Search results for: terrorists financing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 370

Search results for: terrorists financing

250 Financial and Human Resources of Terrorism

Authors: Abdurrahman Karacabey

Abstract:

Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.

Keywords: financial resources, human resources, isis, terrorism

Procedia PDF Downloads 396
249 Critical Factors for Successful Adoption of Land Value Capture Mechanisms – An Exploratory Study Applied to Indian Metro Rail Context

Authors: Anjula Negi, Sanjay Gupta

Abstract:

Paradigms studied inform inadequacies of financial resources, be it to finance metro rails for construction or to meet operational revenues or to derive profits in the long term. Funding sustainability is far and wide for much-needed public transport modes, like urban rail or metro rails, to be successfully operated. India embarks upon a sustainable transport journey and has proposed metro rail systems countrywide. As an emerging economic leader, its fiscal constraints are paramount, and the land value capture (LVC) mechanism provides necessary support and innovation toward development. India’s metro rail policy promotes multiple methods of financing, including private-sector investments and public-private-partnership. The critical question that remains to be addressed is what factors can make such mechanisms work. Globally, urban rail is a revolution noted by many researchers as future mobility. Researchers in this study deep dive by way of literature review and empirical assessments into factors that can lead to the adoption of LVC mechanisms. It is understood that the adoption of LVC methods is in the nascent stages in India. Research posits numerous challenges being faced by metro rail agencies in raising funding and for incremental value capture. A few issues pertaining to land-based financing, inter alia: are long-term financing, inter-institutional coordination, economic/ market suitability, dedicated metro funds, land ownership issues, piecemeal approach to real estate development, property development legal frameworks, etc. The question under probe is what are the parameters that can lead to success in the adoption of land value capture (LVC) as a financing mechanism. This research provides insights into key parameters crucial to the adoption of LVC in the context of Indian metro rails. Researchers have studied current forms of LVC mechanisms at various metro rails of the country. This study is significant as little research is available on the adoption of LVC, which is applicable to the Indian context. Transit agencies, State Government, Urban Local Bodies, Policy makers and think tanks, Academia, Developers, Funders, Researchers and Multi-lateral agencies may benefit from this research to take ahead LVC mechanisms in practice. The study deems it imperative to explore and understand key parameters that impact the adoption of LVC. Extensive literature review and ratification by experts working in the metro rails arena were undertaken to arrive at parameters for the study. Stakeholder consultations in the exploratory factor analysis (EFA) process were undertaken for principal component extraction. 43 seasoned and specialized experts participated in a semi-structured questionnaire to scale the maximum likelihood on each parameter, represented by various types of stakeholders. Empirical data was collected on chosen eighteen parameters, and significant correlation was extracted for output descriptives and inferential statistics. Study findings reveal these principal components as institutional governance framework, spatial planning features, legal frameworks, funding sustainability features and fiscal policy measures. In particular, funding sustainability features highlight sub-variables of beneficiaries to pay and use of multiple revenue options towards success in LVC adoption. Researchers recommend incorporation of these variables during early stage in design and project structuring for success in adoption of LVC. In turn leading to improvements in revenue sustainability of a public transport asset and help in undertaking informed transport policy decisions.

Keywords: Exploratory factor analysis, land value capture mechanism, financing metro rails, revenue sustainability, transport policy

Procedia PDF Downloads 67
248 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis

Authors: Yunos Zahri, Ariffin Aswami

Abstract:

Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.

Keywords: cyber terrorism, terrorism, motivation, qualitative analysis

Procedia PDF Downloads 405
247 Impact of Sovereign Debt Risk and Corrective Austerity Measures on Private Sector Borrowing Cost in Euro Zone

Authors: Syed Noaman Shah

Abstract:

The current paper evaluates the effect of external public debt risk on the borrowing cost of private non-financial firms in euro zone. Further, the study also treats the impact of austerity measures on syndicated-loan spreads of private firm followed by euro area member states to revive the economic growth in the region. To test these hypotheses, we follow multivariate ordinary least square estimation method to assess the effect of external public debt on the borrowing cost of private firms. By using foreign syndicated-loan issuance data of non-financial private firms from 2005 to 2011, we attempt to gauge how the private financing cost varies with high levels of sovereign external debt prevalent in the euro zone. Our results suggest significant effect of external public debt on the borrowing cost of private firm. In particular, an increase in external public debt by one standard deviation from its sample mean raises syndicated-loan spread by 89 bps. Furthermore, weak creditor rights protection prevalent in member states deepens this effect. However, we do not find any significant effect of domestic public debt on the private sector borrowing cost. In addition, the results show significant effect of austerity measures on private financing cost, both in normal and in crisis period in the euro zone. In particular, one standard deviation change in fiscal consolidation conditional mean reduces the syndicated-loan spread by 22 bps. In turn, it indicates strong presence of credibility channel due to austerity measures in euro area region.

Keywords: corporate debt, fiscal consolidation, sovereign debt, syndicated-loan spread

Procedia PDF Downloads 401
246 The Rite of Jihadification in ISIS Modified Video Games: Mass Deception and Dialectic of Religious Regression in Technological Progression

Authors: Venus Torabi

Abstract:

ISIS, the terrorist organization, modified two videogames, ARMA III and Grand Theft Auto 5 (2013) as means of online recruitment and ideological propaganda. The urge to study the mechanism at work, whether it has been successful or not, derives (Digital) Humanities experts to explore how codes of terror, Islamic ideology and recruitment strategies are incorporated into the ludic mechanics of videogames. Another aspect of the significance lies in the fact that this is a latent problem that has not been fully addressed in an interdisciplinary framework prior to this study, to the best of the researcher’s knowledge. Therefore, due to the complexity of the subject, the present paper entangles with game studies, philosophical and religious poles to form the methodology of conducting the research. As a contextualized epistemology of such exploitation of videogames, the core argument is building on the notion of “Culture Industry” proposed by Theodore W. Adorno and Max Horkheimer in Dialectic of Enlightenment (2002). This article posits that the ideological underpinnings of ISIS’s cause corroborated by the action-bound mechanics of the videogames are in line with adhering to the Islamic Eschatology as a furnishing ground and an excuse in exercising terrorism. It is an account of ISIS’s modification of the videogames, a tool of technological progression to practice online radicalization. Dialectically, this practice is packed up in rhetoric for recognizing a religious myth (the advent of a savior), as a hallmark of regression. The study puts forth that ISIS’s wreaking havoc on the world, both in reality and within action videogames, is negotiating the process of self-assertion in the players of such videogames (by assuming one’s self a member of terrorists) that leads to self-annihilation. It tries to unfold how ludic Mod videogames are misused as tools of mass deception towards ethnic cleansing in reality and line with the distorted Eschatological myth. To conclude, this study posits videogames to be a new avenue of mass deception in the framework of the Culture Industry. Yet, this emerges as a two-edged sword of mass deception in ISIS’s modification of videogames. It shows that ISIS is not only trying to hijack the minds through online/ludic recruitment, it potentially deceives the Muslim communities or those prone to radicalization into believing that it's terrorist practices are preparing the world for the advent of a religious savior based on Islamic Eschatology. This is to claim that the harsh actions of the videogames are potentially breeding minds by seeds of terrorist propaganda and numbing them to violence. The real world becomes an extension of that harsh virtual environment in a ludic/actual continuum, the extension that is contributing to the mass deception mechanism of the terrorists, in a clandestine trend.

Keywords: culture industry, dialectic, ISIS, islamic eschatology, mass deception, video games

Procedia PDF Downloads 129
245 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs

Authors: Nourah Almulhim

Abstract:

This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.

Keywords: xenophobia, blogs, identity, critical discourse analysis

Procedia PDF Downloads 67
244 The Importance of Information in Psychological Operations for Counterterrorism

Authors: Abbas Fazelinia

Abstract:

Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method.

Keywords: psychological operations, terrorist, counterterrorism, terrorism

Procedia PDF Downloads 323
243 Prevention of Student Radicalism in School through Civic Education

Authors: Triyanto

Abstract:

Radicalism poses a real threat to Indonesia's future. The target of radicalism is the youth of Indonesia. This is proven by the majority of terrorists are young people. Radicalization is not only a repressive act but also requires educational action. One of the educational efforts is civic education. This study discusses the prevention of radicalism for students through civic education and its constraints. This is qualitative research. Data were collected through literature studies, observations and in-depth interviews. Data were validated by triangulation. The sample of this research is 30 high school students in Surakarta. Data were analyzed by the interactive model of analysis from Miles & Huberman. The results show that (1) civic education can be a way of preventing student radicalism in schools in the form of cultivating the values of education through learning in the classroom and outside the classroom; (2) The obstacles encountered include the lack of learning facilities, the limited ability of teachers and the low attention of students to the civic education.

Keywords: prevention, radicalism, senior high school student, civic education

Procedia PDF Downloads 217
242 Residential Satisfaction and Public Perception of Socialized Housing Projects in Davao City, Philippines

Authors: Micah Amor P. Yares

Abstract:

Aside from the provision of adequate housing, the Philippine government faces the challenge of ensuring that the housing units provided conform to the Filipino’s ambition to self as manifested by owning a small house on a big lot. The study aimed to explore the levels of satisfaction of end-users and the public perception towards socialized housing in Davao City, Philippines. The residential satisfaction survey includes three types of respondents, which are end-users of single-detached, duplex and rowhouse socialized housing units. Respondents were asked to rate their level of satisfaction and perception to the following housing components: Dwelling Unit; Public Facilities; Social Environment; Neighborhood Facilities; Management Systems; and Acquisition and Financing. The data were subjected to Exploratory Factor Analysis to determine if variables can be grouped together, and Confirmatory Factor Analysis to measure if the model fits the construct. In determining which component affects the level of perception and satisfaction, a Multiple Linear Regression Analysis was employed. Lastly, an Individual Samples T-Test was performed to compare the levels of satisfaction and perception among respondents. Results revealed that residents of socialized housing were highly satisfied with their living conditions despite concerns on management systems, public and neighborhood facilities. Residents' satisfaction is primarily influenced by the Social Environment, Acquisition and Financing, and the Dwelling Unit. However, a significant difference in residential satisfaction level was observed among different types of housing with rowhouse residents recording the lowest satisfaction level compared to single-detached and duplex units. Moreover, the general public perceived Socialized housing as moderately satisfactory having the same determinant as the end-users aside from the Public Facilities. This study recommends revisiting the current Socialized Housing policies by considering the feedback from the end-users based on their lived experience and the public according to their perception.

Keywords: public perception, residential satisfaction, rowhouse, socialized housing

Procedia PDF Downloads 205
241 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground

Authors: T. K. Hung

Abstract:

Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.

Keywords: counter-terrorism, lethality, security, terrorism

Procedia PDF Downloads 327
240 Investment Development Path and Motivations for Foreign Direct Investment in Georgia

Authors: Vakhtang Charaia, Mariam Lashkhi

Abstract:

Foreign direct investment (FDI) plays a vital role in global business. It provides firms with new markets and advertising channels, cheaper production facilities, admission to new technology, products, skills and financing. FDI can provide a recipient country/company with a source of new technologies, capital, practice, products, management skills, and as such can be a powerful drive for economic development. It is one of the key elements of stable economic development in many countries, especially in developing ones. Therefore the size of FDI inflow is one of the most crustal factors for economic perfection in small economy countries (like, Georgia), while most of developed ones are net exporters of FDI. Since, FDI provides firms with new markets; admission to new technologies, products and management skills; marketing channels; cheaper production facilities, and financing opportunities. It plays a significant role in Georgian economic development. Increasing FDI inflows from all over the world to Georgia in last decade was achieved with the outstanding reforms managed by the Georgian government. However, such important phenomenon as world financial crisis and Georgian-Russian war put its consequence on the over amount of FDI inflow in Georgia in the last years. It is important to mention that the biggest investor region for Georgia is EU, which is interested in Georgia not only from the economic points of view but from political. The case studies from main EU investor countries show that Georgia has a big potential of investment in different areas, such as; financial sector, energy, construction, tourism industry, transport and communications. Moreover, signing of Association Agreement between Georgia and EU will further boost all the fields of economy in Georgia in both short and long terms. It will attract more investments from different countries and especially from EU. The last, but not least important issue is the calculation of annual FDI inflow to Georgia, which it is calculated differently by different organizations, based on different methodologies, but what is more important is that all of them show significant increase of FDI in last decade, which gives a positive signal to investors and underlines necessity of further improvement of investment climate in the same direction.

Keywords: foreign direct investment (FDI), Georgia, investment development path, investment climate

Procedia PDF Downloads 261
239 Risk Management in Islamic Micro Finance Credit System for Poverty Alleviation from Qualitative Perspective

Authors: Liyu Adhi Kasari Sulung

Abstract:

Poverty has been a major problem in Indonesia. Islamic micro finance (IMF) named Baitul Maal Wat Tamwil (Bmt) plays a prominent role to eradicate this. Indonesia as the biggest muslim country has many successful applied products such as worldwide adopt group-based lending approach, flexible financing for farmers, and gold pawning. The Problems related to these models are operation risk management and internal control system (ICS). A proper ICS will help an organization in preventing the occurrence of bad financing through detecting error and irregularities in its operation. This study aims to seek a proper risk management scheme of credit system in Bmt and internal control system’s rank for every stage. Risk management variables are obtained at the first In-Depth Interview (IDI) and Focus Group Discussion (FGD) with Shariah supervisory boards, boards of directors, and operational managers. Survey was conducted covering nationwide data; West Java, South Sulawesi, and West Nusa Tenggara. Moreover, Content analysis is employed to build the relationship among these variables. Research Findings shows that risk management Characteristics in Indonesia involves ex ante, credit process, and ex post strategies to deal with risk in credit system. Ex-ante control consists of Shariah compliance, survey, group leader reference, and islamic forming orientation. Then, credit process involves saving, collateral, joint liability, loan repayment, and credit installment controlling. Finally, ex-post control includes shariah evaluation, credit evaluation, grace period and low installment provisions. In addition, internal control order sort three stages by its priority; Credit process as first rank, then ex-post control as second, and ex ante control as the last rank.

Keywords: internal control system, islamic micro finance, poverty, risk management

Procedia PDF Downloads 392
238 ASEAN Limited Centrality in Connectivity: Managing the China-Japan Infrastructure Competition

Authors: Barbora Valockova

Abstract:

Scholars recommend the establishment of a multilateral coordination mechanism by ASEAN, such as an infrastructure forum, to contain the China-Japan infrastructure financing competition in the region. However, they do not systematically investigate the reasons for its absence. This paper aims to fill the gap by addressing the following question: Why has ASEAN been unable to set up any multilateral coordination mechanism to soften the China-Japan infrastructure financing competition? This paper argues that ASEAN has not been able to set up such a mechanism due to its limited centrality in connectivity. This limited centrality decreases ASEAN’s ability to manage the China-Japan competition in a more comprehensive and coordinated way. Rather, ASEAN acts as a scope setter in connectivity, although this is not completely ineffective. This paper is divided into four sections. The first section explores the key tenets of the concept of ASEAN centrality in connectivity, which is under-examined in the current literature. The second section examines the extent to which ASEAN limited centrality in connectivity is being respected by China and Japan. The third section analyses how various stakeholders, such as ASEAN member states, their leaders and bureaucracy, and foreign private companies prevent ASEAN from attaining stronger centrality. The last section concludes and offers recommendations. Data is gathered using primary sources (official ASEAN, Chinese, and Japanese documents, interviews, etc.) and secondary material. By providing a nuanced analysis of ASEAN centrality in connectivity and developing a new operationalization of the concept, this paper aims to contribute to the international relations literature on ASEAN centrality. Initial findings suggest that while ASEAN limited centrality in connectivity has some effectiveness, it is not sufficient for setting up a multilateral coordination mechanism. While it represents a solid departure point, any potential possessed by ASEAN to evolve beyond a scope setter in connectivity is hampered by stakeholders involved in infrastructure development. While these players and their interactions can have both positive and negative effects on the scope set by ASEAN, it is unlikely that they would allow ASEAN to become the real central player. There can be no stronger ASEAN centrality in connectivity without ASEAN unity and neutrality. However, the last two factors are difficult to attain in the context of infrastructure development since ASEAN member states and stakeholders all have their styles and preferences. All other things being equal, these circumstances favor a loose, vague, and quasi-prescriptive arrangement among the relevant stakeholders.

Keywords: ASEAN centrality, China-Japan infrastructure competition, connectivity, scope setter

Procedia PDF Downloads 182
237 Innovation Management in State-Owned-Enterprises in the Digital Transformation: An Empirical Case Study of Swiss Post

Authors: Jiayun Shen, Lorenz Wyss, Thierry Golliard, Matthias Finger

Abstract:

Innovation is widely recognized as the key for private enterprises to win the market competition. The state-owned-enterprises need to be innovative to compete in the market after the privatization as well. However, it is a lack of research to study how state-owned-enterprises manage innovation to create new products and services. Swiss Post, a Swiss state-owned-enterprises, has established a department to transform the corporate culture and foster innovation to achieve digital transformation. This paper describes the innovation management process at the Swiss Post and analyzes the impacts of the instruments, the organizational structure, and explores the barriers of innovation. This study used qualitative methods based on a review of the literature on innovation management and semi-structured interviews. Being established for over five years, the Swiss Post’s innovation management department has established a software-assisted modularized platform with systematic instruments to help the internal employees with the different innovation processes. It guides the innovators from idea creation to piloting in markets and supports with a separate financing source, with knowledge inputs and coaching, as well as with connections to external partners through the open innovation and venturing team. The platform also adapts to different business units within the corporate with a customized tailor for the various operational business units. The separate financing instruments enabled the creation and further development of new ideas; the coaching services contribute greatly to the transformation of teams’ innovation culture by providing new knowledge, thinking methods, and use cases for inspiration. It also facilitates organizational learning to help the whole corporate with the digital transformation. However, it is also confronted with a big challenge in twofold. Internally, the disruptive projects often hardly overcome the obstacles of long-established operational processes in the traditional business units; externally, the expectations of the public and restrictions from the federal government have become high hurdles for the company to stay and compete in the innovation track.

Keywords: empirical case study, innovation management, state-owned-enterprise, Swiss Post

Procedia PDF Downloads 108
236 Primary Health Care Vital Signs Profile in Malaysia: Challenges and Opportunities

Authors: Rachel Koshy, Nazrila Hairizan Bt. Nasir, Samsiah Bt. Awang, Kamaliah Bt. Mohamad Noh

Abstract:

Malaysia collaborated as a ‘trailblazer’ country with PHCPI (Primary Health Care Performance Initiative) to populate the Primary Health Care (PHC) Vital Signs Profile (VSP) for the country. The PHC VSP provides an innovative snapshot of the primary health care system's performance. Four domains were assessed: system financing, system capacity, system performance, and system equity, and completed in 2019. There were two phases using a mixed method study design. The first phase involved a quantitative study, utilising existing secondary data from national and international sources. In the case of unavailability of data for any indicators, comparable alternative indicators were used. The second phase was a mixed quantitative-qualitative approach to measure the functional capacity based on governance and leadership, population health needs, inputs, population health management, and facility organisation and management. PHC spending constituted 35% of overall health spending in Malaysia, with a per capita PHC spending of $152. The capacity domain was strong in the three subdomains of governance and leadership, information system, and funds management. The two subdomains of drugs & supplies and facility organisation & management had low scores, but the lowest score was in empanelment of the population under the population health management. The PHC system performed with an access index of 98%, quality index of 84%, and service coverage of 62%. In the equity domain, there was little fluctuation in the coverage of reproductive, maternal, newborn, and child health services by mother’s level of education and under-five child mortality between urban and rural areas. The public sector was stronger in the capacity domain as compared to the private sector. This is due to the different financing, organisational structures, and service delivery mechanism. The VSP has identified areas for improvement in the effort to provide high-quality PHC for the population. The gaps in PHC can be addressed through the system approach and the positioning of public and private primary health care delivery systems.

Keywords: primary health care, health system, system domains, vital signs profile

Procedia PDF Downloads 117
235 Fintech and Democratization of Finance: Evidence from Sub-Saharan Africa

Authors: Lawrence Ngalim

Abstract:

In this paper, we investigate whether the adoption of recent technological advancements in delivering financial services, such as crowdfunding, assists the financially excluded across twenty-seven Sub Saharan Africa (SSA) through entrepreneurship. Results show that even after addressing potential endogeneity issues as much as possible, crowdfunding and entrepreneurial-ventures are strongly associated i.e., crowdfunding translates a 5 – 9 percentage increase on incumbent/prospective individuals who borrowed to enhance/embark on a venture across SSA economies between 2014 to 2017. The study has some implications for regional financial alliance if economies adopt this recent financial technology which offers another financing opportunity that’s unrestricted by territorial boundaries.

Keywords: fintech, finance, entrepreneurship, SSA

Procedia PDF Downloads 64
234 Assessing the Competitiveness of Green Charcoal Energy as an Alternative Source of Cooking Fuel in Uganda

Authors: Judith Awacorach, Quentin Gausset

Abstract:

Wood charcoal and firewood are the primary sources of energy for cooking fuel in most Sub-Saharan African countries, including Uganda. This leads to unsustainable forest use and to rapid deforestation. Green charcoal (made out of agricultural residues that are carbonized, reduced in char powder, and glued in briquettes, using a binder such as sugar molasse, cassava flour or clay) is a promising and sustainable alternative to wood charcoal and firewood. It is considered as renewable energy because the carbon emissions released by the combustion of green charcoal are immediately captured again in the next agricultural cycle. If practiced on a large scale, this has the potential to replace wood charcoal and stop deforestation. However, the uptake of green charcoal for cooking remains low in Uganda despite the introduction of the technology 15 years ago. The present paper reviews the barriers to the production and commercialization of green charcoal. The paper is based on the study of 13 production sites, recording the raw materials used, the production techniques, the quantity produced, the frequency of production, and the business model. Observations were made on each site, and interviews were conducted with the managers of the facilities and with one or two employees in the larger facilities. We also interviewed project administrators from four funding agencies interested in financing green charcoal production. The results of our research identify the main barriers as follows: 1) The price of green charcoal is not competitive (it is more labor and capital-intensive than wood charcoal). 2) There is a problem with quality control and labeling (one finds a wide variety of green charcoal with very different performances). 3) The carbonization of agricultural crop residues is a major bottleneck in green char production. Most briquettes are produced with wood charcoal dust or powder, which is a by-product of wood charcoal. As such, they increase the efficiency of wood charcoal but do not yet replace it. 4) There is almost no marketing chain for the product (most green charcoal is sold directly from producer to consumer without any middleman). 5) The financing institutions are reluctant to lend money for this kind of activity. 6) Storage can be challenging since briquettes can dissolve due to moisture. In conclusion, a number of important barriers need to be overcome before green charcoal can become a serious alternative to wood charcoal.

Keywords: briquettes, competitiveness, deforestation, green charcoal, renewable energy

Procedia PDF Downloads 33
233 Proposal for a Model of Economic Integration for the Development of Industry in Cabinda, Angola

Authors: T. H. Bitebe, T. M. Lima, F. Charrua-Santos, C. J. Matias Oliveira

Abstract:

This study aims to present a proposal for an economic integration model for the development of the manufacturing industry in Cabinda, Angola. It seeks to analyze the degree of economic integration of Cabinda and the dynamics of the manufacturing industry. Therefore, in the same way, to gather information to support the decision-making for public financing programs that will aim at the disengagement of the manufacturing industry in Angola and Cabinda in particular. The Cabinda Province is the 18th of Angola, the enclave is located in a privileged area of the African and arable land.

Keywords: economic integration, industrial development, Cabinda industry, Angola

Procedia PDF Downloads 213
232 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 283
231 Nuclear Terrorism and Proliferation: A Conceptual Clarification

Authors: Uche A. Nnawulezi

Abstract:

This paper analyzes the advancing nature of nuclear terrorism and proliferation in the global environment and its attendant impacts. It analyzes discourse and practice with respect to the general prohibition on the utilization of fissionable radioactive materials. Thus, there has been a few ideological, reasonable and academic recommendations of policies aimed at eliminating nuclear weapons which its ultimate nightmare has remained an assault including nuclear explosion in densely populated urban areas. Likewise, this paper concentrates on safety measures aimed at preventing nuclear assaults which should not just concentrate on endeavors to prevent terrorists from exploding nuclear gadgets but should be more concerned on endeavors aimed at preventing the acquisition of nuclear weapons in the first place. The author of this paper has pointed out that the non-proliferation treaty should be vigorously supported as well as the Comprehensive Test Ban Treaty brought into force. This paper depended unequivocally on secondary sources, for example, textbooks, journals, articles, and periodicals. It concludes that the fundamental proposals made in this paper if completely used shall remain a cornerstone of efforts made in preventing the spread of nuclear weapons. At last, the only way is to eliminate stockpiles of nuclear weapons in the world or else the likelihood of nuclear terrorism remains a nightmare.

Keywords: nuclear, terrorism, proliferation, global environment

Procedia PDF Downloads 239
230 Subsidying Local Health Policy Programs as a Public Management Tool in the Polish Health Care System

Authors: T. Holecki, J. Wozniak-Holecka, P. Romaniuk

Abstract:

Due to the highly centralized model of financing health care in Poland, local self-government rarely undertook their own initiatives in the field of public health, particularly health promotion. However, since 2017 the possibility of applying for a subsidy to health policy programs has been allowed, with the additional resources to be retrieved from the National Health Fund, which is the dominant payer in the health system. The amount of subsidy depends on the number of inhabitants in a given unit and ranges about 40% of the total cost of the program. The aim of this paper is to assess the impact of newly implemented solutions in financing health policy on the management of public finances, as well as on the activity provided by local self-government in health promotion. An effort to estimate the amount of expenses that both local governments, and the National Health Fund, spent on local health policy programs while implementing the new solutions. The research method is the analysis of financial data obtained from the National Health Fund and from local government units, as well as reports published by the Agency for Health Technology Assessment and Pricing, which holds substantive control over the health policy programs, and releases permission for their implementation. The study was based on a comparative analysis of expenditures on the implementation of health programs in Poland in years 2010-2018. The presentation of the results includes the inclusion of average annual expenditures of local government units per 1 inhabitant, the total number of positively evaluated applications and the percentage share in total expenditures of local governments (16 voivodships areas). The most essential purpose is to determine whether the assumptions of the subsidy program are working correctly in practice, and what are the real effects of introducing legislative changes into local government levels in the context of public health tasks. The assumption of the study was that the use of a new motivation tool in the field of public management would result in multiplication of resources invested in the provision of health policy programs. Preliminary conclusions show that financial expenditures changed significantly after the introduction of public funding at the level of 40%, obtaining an increase in funding from own funds of local governments at the level of 80 to 90%.

Keywords: health care system, health policy programs, local self-governments, public health management

Procedia PDF Downloads 142
229 Management in Health Education Process among Spa Resorts in Poland

Authors: J. Wozniak-Holecka, T. Holecki, P. Romaniuk

Abstract:

Spa facilities are being perceived as the ways of healing treatment in Poland and are guaranteed within the public financing. The universal health insurance (National Health Fund, NFZ), and the disability prevention programme held by Social Insurance Institution (ZUS) are the main sources of financing spa facilities. The dominant public payer of spa services is the NFZ. The Social Insurance Institution covers the cost of health treatment realized in spa facilities as medical rehabilitation, in the field of disability prevention. Health services delivered in the spa resorts are characterized by complexity, and the combination of various methods, typical for health prevention, education, balneotherapy, and physiotherapy. Healing with natural methods, believed to enhance the therapeutic effect, is also involved in health spa treatment. Regardless of the type of facility, each form of spa treatment includes health promotion, health education, prevention at all levels, including rehabilitation. The aim of the study was to determine the optimal organization of health education process. Its efficiency strongly depends on the type of service provider and the funding institution (NFZ vs ZUS). It results from the use of different measures of the effectiveness, the quality and the evaluation of the process being assessed by funding institutions. The methods of the study include a comparative and descriptive quantitative and qualitative analysis. In the empirical part, a questionnaire had been developed. It was then distributed among spa personnel, responsible directly for the health promotion, and among patients who are beneficiaries of health services in spa centers. The quantitative part of the study was based on interviews carried with the use of the online survey (CAWI: Computer-Assisted Web Interview), telephone survey (CATI: Computer-Assisted Telephone Interview) and a conventional questionnaire (PAPI: Paper over Pencil Interview). As a result of the conducted research, it was found that the effectiveness of health education activities in spa resort facilities in Poland is higher when the services are organized using structured tools for managerial control. This applies to formalized procedures implemented by one of the dominant payers covering costs of services (ZUS) and involves the application of health education as one of the mandatory elements of treatment, subjected to the process of control during the course of spa therapy and evaluation after it is completed.

Keywords: effectiveness, health education, public health system, spa treatment

Procedia PDF Downloads 134
228 Jurisprudencial Analysis of Torture in Spain and in the European Human Rights System

Authors: María José Benítez Jiménez

Abstract:

Article 3 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (E.C.H.R.) proclaims that no one may be subjected to torture, punishment or degrading treatment. The legislative correlate in Spain is embodied in Article 15 of the Spanish Constitution, and there must be an overlapping interpretation of both precepts on the ideal plane. While it is true that there are not many cases in which the European Court of Human Rights (E.C.t.H.R. (The Strasbourg Court)) has sanctioned Spain for its failure to investigate complaints of torture, it must be emphasized that the tendency to violate Article 3 of the Convention appears to be on the rise, being necessary to know possible factors that may be affecting it. This paper addresses the analysis of sentences that directly or indirectly reveal the violation of Article 3 of the European Convention. To carry out the analysis, sentences of the Strasbourg Court have been consulted from 2012 to 2016, being able to address any previous sentences to this period if it provided justified information necessary for the study. After the review it becomes clear that there are two key groups of subjects that request a response to the Strasbourg Court on the understanding that they have been tortured or degradingly treated. These are: immigrants and terrorists. Both phenomena, immigration and terrorism, respond to patterns that have mutated in recent years, and it is important for this study to know if national regulations begin to be dysfunctional.

Keywords: E.C.H.R., E.C.t.H.R. sentences, Spanish Constitution, torture

Procedia PDF Downloads 142
227 Emerging VC Industry and the Important Role of Marketing Expectations in Project Selection: Evidence on Russian Data

Authors: I. Rodionov, A. Semenov, E. Gosteva, O. Sokolova

Abstract:

Currently, the venture capital becomes more and more advanced and effective source of the innovation project financing, connected with a high-risk level. In the developed countries, it plays a key role in transforming innovation projects into successful businesses and creating prosperity of the modern economy. Actually, in Russia there are many necessary preconditions for creation of the effective venture investment system: the network of the public institutes for innovation financing operates; there is a significant number of the small and medium-sized enterprises, capable to sell production with good market potential. However, the current system does not confirm the necessary level of efficiency in practice that can be substantially explained by the absence of the accurate plan of action to form the national venture model and by the lack of experience of successful venture deals with profitable exits in Russian economy. This paper studies the influence of various factors on the venture industry development by the example of the IT-sector in Russia. The choice of the sector is based on the fact, that this segment is the main driver of the venture capital market growth in Russia, and the necessary set of data exists. The size of investment of the second round is used as the dependent variable. To analyse the influence of the previous round such determinant as the volume of the previous (first) round investments is used. There is also used a dummy variable in regression to examine that the participation of an investor with high reputation and experience in the previous round can influence the size of the next investment round. The regression analysis of short-term interrelations between studied variables reveals prevailing influence of the volume of the first round investments on the venture investments volume of the second round. Because of the research, the participation of investors with first-class reputation has a small impact on an indicator of the value of investment of the second round. The expected positive dependence of the second round investments on the forecasted market growth rate now of the deal is also rejected. So, the most important determinant of the value of the second-round investment is the value of first–round investment, so it means that the most competitive on the Russian market are the start-up teams which can attract more money on the start, and the target market growth is not the factor of crucial importance.

Keywords: venture industry, venture investment, determinants of the venture sector development, IT-sector

Procedia PDF Downloads 337
226 South Asia’s Political Landscape: Precipitating Terrorism

Authors: Saroj Kumar Rath

Abstract:

India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.

Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban

Procedia PDF Downloads 605
225 Testing a Structural Model of SME Development in Mauritius and Botswana: The Role of Institutions in a Comparative Perspective

Authors: B. Seetanah, R. V. Sannassee, Lamport, K. Padachi, K. Seetah, S. Matadeen, N. Okurutt, N. Ama, L. Mokoodi

Abstract:

This paper analyses the impact of the various enabling elements towards fostering entrepreneurial behavior for two Sub Saharan African countries namely Mauritius and Botswana, with focus is on role of institutions (ministries, government support institutions, financing institutions and SME associations). Using a structural equation modeling framework, it is found that finance was some of the most determinant of respondents’ evaluation of the business climate thus emphasizing on the crucial of such an ingredient. Interestingly government related factors such as government support and institutional support are also reported to have a significant influence on the SME business climate in both countries.

Keywords: institutions, SME, SEM, Mauritius, Botswana

Procedia PDF Downloads 382
224 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 286
223 Share Pledging and Financial Constraints in China

Authors: Zijian Cheng, Frank Liu, Yupu Sun

Abstract:

The relationship between the intensity of share pledging activities and the level of financial constraint in publicly listed firms in China is examined in this paper. Empirical results show that the high financial constraint level may motivate insiders to use share pledging as an alternative funding source and an expropriation mechanism. Share collateralization can cause a subsequently more constrained financing condition. Evidence is found that share pledging made by the controlling shareholder is likely to mitigate financial constraints in the following year. Research findings are robust to alternative measures and an instrumental variable for dealing with endogeneity problems.

Keywords: share pledge, financial constraint, controlling shareholder, dividend policy

Procedia PDF Downloads 152
222 Summary of the Actual Conditions of SME Management Consultants

Authors: Takao Maeda, Tomofumi Tohara, Shigeaki Mishima

Abstract:

Focusing on the “SME management consultants” in Japan, this study intends (1) to clarify implications as to their self-actualization, motivation and (2) to revitalize SMEs, on which local economies depend. On the basis of these study purposes, the presenters conducted an interview survey of several SME management consultants and SME managers. This survey identified the current circumstances and challenges as follow: SME management consultants are high-level professionals who acquired very difficult national qualifications (examination pass rate 4%) to provide consultation and business analysis for SMEs. Nevertheless, only 20% of the qualified consultants run their business independently, while the rest (80%) are corporate employees as in-house consultants, the majority of whom belong to big companies. They acquired the qualification merely for the purpose of self-development. Therefore, they have few opportunities to demonstrate their expertise inside and outside their companies.On the other hand, the SMEs, which are to receive analysis and consultation from SME management consultants, constitute 99.7% of all industries, and are very important to local communities, for they sustain the economy and provide employment. SMEs used to be supported by the consultants in company management due to their scarce managerial resources compared with big companies. Nowadays, however, SMEs are regarded as the source of Japanese economic dynamism. To have the same degree of managerial skills as big companies, therefore, SMEs now need analysis and consultation by the consultants in more active ways, such as discovering and utilizing their dormant technologies. Partly because SME management consultants have not been fully utilized in Japan, the number of SMEs has been on a long-term downward trend since 1986. Utilizing expertise of the in-house consultants, who have rich experience in their big companies and deep knowledge regarding SMEs obtained through qualification, will potentially lead to revitalization of SMEs and consequently to economic growth in Japan. Through detailed analysis of the interview results, this study revealed short-term and long-term challenges regarding how to utilize SME management consultants. The most urgent issue is to study managerial approaches that will provide the consultants serving in big companies with more “opportunities to demonstrate their expertise.” The long-term issue is to enable the consultants to demonstrate their expertise in financial institutions, or financial supporter of SMEs, to examine farsighted and innovative financing strategy and criteria based on managers’ personalities and their business plans, instead of the conventional financing based on prompt fund collection.

Keywords: small and medium enterprise(SME), SME managemant consultant, self-actualization, motivation

Procedia PDF Downloads 392
221 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 328