Search results for: the fight against terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 577

Search results for: the fight against terrorism

427 The Role of Police in Counterinsurgency: A Case Study of Tripura

Authors: Yagnik Patel

Abstract:

This paper will analyze and explain two main objectives. First, it will examine the emergence of the insurgency in the state of Tripura. The State of Tripura was facing the full blow of insurgency problem since 1978 after the formation of Tripura National Volunteers (TNV). But, the roots of this insurgency were found even before 1978. This study will analyze the roots and trajectory of insurgency in the Tripura. Second, it will examine the role played by the police in counterinsurgency in the State of Tripura. Even though state police are mandated for the maintenance of the law and order and public order (like every police), the state police of Tripura have played a significant role in curbing the insurgency by enhancing their counterinsurgency (COIN) capabilities and re-structuring the new comprehensive COIN doctrine. And by the end of May 2015, the State Government has lifted The Armed Forces (Special Powers) Act (AFSPA) from the State of Tripura, as declaiming of the violence. The fight against the insurgency, usually done by the military or para-military, but nowadays the police organization is also becoming a vital state apparatus. After Punjab police and Andhra Pradesh police, Tripura police have also successfully curbed the insurgency from the state. This was the third time when successful counterinsurgency did by the state police in India. This has shown the importance of the police in the fight against the insurgency. In this regard, this paper will use both quantitative and qualitative research methods for an explanatory case study to analyze and explain the roots, causes and the trajectory of insurgency in the state of Tripura and the role played by the police in COIN in Tripura. Along with this, the paper will also examine the successful ‘Police Model of Tripura’.

Keywords: counterinsurgency, insurgency, police, Tripura state rifles

Procedia PDF Downloads 188
426 The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN

Authors: Nur Iman Subono, Meidi Kosandi

Abstract:

This paper examines the role of regional cooperation in the Association of Southeast Asian Nations (ASEAN) in the fight against human trafficking for Indonesia. Many among scholars suggest that regional cooperation is necessary for combating human trafficking for its transnational and organized character as a crime against humanity. ASEAN members have been collectively active in responding transnational security issues with series of talks and collaboration agreement since early 2000s. Lately in 2015, ASEAN agreed on ASEAN Convention against Trafficking in Persons, particularly Women and Children (ACTIP) that requires each member to collaborate in information sharing and providing effective safeguard and protection of victims. Yet, the frequency of human trafficking crime occurrence remains high and tend to increase in Indonesian in 2017-2018. The objective of this paper is to examine the effectiveness and success of ACTIP implementation in the fight against human trafficking in Indonesia. Based on two years of research (2017-2018) in three provinces with the largest number of victims in Indonesia, this paper shows the tendency of persisting crime despite the implementation of regional and national anti-trafficking policies. The research was conducted by archive study, literature study, discourse analysis, and depth interviews with local government officials, police, prosecutors, victims, and traffickers. This paper argues that the relative success of ASEAN in establishing convention at the high-level meetings has not been followed with the success in its implementation in the society. Three main factors have contributed to the ineffectiveness of the agreements, i.e. (1) ASEAN institutional arrangement as a collection of sovereign states instead of supranational organization with binding authority; (2) the lack of commitment of ASEAN sovereign member-states to the agreements; and (3) the complexity and variety of the nature of the crime in each member-state. In effect, these factors have contributed to generating the regionalism paradox in ASEAN where states tend to revert to national policies instead of seeking regional collective solution.

Keywords: human trafficking, transnational security, regionalism, anti trafficking policy

Procedia PDF Downloads 159
425 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 536
424 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions

Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju

Abstract:

Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.

Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism

Procedia PDF Downloads 165
423 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 341
422 Teaching Students Empathy: Justifying Diverse and Inclusive Texts

Authors: Jennifer Wallbrown

Abstract:

It’s not uncommon in the US to see news article headlines about public school teachers being scrutinized for what they are teaching or see the general public weighing in on whether or not they think certain controversial subjects should be addressed in the classroom- such as LGBTQ+ or multicultural literature. Even though this is a subject that has been written about and discussed for years, it continues to be a relevant topic in education as it continues to be a struggle to implement more diverse texts. Although it is valid for teachers to fear controversy when they attempt to create a more diverse or inclusive curriculum, it is a fight worth fighting because of the benefits students can gain from being exposed to a wide range of texts. This paper is different from others of its kind because it addresses many of the counterarguments often made to implementing LGBTQ+ or multicultural literature in secondary classrooms. It not only encourages educators to try to include more diverse texts, but it gives them the tools to address common concerns and be sound in their reasoning for choosing these texts. This can be of interest to those educators who are not English teachers because a truly diverse and inclusive curriculum would include other subjects as well- including history, art, and more. By the end of my proposed paper, readers will feel encouraged to choose more diverse and inclusive texts for their classrooms. They can also be confident that if met with opposition or controversy, as is sometimes common when implementing new texts, that they have sound arguments and reasoning for why they chose to include these texts. This reasoning is that, based on the research, studies have found there are benefits to students studying texts about those different from themselves, because it teaches them empathy and helps fight prejudice.

Keywords: education, diverse, inclusive, multicultural, lgbtq+, pedagogy

Procedia PDF Downloads 160
421 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 136
420 The Islamic Perspective in International Relations

Authors: Hakam Junus, Natassha Chrysanti

Abstract:

The international relations theory currently is dominated by the western theoretical perspectives. Although the western theories are often used by many scholars as the universal perspective to explain the phenomena that occur in the world, sometimes the existing theories are failed to explain various issues that occur in the non-western world, for example, in the studies concerning on terrorism issues. Using inappropriate theories to explain the international issues such as terrorism will cause a failure in the decision-making process. The lack of understanding regarding Islamic perspective could be one of the factors that make international society unable to eradicate violent terrorism in the name of religion. Thus, this paper is argued that considering Islamic perspective as one of the major studies in international relations is significant to build a bridge between the Islamic world and the western world. It is believed that enhancing the study of Islamic perspective will create better understanding of the Islamic world and will enrich the study of international relations. This paper is conducted through a qualitative approach, in which data is obtained from the literature analysis. Considering Islamic perspective is important because Islam is listed as one of the major religions in the world. It is also due to the geopolitical spread of the Muslim in the world and the likelihood of the Islamic perspective to shape and influence Muslim’s behavior in the international level. The study of Islamic perspective in the international level is neither to contempt nor to oppose the existing western theories; rather it is needed in order to broaden the perspective in the international relations studies. The Islamic perspective is different compared to the non-western school of thought such as realism, and liberalism in some respects. The Islamic perspective cannot be explained through the lens of rationalist approaches. Compares to the post-positivism international relations perspectives, Islamic perspective is probably closer to the constructivist school of thought. However, the Islamic perspective offers some uniqueness that is not limited to the socially constructed ideas as in the constructivist arguments. This paper will be developed according to the discussion of three aspects that make Islamic perspective different with the existing international relations theories. The first aspect is the main actors in the international level. The second aspect is regarding on what appears to be the most important point for the actors in the international relations. The third aspect is regarding the pattern of relationship between the actors in the international level. In addition, this paper will briefly discuss the perspective of Islam in economics compare to the existing theories in the realm of international political economy.

Keywords: international relations, Islam, non-western theories, societies

Procedia PDF Downloads 498
419 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 404
418 Reasonableness to Strengthen Citizen Participation in Mexican Anti-Corruption Policies

Authors: Amós García Montaño

Abstract:

In a democracy, a public policy must be developed within the regulatory framework and considering citizen participation in its planning, design, execution, and evaluation stages, necessary factors to have both legal support and sufficient legitimacy for its operation. However, the complexity and magnitude of certain public problems results in difficulties for the generation of consensus among society members, leading to unstable and unsuccessful scenarios for the exercise of the right to citizen participation and the generation of effective and efficient public policies. This is the case of public policies against corruption, an issue that in Mexico is difficult to define and generates conflicting opinions. To provide a possible solution to this delicate reality, this paper analyzes the principle of reasonableness as a tool for identifying the basic elements that guarantee a fundamental level of the exercise of the right to citizen participation in the fight against corruption, adopting elements of human rights indicator methodologies. In this sense, the relevance of having a legal framework that establishes obligations to incorporate proactive and transversal citizen participation in the matter is observed. It is also noted the need to monitor the operation of various citizen participation mechanisms in the decision-making processes of the institutions involved in the fight and prevention of corruption, which lead to an increase in the improvement of the perception of the citizen role as a relevant actor in this field. It is concluded that the principle of reasonableness is presented as a very useful tool for the identification of basic elements that facilitate the fulfillment of human rights commitments in the field of public policies.

Keywords: anticorruption, public participation, public policies, reasonableness

Procedia PDF Downloads 82
417 The Role of Asset Recovery in Combatting Organized Crime

Authors: Tamas Bezsenyi, Noemi Katona

Abstract:

Fighting Human Trafficking is a highly important issue worldwide that states need to deal with in international politics. In the EU combatting human trafficking is emphasized in international policy making and also in the work of international law enforcement, thus in the work of the EUROPOL. While the EU Directive against Human Trafficking prescribes how states should fight this transnational crime and also how victims should be assisted, the EUROPOL focuses on the effective cooperation between national law enforcement agencies. However, despite the aims of the common fight, human trafficking is regulated differently in the punitive law of various nation states. This deeply defines the work and possibilities of national law enforcement organizations. Among the manifold differences in this paper, we focus on the role of regulating asset recovery. We highlight that money, and the regulation and practice how the law enforcement deals with income gained from criminal activities, play essential role in combatting human trafficking. While doing research on the investigation of transnational human trafficking by the Hungarian Law Enforcement Agencies, we have found that the unfortunate regulation of asset recovery determines the lower effectiveness of eliminating criminal organizations. While i.e. in the Netherlands confiscation of property takes place in an early stage of the criminal procedure, in Hungary it can be conducted only if money laundering is also assumed. Our presentation builds on the comparison of criminal procedures which we analyse based on criminal files and interviews with coworkers of the National Bureau of Investigation.

Keywords: human trafficking, law enforcement, asset recovery, organized crime

Procedia PDF Downloads 283
416 The Effects of Leadership on the Claim of Responsibility

Authors: Katalin Kovacs

Abstract:

In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.

Keywords: claim of responsibility, leadership, tactical choice, terrorist group

Procedia PDF Downloads 313
415 The Lightener of Love, the World Peace

Authors: Abdul Razzaq Azad, Muhammad Asad Razzaq

Abstract:

The current study reveals that Muslim society losing their basics concepts of courtesy which are the part of Islam. It is known that Muslims played a key role for providing piece in society throughout the history. Humanities always accept the changes through time, ideologies, ethics and traditions, various religious changes, culture, social behaviors and social problems, attitudes, political situations, literature, historical stress, economic clashes, wars and daily routine’s life. It also observed that religious people have their mind set due to their different religious teachings. All the religions have their different religious teachings which have different approaches for their followers. All the religions have same lesson of peace and prosperity. After 09/11 the entire scenario changed, even tried to connect terrorism and extremism with Islam and Muslims. It created a gap among religions and there was not attempt to use for reducing that gap. There were many meetings called at different places of religious scholars in different countries, but not able to get acceptable results. It also created a gap within the country in different religious sects. In the last 15 years there were14000 people have been killed from different religious incidents and even in different sects’ activities. The current study based on survey from 25 Imams and 10 Khatibs from South Punjab. The results show that they knew the word interfaith harmony and the role of Imams and Khatibs for peace in the inter-religious societies.

Keywords: Islam, peace religion, terrorism, extremism, freedom, peace, prosperity and society

Procedia PDF Downloads 495
414 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 163
413 Understanding the Mechanisms of Salmonella typhimurium Resistance to Cannabidiol

Authors: Iddrisu Ibrahim, Joseph Atia Ayariga, Junhuan Xu, Daniel Abugri, Boakai Robertson, Olufemi S. Ajayi

Abstract:

The emergence of multidrug resistance poses a huge risk to public health globally. Yet these recalcitrant pathogens continue to rise in incidence rate, with resistance rates significantly outpacing the speed of antibiotic development. This, therefore, presents an aura of related health issues such as untreatable nosocomial infections arising from organ transplants and surgeries, as well as community-acquired infections that are related to people with compromised immunity, e.g., diabetic and HIV patients, etc. There is a global effort to fight multidrug-resistant pathogens spearheaded by the World Health Organization, thus calling for research into novel antimicrobial agents to fight multiple drug resistance. Previously, our laboratory demonstrated that Cannabidiol (CBD) was an effective antimicrobial against Salmonella typhimurium (S. typhimurium). However, we observed resistance development over time. To understand the mechanisms S. typhimurium uses to develop resistance to Cannabidiol (CBD), we studied the abundance of bacteria lipopolysaccharide (LPS) and membrane sterols of both susceptible and resistant S. typhimurium. Using real-time quantitative polymerase chain reaction (RT-qPCR), we also analyzed the expression of selected genes known for aiding resistance development in S. typhimurium. We discovered that there was a significantly higher expression of blaTEM, fimA, fimZ, and integrons in the CBD-resistant bacteria, and these were also accompanied by a shift in abundance in cell surface molecules such as lipopolysaccharide (LPS) and sterols.

Keywords: antimicrobials, resistance, cannabidiol, gram-negative bacteria, integrons, blaTEM, Fim, LPS, ergosterols

Procedia PDF Downloads 101
412 Indonesia's War on Terror and the Consequences on Indonesian Political System

Authors: Salieg L. Munestri

Abstract:

War on Terror became a principal war after the 9/11 attacks on U.S. homeland. Instead of helping to build up worldwide efforts to condemn terror and suicide bombings, the U.S.-led war on terror has given opportunities for the vast spread of terror. In much of Muslim world recently, the Bush’s Doctrine pushing all nations to choose sides in a war that is not truly a war has resulted worse effects. In the world’s most populous Muslim nation, Indonesia, more terror occurred since then. Instead of reinforcing the well-trained anti-terror military forces, Indonesian government established US-funded Special Detachment 88 to guarantee the accomplishment of war on terror in Indonesia and significantly to bring impact on regional security atmosphere. Indonesia is a potential power in Asia but it lacked off sophisticated military equipments. Consequently, Indonesia agrees to become a U.S. mutual partner in combating terrorism managed by Defense Security Cooperation Agency. The formation of elite anti-terror forces and U.S. partnerships perform Indonesia’s commitment to take a position beside the U.S. in coping with terrorism issue. However, this undeniably brings consequences on Indonesian political athmosphere, which encourages the writer to dig deep the consequences on the domestic environment of Indonesian political system. The establishment of the elite forces has aroused fluctuations within government, chiefly Indonesian House, concerning the establishment urgency, the large amount of funding, and the unpleasant performances, particularly the treatment toward suspected terrorists. Hence, evaluation process upon the Detachment 88 is highly demanding.

Keywords: anti-terror forces, Indonesia, political system, war on terror

Procedia PDF Downloads 346
411 Nigeria’s Terrorists RehabIlitation And Reintegration Policy: A Victimological Perspective

Authors: Ujene Ikem Godspower

Abstract:

Acts of terror perpetrated either by state or non-state actors are considered a social ill and impugn on the collective well-being of the society. As such, there is the need for social reparations, which is meant to ensure the healing of the social wounds resulting from the atrocities committed by errant individuals under different guises. In order to ensure social closure and effectively repair the damages done by anomic behaviors, society must ensure that justice is served and those whose rights and privileges have been denied and battered are given the necessary succour they deserve. With regards to the ongoing terrorism in the Northeast, the moves to rehabilitate and reintegrate Boko Haram members have commenced with the establishment of Operation Safe Corridor,1 and a proposed bill for the establishment of “National Agency for the Education, Rehabilitation, De-radicalisation and Integration of Repentant Insurgents in Nigeria”2. All of which Nigerians have expressed mixed feelings about. Some argue that the endeavor is lacking in ethical decency and justice and totally insults human reasoning. Terrorism and counterterrorism in Nigeria have been enmeshed in gross human rights violations both by the military and the terrorists, and this raises the concern of Nigeria’s ability to fairly and justiciably implement the deradicalization and reintegration efforts. On the other hand, there is the challenge of the community dwellers that are victims of terrorism and counterterrorism and their ability to forgive and welcome back their immediate-past tormentors even with the slightest sense of injustice in the process of terrorists reintegration and rehabilitation. With such efforts implemented in other climes, the Nigeria’s case poses a unique challenge and commands keen interests by stakeholders and the international community due to the aforementioned reasons. It is therefore pertinent to assess the communities’ level of involvement in the cycle of reintegration- hence, the objective of this paper. Methodologically as a part of my larger PhD thesis, this study intends to explore the three different local governments (Michika in Adamawa, Chibok in Borno, and Yunusari in Yobe), all based on the intensity of terrorists attacks. Twenty five in-depth interview will be conducted in the study locations above featuring religious leaders, Community (traditional) leaders, Internally displaced persons, CSOs management officials, and ex-Boko Haram insurgents who have been reintegrated. The data that will be generated from field work will be analyzed using the Nvivo-12 software package, which will help to code and create themes based on the study objectives. Furthermore, the data will be content-analyzed, employing verbatim quotations where necessary. Ethically, the study will take into consideration the basic ethical principles for research of this nature. It will strictly adhere to the principle of voluntary participation, anonymity, and confidentiality.

Keywords: boko haram, reintegration, rehabilitation, terrorism, victimology

Procedia PDF Downloads 246
410 Energy Transition and Investor-State Disputes: Scientific Knowledge as a Solution to the Burden for Climate Policy-Making

Authors: Marina E. Konstantinidi

Abstract:

It is now well-established that the fight against climate change and its consequences, which are a threat to mankind and to life on the planet Earth, requires that global temperature rise be kept under 1,5°C. It is also well-established that this requires humanity to put an end to the use of fossil fuels in the next decades, at the latest. However, investors in the fossil energy sector have brought or threatened to bring investment arbitration claims against States which put an end to their activity for the purpose of reaching their climate change policies’ objectives. Examples of such claims are provided by the cases of WMH v. Canada, Lone Pine v. Canada, Uniper v. Netherlands and RWE v. Netherlands. Irrespective of the outcome of the arbitration proceedings, the risk of being ordered to pay very substantial damages may have a ‘chilling effect’ on States, meaning that they may hesitate to implement the energy transition measures needed to fight climate change and its consequences. Although mitigation action is a relatively recent phenomenon, knowledge about the negative impact of fossil fuels has existed for a long time ago. In this paper, it is argued that structured documentation of evidence of knowledge about climate change may influence the adjudication of investment treaty claims and, consequently, affect the content of energy transition regulations that will be implemented. For example, as concerns investors, evidence that change in the regulatory framework towards environmental protection could have been predicted would refute the argument concerning legitimate expectations for legislative stability. By reference to relevant case law, it attempted to explore how pre-existing knowledge about climate change can be used in the adjudication of investor-State disputes and resulting from green energy transition policies.

Keywords: climate change, energy transition, international investment law, knowledge

Procedia PDF Downloads 99
409 In Patribus Fidelium Leftist Discourses on Political Violence in Lebanon and Algeria: A Critical Discourse Analysis

Authors: Mehdi Heydari Sanglaji

Abstract:

The dramatic events of the 11 September, and their tragic repercussions, catapulted issues of the political violence in and from the ‘Muslim world’ onto the political discourse, be it in patriotic speeches of campaigning politicians or the TV and news punditry. Depending on what end of the political spectrum the politician/pundit pledges fealty to, the overall analyses of political violence in the West Asia and North Africa (WANA) tends towards two overarching categories: on the Right, the diagnosis has unanimously been, ‘they must hate our freedom.’ On the Left, however, there is the contention that the West has to be counted as the primary cause of such rage, for the years of plundering of lives and resources, through colonialism, the Cold War, coups, etc. All these analyses are premised on at least two presuppositions: the violence in and from the WANA region a) is always reactionary, in the sense that it happens only in response to something the West is or does; and b) must always already be condemned, as it is essentially immoral and wrong. It is the aim of this paper to challenge such viewpoints. Through a rigorous study of the historical discourses on political violence in the Leftist organizations active in Algeria and Lebanon, we claim there is a myriad of diverse reasons and justifications presented for advocating political violence in these countries that defy facile categorization. Inspecting such rhetoric for inciting political violence in Leftist discourses, and how some of these reasonings have percolated into other movements in the region (e.g., Islamist ones), will reveal a wealth of indigenous discourses on the subject that has been largely neglected by the Western Media punditry and even by the academia. The indigenous discourses on political violence, much of which overlaps with emancipatory projects in the region, partly follow grammar and logic, which may be different from those developed in the West, even by its more critical theories. Understanding so different epistemology of violence, and the diverse contexts in which political violence might be justifiable in the mind of ‘the other,’ necessitates a historical, materialist, and genealogical study of the discourse already in practice in the WANA region. In that regard, both critical terrorism studies and critical discourse analysis provide exemplary tools of analysis. Capitalizing on such tools, this project will focus on unearthing a history of thought that renders moot the reduction of all instances of violence in the region to an Islamic culture or imperialism/colonialism. The main argument in our research is that by studying the indigenous discourses on political violence, we will be far more equipped in understanding the reasons and the possible solutions for acts of terrorism in and from the region.

Keywords: political violence, terrorism, leftist organizations, West Asia/North Africa

Procedia PDF Downloads 129
408 Review of State Anti-Trafficking Laws in the United States of America and Their Success in Combating Human Trafficking and Protecting the Victims

Authors: Andrea Marcela Morales Reyes

Abstract:

In the year 2000, the federal government of the United States of America enacted anti-trafficking legislation to prevent human trafficking, prosecute traffickers, and protect the victims. Since then, all 50 states have followed the federal government's example by enacting state-level anti-trafficking legislation. In order to fight human trafficking in the United States, it is paramount that this legislation is not only comprehensively enacted but also enforced. This study reviewed the anti-trafficking laws enacted in each of the 50 states and investigated the success of such laws by reporting the number of trafficking related prosecutions, cases identified, and victims protected. This study reviewed human trafficking reports issued by nonprofits, and state and federal level agencies. An increase in the number of cases investigated since the state laws have been passed reflects a moderate success in the fight against human trafficking in the U.S. This review also found that although every state has passed anti-trafficking legislation, many still lack a comprehensive approach to combat human trafficking; some states lack key provisions to prevent human trafficking, prosecute traffickers, and protect it victims. This, along with the lack of enforcement of the anti-trafficking plans included in each of the state legislations, has meant that the human trafficking cases investigated in fiscal year 2016 are not near the estimated numbers; which in turn suggests that this crime is still greatly unaccounted for. This study concludes that although important steps have been taken at the national and state level to combat human trafficking, the identification and prosecution of human trafficking cases still proves challenging in the United States.

Keywords: enforcement of laws, human trafficking, anti-trafficking legislation, United States

Procedia PDF Downloads 165
407 EU Border Externalisation in Conflict Zones: Living at and Migrating Across the Iran-Turkey Border

Authors: Karolína Augustovaá

Abstract:

Turkey’s eastern borders have been at the center of criticism by the European Commission who condemns restrictions against Kurdish civilians as the result of Turkey’s military operations against terrorist organizations (namely PKK). Yet, the Commission has launched economic and political support for numerous military projects along the Iran-Turkey border to fight cross-border crime (namely “illegal” migration) along its external borders. Whilst border externalization has been extensively examined in the EU’s wide neighborhood, its analysis from the ground in conflict zones is emerging. The existing analysis also rarely considers the impact of external border management beyond international migration - on the local context and its people. However, tough externalization policies at borders, where local wars are fought, are fundamental to scrutinize as they invite us to question the effects of EU’s migration management on diverse communities navigating their life along external borders. To fill this research lacunae, this article examines intersections between the local military operations and international (EU-Turkey) migration management at the Turkey’s border with Iran and questions their impact on the everyday struggles of people living at and migrating across the border. To do so, it applies critical feminist and military literature to border studies. Methodologically, the article draws upon ethnographic research in Van (Eastern Turkey), using participant observations and interviews with sixty participants. This article argues that the EU’s externalization policies add to the violence generated by the local militarized conflict and eventually (re-)produce it in the forms of push-backs and physical violence against people who daily cross the border irregularly for their physical/economic survival. By doing so, I suggest that (inter)national fears of terrorism and migration inter-sect, materialize and affect everyday sites of diverse racialized groups living at and moving across external borders, such as international migrants (Afghans) and the local residents (Kurds) at the Turkey-Iran border. This article highlights the need to analyze the local border context in tandem with international migration management in the EU’s wider neighborhood to understand how conflict and violence evolves there.

Keywords: european union border externalization, eastern turkey, migration, conflict, kurdish question

Procedia PDF Downloads 202
406 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
405 Shooting in The Foot at The Pulpit; An Analysis of Analysis of The Origin and Progression of Conflict Among the Born-Again Churches in Uganda

Authors: Baguma Charles Abwooli

Abstract:

Whereas they profess to be comrades in the fight to save souls, Born Again Churches in Uganda are shooting each other in the foot over yet to be understood reasons. For a long time, churches have sustained a bitter divide among themselves. The country has witnessed pastoral scandals, including church leaders dragging each other to court, setting each other’s churches ablaze, and even plotting assassination against each her. The most dreadful was when one pastor called a chest-thumping press conference at the demise of another. There is even an emergence of church-owned radio stations purposed to fuel this conflict. Worse still, the division among pastors has been transferred to their congregations to extent that at the first meeting, congregants ask each other where they pray from perhaps to know how to deal with each other. This has caused the born-again to maintain factions among themselves and keeping ready to fight in case there is a battle. This is quite a risk to peace and stability in the country. This kind of belligerence not only defeats the very existence of churches but is a threat to national peace and security, especially as the churches mushroom across the country. It is feared that the vice could spread to the rest of Eastern Africa and beyond, given the connectivity. There is already evidence to this. One Pastor was heard to call the late Ghanaian Pastor T. B. Joshua, a witch who has been training witches in Uganda. He said this at his demise while referring to pastors that subscribe to T. B. Joshua’s approach to preaching the Gospel. This is an abomination, especially in Africa! There is, therefore, an urgent need to understand the roots of this conflict and design measures to decisively manageit. The present study employs tools based on conflict resolution theory to conduct a deep qualitative analysis of the origin and progression of the Born-Againconflict in Uganda with intend to make recommendations of appropriate measures to resolve it.

Keywords: uganda, shooting, pulpit, born again churches

Procedia PDF Downloads 126
404 A Critical Discourse Analysis of ‘Youth Radicalisation’: A Case of the Daily Nation Kenya Online Newspaper

Authors: Miraji H. Mohamed

Abstract:

The purpose of this study is to critique ‘radicalisation’ and more particularly ‘youth radicalisation’ by exploring its usage in online newspapers. ‘Radicalisation’ and ‘extremism’ have become the most common terms in terrorism studies since the 9/11 attacks. Regardless of the geographic location, when the word terrorism is used the terms ‘radicalisation’ and ‘extremism’ always follow to attempt to explore the journey of the perpetrators towards violence. These terms have come to represent a discourse of dominantly pejorative traits often used to describe spaces, groups, and processes identified as problematic. Even though ambiguously defined they feature widely in government documents, political statements, news articles, academic research, social media platforms, religious gatherings, and public discussions. Notably, ‘radicalisation’ and ‘extremism’ have been closely conflated with the term youth to form ‘youth radicalisation’ to refer to a discourse of ‘youth at risk’. The three terms largely continue to be used unquestioningly and interchangeably hence the reason why they are placed in single quotation marks to deliberately question their conventional usage. Albeit this comes timely in the Kenyan context where there has been a proliferation of academic and expert research on ‘youth radicalisation’ (used as a neutral label) without considering the political, cultural and socio-historical contexts that inform this label. This study seeks to draw these nuances by employing a genealogical approach that historicises and deconstructs ‘youth radicalisation’; and by applying a Discourse-Historical Approach (DHA) of Critical Discourse Analysis to analyse Kenyan online newspaper - The Daily Nation between 2015 and 2018. By applying the concept of representation to analyse written texts, the study reveals that the use of ‘youth radicalisation’ as a discursive strategy disproportionately affects young people especially those from cultural/ethnic/religious minority groups. Also, the ambiguous use of ‘radicalisation’ and ‘youth radicalisation’ by the media reinforces the discourse of ‘youth at risk’ which has become the major framework underpinning Countering Violent Extremism (CVE) interventions. Similarly, the findings indicate that the uncritical use of ‘youth radicalisation’ has been used to serve political interests; and has become an instrument of policing young people, thus contributing to their cultural shaping. From this, it is evident that the media could thwart rather than assist CVE efforts. By exposing the political nature of the three terms through evidence-based research, this study offers recommendations on how critical reflective reporting by the media could help to make CVE more nuanced.

Keywords: discourse, extremism, radicalisation, terrorism, youth

Procedia PDF Downloads 129
403 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 525
402 Revisiting Politics of Religion in Muslim Republics of Former Soviet Union and Rise of Extremism, Global Jihadi Terrorism

Authors: Etibar Guliyev

Abstract:

The breakdown of the Soviet Union in 1991 has led to a considerable rise in the religious self-consciousness of Muslim population of the Central Asia. Additionally, huge amount of money spent by various states further facilitated the spread of religious ideas. According to some sources, Saudi Arabia spent 87 billion dollars to propagate Wahhabism abroad during two decades, whereas the Communist Party of the Soviet Union spent just over 7 billion dollars to spread its ideology worldwide between 1921 and 1991. As the result, today once a remote area from international politics has turned into third major source of recruitment of fighters for global terrorist organizations. In order to illustrate to scope of the involvement of the Central Asian residents in international terrorist networks it is enough to mention the name of Colonel Gulmorod Khalimov, the former head of the Tajik special police forces who served as ISIS war minister between 2016 and 2017. The importance of the topic stems from the fact that the above-mentioned republics with a territory of 4 million square km and the population of around 80 million people borders Russia, Iran Afghanistan and China. Moreover, the fact that political and military activities motivated with religious feelings in those countries have implications not only for domestic but also for regional and global political relations and all of them has root in politics of religions adds value to the research. This research aims to provide an in-depth analyses of the marked features of the state policies to regulate religious activities and approach this question both from individual, domestic, regional and global levels of analyses. The research will enable us to better understand what implications have the state of religious freedom in post-Soviet Muslim republics for international relations and the rise of global jihadi terrorism. The paper tries to find a linkage between the mentioned terror attacks and underground rise of religious extremism in Central Asia. This research is based on multiple research methods, mainly on qualitative one. The process tracing method is also employed to review religious policies implemented from 1918-1991 and after the collapse of the Soviet Union in a chronological way. In terms of the quantitative method, it chiefly will be used in a bid to process various statistics disseminated in academic and official sources. The research mostly explored constructivist, securitization and social movement theories. Findings of the research suggests that the endemic problems peculiar to authoritarian regimes of Central Asia such as crackdown on the expression of religious believe and any kind of opposition, economic decline, instrumental use of religion and corruption and tribalism further accelerated the recruitment problem. Paper also concludes that the Central Asian states in some cases misused counter-terrorism campaign as a pretext to further restrict freedom of faith in their respective countries.

Keywords: identity, political Islam, religious extremism, security, terrorism

Procedia PDF Downloads 266
401 Forecast Financial Bubbles: Multidimensional Phenomenon

Authors: Zouari Ezzeddine, Ghraieb Ikram

Abstract:

From the results of the academic literature which evokes the limitations of previous studies, this article shows the reasons for multidimensionality Prediction of financial bubbles. A new framework for modeling study predicting financial bubbles by linking a set of variable presented on several dimensions dictating its multidimensional character. It takes into account the preferences of financial actors. A multicriteria anticipation of the appearance of bubbles in international financial markets helps to fight against a possible crisis.

Keywords: classical measures, predictions, financial bubbles, multidimensional, artificial neural networks

Procedia PDF Downloads 577
400 Understanding Strategic Engagement on the Conversation Table: Countering Terrorism in Nigeria

Authors: Anisah Ari

Abstract:

Effects of organized crime permeate all facets of life, including public health, socio-economic endeavors, and human security. If any element of this is affected, it impacts large-scale national and global interest. Seeking to address terrorist networks through technical thinking is like trying to kill a weed by just cutting off its branches. It will re-develop and expand in proportions beyond one’s imagination, even in horrific ways that threaten human security. The continent of Africa has been bedeviled by this menace, with little or no solution to the problem. Nigeria is dealing with a protracted insurgency that is perpetrated by a sect against any form of westernization. Reimagining approaches to dealing with pressing issues like terrorism may require engaging the right set of people in the conversation for any sustainable change. These are people who have lived through the daily effects of the violence that ensues from the activities of terrorist activities. Effective leadership is required for an inclusive process, where spaces are created for diverse voices to be heard, and multiple perspectives are listened to, and not just heard, that supports a determination of the realistic outcome. Addressing insurgency in Nigeria has experienced a lot of disinformation and uncertainty. This may be in part due to poor leadership or an iteration of technical solutions to adaptive challenge peacemaking efforts in Nigeria has focused on behaviors, attitudes and practices that contribute to violence. However, it is important to consider the underlying issues that build-up, ignite and fan the flames of violence—looking at conflict as a complex system, issues like climate change, low employment rates, corruption and the impunity of discrimination due to ethnicity and religion. This article will be looking at an option of the more relational way of addressing insurgency through adaptive approaches that embody engagement and solutions with the people rather than for the people. The construction of a local turn in peacebuilding is informed by the need to create a locally driven and sustained peace process that embodies the culture and practices of the people in enacting an everyday peace beyond just a perennial and universalist outlook. A critical analysis that explores the socially identified individuals and situations will be made, considering the more adaptive approach to a complex existential challenge rather than a universalist frame. Case Study and Ethnographic research approach to understand what other scholars have documented on the matter and also a first-hand understanding of the experiences and viewpoints of the participants.

Keywords: terrorism, adaptive, peace, culture

Procedia PDF Downloads 103
399 Media Coverage of Cervical Cancer in Malawi: A National Sample of Newspapers and a Radio Station

Authors: Elida Tafupenji Kamanga

Abstract:

Cancer of the cervix remains one of the high causes of death among Malawian women. Despite the government introduction of free screening services throughout the country, patronage still remains low and lack of knowledge high. Given the critical role mass media plays in relaying different information to the public including health and its influence on health behaviours, the study sought to analyse Malawi media coverage of the disease and its effectiveness. The findings of the study will help inform media advocacy directed at changing any coverage impeding the effective dissemination of cervical cancer message which consequently will help increase awareness and accessing of screening behaviours among women. A content analysis of 29 newspapers and promotional messages on cervical from a local radio station was conducted for the period from 2012 to 2015. Overall the results showed media coverage in terms of content and frequency increased for the four-year period. However, of concern was the quality of information both media presented to the public. The lapse in information provided means there is little education taking place through the media which could be contributing to the knowledge gap the women have thereby affecting their decision to screen. Also lack of adequate funding to media institutions and lack of collaboration between media institutions and stakeholders involved in the fight against the disease were noted as other contributing factors to low coverage of the disease. Designing messages that are not only informative and educative but also innovative may help increase awareness; improve the knowledge gap and potential adoption of preventive screening behaviour by Malawian women. Conversely, good communication between the media institutions and researchers involved in the fight against the disease through the channelling of new findings back to the public as well as increasing funding towards similar cause should be considered.

Keywords: cervical cancer, effectiveness, media coverage, screening

Procedia PDF Downloads 197
398 Efficient Corporate Image as a Strategy for Enhancing Profitability in Hotels

Authors: Lucila T. Magalong

Abstract:

The hotel industry has been using their corporate image and reputation to maintain service quality, customer satisfaction, and customer loyalty and to leverage themselves against competitors and facilitate their growth strategies. With the increasing pressure to perform, hotels have even created hybrid service strategy to fight in the niche markets across pricing and level-off service parameters.

Keywords: corporate image, hotel industry, service quality, customer expectations

Procedia PDF Downloads 464