism as portrayed in a selection of modern and contemporary Arabic novels that are either written in English or translated from Arabic into English. It particularly focuses on the post-Naguib Mahfouz era. Taking my cue from the current political changes in the Arab world, starting with 9/11/ terrorist attacks in the USA and the UK, the ‘Arab Spring’ revolutions, the rise of political Islam and the emergence of Isis, the Islamic state in Iraq and the Levant, the study analyses the differences in the ways contemporary Arab novelists from different Arabic countries represent the interaction between identity, sexual politics and fundamentalist ideas in the Arab world, with a specific focus on the overlap between literature, religion and international politics in the region. It argues that the post-Mahfouz era marked a new phase in the development of the political Arabic novel not only as a force of resistance against political-religious oppression, but as a call for revolution as well. Thus, the Arabic novel reshapes values and prompts future action. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arabic%20novel" title="Arabic novel">Arabic novel</a>, <a href="https://publications.waset.org/abstracts/search?q=Islam" title=" Islam"> Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=politics" title=" politics"> politics</a>, <a href="https://publications.waset.org/abstracts/search?q=sexuality" title=" sexuality "> sexuality </a> </p> <a href="https://publications.waset.org/abstracts/24555/contemporary-arabic-novel-probing-the-self-and-the-other-a-contrapuntal-study-of-identity-sexuality-and-fundamentalism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24555.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">526</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Family Dynamics on Attitude Towards Peace: The Mediating Role of Emotional Regulation Strategies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicole%20Kaye%20A.%20Callanta">Nicole Kaye A. Callanta</a>, <a href="https://publications.waset.org/abstracts/search?q=Shalimar%20B.%20Baruang"> Shalimar B. Baruang</a>, <a href="https://publications.waset.org/abstracts/search?q=Anne%20Edelienne%20P.%20Tadena"> Anne Edelienne P. Tadena</a>, <a href="https://publications.waset.org/abstracts/search?q=Imelu%20G.%20Mordeno"> Imelu G. Mordeno</a>, <a href="https://publications.waset.org/abstracts/search?q=Odessa%20May%20D.%20Escalona"> Odessa May D. Escalona</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Untold numbers of children and adolescents around the world are exposed increasingly to the war on a daily basis. These experiences shape how they will view themselves, others, and the world. A wealth of studies have shown the role of family dynamics in the development of children’s attitudes, particularly their social behaviors. This specific study, however, contends that family dynamics influence peace and conflict resolution attitude and further asserts that it is brought about by the degree of emotional regulation strategies they use. Utilising purposive sampling, adolescent participant-respondents were from different schools in Southern Philipines, specifically of the cities of Marawi and Iligan, where exposure to warring clans, internal struggle between the Philippine Military and insurgencies, and the recent Marawi Seige caused by Al-Qaeda and ISIS-spawned terrorism. Results showed emotional regulation strategies mediate the relationship between family dynamics, particularly on family cohesion, and attitude towards peace. Thus implying the association between family cohesion and attitude towards peace strengthens with the use of emotional regulation strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude%20towards%20peace" title="attitude towards peace">attitude towards peace</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20regulation%20strategies" title=" emotional regulation strategies"> emotional regulation strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=family%20cohesion" title=" family cohesion"> family cohesion</a>, <a href="https://publications.waset.org/abstracts/search?q=family%20dynamics" title=" family dynamics"> family dynamics</a> </p> <a href="https://publications.waset.org/abstracts/115971/family-dynamics-on-attitude-towards-peace-the-mediating-role-of-emotional-regulation-strategies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> The Relation between Spiritual Intelligence and Organizational Health and Job Satisfaction among the Female Staff in Islamic Azad University of Marvdasht</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Zarei">Reza Zarei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The result of the present study is to determine the relation between spiritual intelligence and organizational health and job satisfaction among the female staff in Islamic Azad University of Marvdasht. The population of the study includes the female staff and the faculty of Islamic Azad University of Marvdasht. The method is correlational and the instrument in the research is three questionnaires namely the spiritual intelligence by (ISIS), Amraam and Dryer, organizational health by Fieldman and Job satisfaction questionnaire. In order to test the hypotheses we used interpretive statistics, Pearson and regression correlation coefficient. The findings show that there is a significant relation between the spiritual intelligence and organizational health among the female staff of this unit. In addition, the organizational health has a significant relation with the elements of self-consciousness and social skills and on the other hand, job satisfaction is in significant relation with the elements of self-consciousness, self-control, self-provocation, sympathy and social skills in the whole sample regardless of the participants' gender. Finally, the results of multiple regression and variance analysis showed that using the variables of the spiritual intelligence of the female staff could predict the organizational health and their job satisfaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title="job satisfaction">job satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=spiritual%20intelligence" title=" spiritual intelligence"> spiritual intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20health" title=" organizational health"> organizational health</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20Azad%20University" title=" Islamic Azad University"> Islamic Azad University</a> </p> <a href="https://publications.waset.org/abstracts/37589/the-relation-between-spiritual-intelligence-and-organizational-health-and-job-satisfaction-among-the-female-staff-in-islamic-azad-university-of-marvdasht" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37589.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tamanna%20Goyal">Tamanna Goyal</a>, <a href="https://publications.waset.org/abstracts/search?q=Divya%20Bansal"> Divya Bansal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjeev%20Sofat"> Sanjeev Sofat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=association%20rules" title="association rules">association rules</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=similarity%20measure" title=" similarity measure"> similarity measure</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20approaches" title=" statistical approaches "> statistical approaches </a> </p> <a href="https://publications.waset.org/abstracts/53364/clustering-of-association-rules-of-isis-al-qaeda-based-on-similarity-measures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Feasibility Study of Iraq' Decomposition and Its Effects on the Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebrahim%20Rahmani">Ebrahim Rahmani</a>, <a href="https://publications.waset.org/abstracts/search?q=Siyamak%20Moazeni"> Siyamak Moazeni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20law" title="constitutional law">constitutional law</a>, <a href="https://publications.waset.org/abstracts/search?q=federalism" title=" federalism"> federalism</a>, <a href="https://publications.waset.org/abstracts/search?q=decomposition" title=" decomposition"> decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=Iraq%27s%20Kurdistan" title=" Iraq's Kurdistan"> Iraq's Kurdistan</a> </p> <a href="https://publications.waset.org/abstracts/24868/feasibility-study-of-iraq-decomposition-and-its-effects-on-the-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Developing Laser Spot Position Determination and PRF Code Detection with Quadrant Detector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Fathy%20Heweage">Mohamed Fathy Heweage</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiao%20Wen"> Xiao Wen</a>, <a href="https://publications.waset.org/abstracts/search?q=Ayman%20Mokhtar"> Ayman Mokhtar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Eldamarawy"> Ahmed Eldamarawy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we are interested in modeling, simulation, and measurement of the laser spot position with a quadrant detector. We enhance detection and tracking of semi-laser weapon decoding system based on microcontroller. The system receives the reflected pulse through quadrant detector and processes the laser pulses through a processing circuit, a microcontroller decoding laser pulse reflected by the target. The seeker accuracy will be enhanced by the decoding system, the laser detection time based on the receiving pulses number is reduced, a gate is used to limit the laser pulse width. The model is implemented based on Pulse Repetition Frequency (PRF) technique with two microcontroller units (MCU). MCU1 generates laser pulses with different codes. MCU2 decodes the laser code and locks the system at the specific code. The codes EW selected based on the two selector switches. The system is implemented and tested in Proteus ISIS software. The implementation of the full position determination circuit with the detector is produced. General system for the spot position determination was performed with the laser PRF for incident radiation and the mechanical system for adjusting system at different angles. The system test results show that the system can detect the laser code with only three received pulses based on the narrow gate signal, and good agreement between simulation and measured system performance is obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=four%20quadrant%20detector" title="four quadrant detector">four quadrant detector</a>, <a href="https://publications.waset.org/abstracts/search?q=pulse%20code%20detection" title=" pulse code detection"> pulse code detection</a>, <a href="https://publications.waset.org/abstracts/search?q=laser%20guided%20weapons" title=" laser guided weapons"> laser guided weapons</a>, <a href="https://publications.waset.org/abstracts/search?q=pulse%20repetition%20frequency%20%28PRF%29" title=" pulse repetition frequency (PRF)"> pulse repetition frequency (PRF)</a>, <a href="https://publications.waset.org/abstracts/search?q=Atmega%2032%20microcontrollers" title=" Atmega 32 microcontrollers"> Atmega 32 microcontrollers</a> </p> <a href="https://publications.waset.org/abstracts/66984/developing-laser-spot-position-determination-and-prf-code-detection-with-quadrant-detector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66984.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">389</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=isis&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=isis&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>