Search results for: counterterrorism strategies
5444 The Importance of Information in Psychological Operations for Counterterrorism
Authors: Abbas Fazelinia
Abstract:
Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method.Keywords: psychological operations, terrorist, counterterrorism, terrorism
Procedia PDF Downloads 3315443 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective
Authors: Eisa Younes Alblooshi
Abstract:
Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.Keywords: terrorism, counterterrorism, model, strategy
Procedia PDF Downloads 1585442 Role of Obama's Administration Counter-Terrorism Strategies towards Pakistan
Authors: Ahmed Bux Jamali
Abstract:
The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run.Keywords: counterterrorism cooperation, national security strategy, Obama administration, Pakistan-US relations
Procedia PDF Downloads 1775441 Mothers, the Missing Link: A Critical Discourse Analysis of the Women-Centric Counterterrorism Measures
Authors: Bukola Solomon
Abstract:
In counterterrorism, policymakers typically design a confined role for women as family members and nurturers. In recent years, they have embraced the idea of mothers as the missing link to preventing and countering violent extremism. This ‘programmed’ role of women is derived from the convictions that women’s central roles in the family and community afford them the ‘unique set of skills’ to detect early signs of radicalization and extremism. This paper attempts to focus on the ‘mother’ narrative that frames women’s agency as mothers of ‘terrorists’ and ‘potential’ terrorists. The general underlying assumption of the ‘mother’ narrative is that naturally, every ‘terrorist’ has or once had a mother, and their radicalization is a maternal ‘oversight.’ By deconstructing the notion of motherhood as a social construct instead of an inherent female desire and ability, this paper argues that the assumption of ‘mothers know best’ is invalid. Also, this paper suggests that the ‘mother’ narrative is a deliberate effort to restrict women’s participation in counterterrorism as ‘preventers.’ Finally, this paper notes a global trend in which mothers are contesting the dominant view of women empowerment that restricts their agency by seeking alternative versions in terrorist organizations. And as such, they create parallel terror cells. Thus, the overemphasis on the role women plays as mothers in counterterrorism limits the scope and potential of counterterrorism programs by marginalizing gender issues and reinforcing gender disparities to the extent that the programs become counterproductive.Keywords: countering violent extremism, counterterrorism, gender, gender roles, terrorism, women
Procedia PDF Downloads 1155440 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.Keywords: caliphate, jihad, ASEAN, counterterrorism, social community
Procedia PDF Downloads 2325439 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.Keywords: Belgium, counterterrorism strategies, human rights, immigration law
Procedia PDF Downloads 1065438 The Evolution of Strike and Intelligence Functions in Special Operations Forces
Authors: John Hardy
Abstract:
The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces
Procedia PDF Downloads 2685437 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law
Procedia PDF Downloads 1255436 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 2465435 Online Metacognitive Reading Strategies Use by Postgraduate Libyan EFL Students
Authors: Najwa Alsayed Omar
Abstract:
With the increasing popularity of the Internet, online reading has become an essential source for EFL readers. Using strategies to comprehend information on online reading texts play a crucial role in students’ academic success. Metacognitive reading strategies are effective factors that enhance EFL learners reading comprehension. This study aimed at exploring the use of online metacognitive reading strategies by postgraduate Libyan EFL students. Quantitative data was collected using the Survey of Online Reading Strategies (OSORS). The findings revealed that the participants were moderate users of metacognitive online reading strategies. Problem solving strategies were the most frequently reported used strategies, while support reading strategies were the least. The five most and least frequently reported strategies were identified. Based on the findings, some future research recommendations were presented.Keywords: metacognitive strategies, online reading, online reading strategies, postgraduate students
Procedia PDF Downloads 3195434 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 2925433 Investigating Mathematics Teachers' Knowledge of the Effective Teaching Strategies
Authors: Zafer F. Alshehri
Abstract:
This paper investigated mathematics teachers' knowledge of the effective teaching strategies at the Southern Region of Saudi Arabia. Specifically, it aimed to identify a list of the effective strategies of teaching mathematics; the extent of mathematics teachers' knowledge of these strategies; and the differences (if any) of mathematics teachers' knowledge of these strategies regarding scientific degree, teaching experience, and educational sage. To achieve that, the researcher used the descriptive approach for preparing a list of effective mathematics teaching strategies and developing a questionnaire of a sample of (240) mathematics teachers. As a result, there were differences in teachers' knowledge of the effective teaching strategies, which ranked as a low, and the highest knowledge was in favor of higher degrees. In addition, there were a few recommendations and suggestions for developing mathematics teachers' knowledge of effective teaching strategies, such as involving in workshops of mathematics teaching strategies, integrating technology into mathematics teaching, and using research findings in the instruction process.Keywords: mathematics teaching knowledge, mathematics teachers, effective mathematics teaching strategies
Procedia PDF Downloads 5105432 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements
Authors: John Hardy
Abstract:
The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism
Procedia PDF Downloads 1735431 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions
Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju
Abstract:
Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism
Procedia PDF Downloads 1645430 Omani PE Candidate Self-Reports of Learning Strategies Used to Learn Sport Skills
Authors: Nasser Al-Rawahi
Abstract:
The study aims at determining self-regulated learning strategies used by Omani physical education candidates to learn sport skills. The data were collected by a self-regulated learning theory questionnaire. The sample of the study comprised of 145 undergraduate physical education students enrolled in the department of physical education at the College of Education, Sultan Qaboos University. The findings of the study revealed that the most commonly used strategies for learning sport skills by Omani physical education candidate are ‘the effort learning strategies, planning learning strategies and evaluation learning strategies’. However, the reflection learning strategies, self-monitoring and self-efficacy learning strategies were revealed as the least used strategies by the PE candidates in learning and acquiring sport skills. Based on these findings, suggestions and recommendations for future research were provided.Keywords: learning strategies, physical education candidates, self-regulated learning theory, Oman
Procedia PDF Downloads 6135429 Research on Models and Selection of Entry Strategies for Catering Industry Based on the Evolutionary Game Theory
Authors: Jianxin Zhu, Na Liu
Abstract:
Entry strategies play a vital role in the development of new enterprises in the catering industry. Different entry strategies will have different effects on the development of new enterprise. Based on the research of scholars at home and abroad, and combining the characteristics of the catering industry, the entry strategies are divided into low-price entry strategies and high-quality entry strategies. Facing the entry of new enterprise, the strategies of incumbent enterprises are divided into response strategies and non-response strategies. This paper uses evolutionary game theory to study the strategic interaction mechanism between incumbent companies and new enterprises. When different initial values and parameter values are set, which strategy will the two-game subjects choose, respectively? Using matlab2016 for numerical simulation, the results show that the choice of strategies for new enterprise and incumbent enterprise is influenced by more than one factor, and the system has different evolution trends under different circumstances. When the parameters were set, the choice of two subjects' strategies mainly depends on the net profit between the strategies.Keywords: catering industry, entry strategy, evolutionary game, strategic interaction mechanism
Procedia PDF Downloads 1305428 A Comparative Analysis of Vocabulary Learning Strategies among EFL Freshmen and Senior Medical Sciences Students across Different Fields of Study
Authors: M. Hadavi, Z. Hashemi
Abstract:
Learning strategies play an important role in the development of language skills. Vocabulary learning strategies as the backbone of these strategies have become a major part of English language teaching. This study is a comparative analysis of Vocabulary Learning Strategies (VLS) use and preference among freshmen and senior EFL medical sciences students with different fields of study. 449 students (236 freshman and 213 seniors) participated in the study. 64.6% were female and 35.4% were male. The instrument utilized in this research was a questionnaire consisting of 41 items related to the students’ approach to vocabulary learning. The items were classified under eight sections as dictionary strategies, guessing strategies, study preferences, memory strategies, autonomy, note- taking strategies, selective attention, and social strategies. The participants were asked to answer each item with a 5-point Likert-style frequency scale as follows:1) I never or almost never do this, 2) I don’t usually do this, 3) I sometimes do this, 4) I usually do this, and 5)I always or almost always do this. The results indicated that freshmen students and particularly surgical technology students used more strategies compared to the seniors. Overall guessing and dictionary strategies were the most frequently used strategies among all the learners (p=0/000). The mean and standard deviation of using VLS in the students who had no previous history of participating in the private English language classes was less than the students who had attended these type of classes (p=0/000). Female students tended to use social and study preference strategies whereas male students used mostly guessing and dictionary strategies. It can be concluded that the senior students under instruction from the university have learned to rely on themselves and choose the autonomous strategies more, while freshmen students use more strategies that are related to the study preferences.Keywords: vocabulary leaning strategies, medical sciences, students, linguistics
Procedia PDF Downloads 4505427 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan
Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain
Abstract:
Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism
Procedia PDF Downloads 1105426 Teaching Method in Situational Crisis Communication Theory: A Literature Review
Authors: Proud Arunrangsiwed
Abstract:
Crisis management strategies could be found in various curriculums, not only in schools of business, but also schools of communication. Young students, such as freshmen and sophomores of undergraduate schools, may not care about learning crisis management strategies. Moreover, crisis management strategies are not a topic art students are familiar with. The current paper discusses a way to adapt entertainment media into a crisis management lesson, and the importance of learning crisis management strategies in the school of animation. Students could learn crisis management strategies by watching movies with content about a crisis and responding to crisis responding. The students should then participate in follow up discussions related to the strategies that were used to address the crisis, as well as their success in solving the crisis.Keywords: situational crisis communication theory, crisis response strategies, media effect, unintentional effect
Procedia PDF Downloads 3225425 Japanese Language Learning Strategies : Case study student in Japanese subject part, Faculty of Humanities and Social Sciences, Suan Sunandha Rajabhat University
Authors: Pailin Klinkesorn
Abstract:
The research aimed to study the use of learning strategies for Japanese language among college students with different learning achievements who study Japanese as a foreign language in the Higher Education’s level. The survey was conducted by using a questionnaire adapted from Strategy Inventory for language Learning or SILL (Oxford, 1990), consisting of two parts: questions about personal data and questions about the use of learning strategies for Japanese language. The samples of college students in the Japanese language program were purposively selected from Suansunandha Rajabhat University. The data from the questionnaire was statistically analyzed by using mean scores and one-way ANOVA. The results showed that Social Strategies was used by the greatest number of college students, whereas Memory Strategies was used by the least number of students. The students in different levels used various strategies, including Memory Strategies, Cognitive Strategies, Metacognitive Strategies and Social Strategies, at the significance level of 0.05. In addition, the students with different learning achievements also used different strategies at the significance level of 0.05. Further studies can explore learning strategies of other groups of Japanese learners, such as university students or company employees. Moreover, learning strategies for language skills, including listening, speaking, reading and writing, can be analyzed for better understanding of learners’ characteristics and for teaching applications.Keywords: language learning strategies, achievement, Japanese, college students
Procedia PDF Downloads 3915424 Using Metacognitive Strategies in Reading Comprehension by EFL Students
Authors: Simin Sadeghi-Saeb
Abstract:
Metacognitive strategies consistently play important roles in reading comprehension. The metacognitive strategies involve the active monitoring and consequent regulation and orchestration of the cognitive processes in relation to the cognitive objects or data on which they bear. In this paper, the effect of instruction in using metacognitive strategies on reading academic materials, type of metacognitive strategies were mostly used by college university students before and after the instruction and the level they use those strategies before and after the instruction were studied. For these aims, 50 female college students were chosen. Then, they were divided randomly into two groups, experimental and control groups. At first session, students in both groups took the standard TOFEL exam. After the pre-test had been administered, the instruction began. After treatment, a post-test was taken. It is useful to state that after pre-test and post-test the same questionnaire was handed to the students of experimental group. The results of this research show that the instruction of metacognitive strategies has positive effect on the students' scores in reading comprehension tests. Furthermore, it showed that before and after the instruction, the students' usage of metacognitive strategies changed. Also, it demonstrated that the instruction affected the students' level of metacognitive strategies' usage.Keywords: EFL students, English reading comprehension, instruction, metacognitive strategies
Procedia PDF Downloads 2985423 Effects of Teaching Strategies on Students Academic Achievement in Secondary Physics Education for Quality Assurance
Authors: Collins Molua
Abstract:
This paper investigated the effect of Teaching Strategies on Academic Achievement in Secondary Physics Education as a quality assurance process for the teaching and learning of the subject. Teaching strategies investigated were the interactive, independent and dependent strategies. Three null hypotheses were tested at p< 0.05 using one instrument, physics achievement test(PAT).The data were analyzed using analysis of covariance (ANCOVA).Results showed that teaching strategies have significant effect on students achievement; the joint effect of the teaching strategies was also significant on students achievement in Physics. The interactive teaching strategies was recommended for teaching the subject and the students should be exposed to practical, computer literacy to stimulate interest and curiosity to enhance quality.Keywords: quality, assurance, secondary education, strategies, physics
Procedia PDF Downloads 3275422 Integrating Human Rights into Countering Violent Extremism: A Comparative Analysis of Women Without Borders and Hedayah Initiatives
Authors: Portia Muehlbauer
Abstract:
This paper examines the evolving landscape of preventing and countering violent extremism (PCVE) by delving into the growing importance of integrating human rights principles into violence prevention strategies on the local, community level. This study sheds light on the underlying theoretical frameworks of violent extremism and the influence of gender while investigating the intersection between human rights preservation and violent extremism prevention. To gain practical insight, the research focuses on two prominent international non-governmental organizations, Women without Borders (WwB) and Hedayah, and their distinct PCVE initiatives. WwB adopts a gender-sensitive approach, implementing parental education programs that empower mothers in at-risk communities to prevent the spread of violent extremism. In contrast, Hedayah takes an indirect route, employing capacity building programs that enhance the capabilities of educators, social workers, and psychologists in early intervention, rehabilitation and reintegration efforts. Qualitative data for this comparative analysis was collected through an extensive four-month internship at WwB during the fall of 2020, a three-month internship at Hedayah in the spring of 2021, a thought-provoking semi-structured interview with the executive director of WwB, personal field notes, and a comprehensive discourse analysis of the prevailing literature on human rights considerations in PCVE practices. This study examines the merits and challenges of integrating human rights into PCVE programming through the lens of both organizations, WwB and Hedayah. The findings of this study will inform policymakers, practitioners, and researchers on the intricate relationship between human rights protection and effective PCVE strategies.Keywords: preventing and countering violent extremism, human rights, counterterrorism, peacebuilding, capacity building programs, gender studies
Procedia PDF Downloads 605421 A Study of Transferable Strategies in Multilanguage Learning
Authors: Zixi You
Abstract:
With the demand of multilingual speakers increasing in the job market, multi-language learning programs have become more and more popular among undergraduate students. A study on multi-language learning strategies is therefore highly demanded on both practical and theoretical levels. Based on previous classification of learning strategies in SLA, and an investigation of BA Modern Language program students (with post-A level L2 and ab initio L3 learning experience from year one), this study explores and compares different types of learning strategies used by multi-language speakers and learners, transferable learning strategies between L2 and L3, and factors affecting the transfer. The results indicate that all the 23 types of learning strategies of L2 are employed when learning L3 from ab initio level, yet with different tendencies. Learning strategy transfer from L2 to L3 (i.e., the learners attribute the applying of these L3 learning strategies to be a direct result of their L2 learning experience) are observed in all 23 types of learning strategies. Comparatively, six types of “cognitive strategies” have higher transfer tendency than others. With regard to the failure of the transfer of some particular L2 strategies and the development of independent L3 strategies of individual learners, factors such as language proficiency, language typology and learning environment have played important roles among others. The presentation of this study will provide audiences with detailed data, insightful analysis and discussion on both theoretical and practical aspects of multi-language learning that will benefit both students and educators.Keywords: learning strategy, multi-language acquisition, second language acquisition, strategy transfer
Procedia PDF Downloads 5745420 Create a Model of Production and Marketing Strategies in Alignment with Business Strategy Using QFD Approach
Authors: Hamed Saremi, Shahla Saremi
Abstract:
In today's competitive world, organizations are expected to surpass the competitors and benefit from the resources and benefits. Therefore, organizations need to improve the current performance is felt more than ever that this requires to identify organizational optimal strategies, and consider all strategies simultaneously. In this study, to enhance competitive advantage and according to customer requirements, alignment between business, production and marketing strategies, House of Quality (QFD) approach has been used and zero-one linear programming model has been studied. First, the alignment between production and marketing strategies with business strategy, independent weights of these strategies is calculated. Then with using QFD approach the aligned weights of optimal strategies in each production and marketing field will be obtained and finally the aligned marketing strategies selection with the purpose of allocating budget and specialist human resource to marketing functions will be done that lead to increasing competitive advantage and benefit.Keywords: marketing strategy, business strategy, strategy alignment, house of quality deployment, production strategy
Procedia PDF Downloads 6035419 Model of Production and Marketing Strategies in Alignment with Business Strategy using QFD Approach
Authors: Hamed Saremi, Suzan Taghavy, Shahla Saremi
Abstract:
In today's competitive world, organizations are expected to surpass the competitors and benefit from the resources and benefits. Therefore, organizations need to improve the current performance is felt more than ever that this requires to identify organizational optimal strategies, and consider all strategies simultaneously. In this study, to enhance competitive advantage and according to customer requirements, alignment between business, production and marketing strategies, House of Quality (QFD) approach has been used and zero-one linear programming model has been studied. First, the alignment between production and marketing strategies with business strategy, independent weights of these strategies is calculated. Then with using QFD approach the aligned weights of optimal strategies in each production and marketing field will be obtained and finally the aligned marketing strategies selection with the purpose of allocating budget and specialist human resource to marketing functions will be done that lead to increasing competitive advantage and benefit.Keywords: strategy alignment, house of quality deployment, production strategy, marketing strategy, business strategy
Procedia PDF Downloads 4345418 Experience Level and Adoption of Interpretation Strategies by Iranian Interpreters
Authors: Niloofar Fathizaviyehkord
Abstract:
Just as two hands cannot make a good boxer, knowing two or more languages cannot make a skillful interpreter. Interpreting, either consecutive or simultaneous, is a cognitively demanding task requiring not only linguistic and discourse knowledge but also strategic competence. Moreover, experience level can play a very crucial role in the strategies interpreters may employ since translation and interpretation quality is a matter of experience, besides other factors, as well. With regard to the significance of strategic competence, this study investigated what strategies are mainly employed by interpreters, what strategies are employed more frequently, and whether experience level can affect the choice of strategies by interpreters or not. To collect the necessary data, the first retrospective interviews were held with 20 interpreters experienced more or less in simultaneous and consecutive interpretation to see what strategies other than those classified in the literature are employed by interpreters. Then, several classifications of strategies in literature were merged with those emerging from the retrospective interviews to come up with a comprehensive questionnaire on interpreting strategies. After seeking five experts’ opinions regarding the wording/content of the questionnaire, it was given to 60 interpreters. The statistical analysis of the questionnaire data and experience level through ANOVA showed experience level could affect the choice of strategies. This study closes with the theoretical/practical implications of the findings for interpreter training.Keywords: experience level, consecutive and simultaneous, interpretation strategies, translation
Procedia PDF Downloads 1375417 Language Learning Strategies to Improve English Speaking Skills among High School Students: A Case Study at Vo Minh Duc High School in Binh Duong Province, Viet Nam
Authors: Du T. Tran, Quyen T. L. Hoang
Abstract:
The role of language learning strategies in second language acquisition has received increased attention across several disciplines in recent years. Language learning strategies have been shown to occur in many studies over the passing years with the aim of improving the efficiency of language learning. Following previous studies, this study endeavors to scrutinize language learning strategies employed by the students at Vo Minh Duc high school and the effect of motivation on students’ learning strategy choices. The responses are examined quantitatively and qualitatively to enhance their validity and reliability. Data are collected from 342 students’ responses to the questionnaire, interviews with ten teachers and fifteen students, and classroom observations. The findings reveal that students’ motivation has an enormous impact on the choice of language learning strategies. The results simultaneously show that students use many language learning strategies to enhance their communicative competence, but the most frequently used ones are cognitive and affective ones. Significant correlations among types of learning strategies and the influence of motivation on the choices of language learning strategies were consistent with previous studies. The study’s results are expected to be beneficial to teachers of English and students in terms of narrowing the gap between the students' language learning strategies and their teaching methodologies preferences and sketching out the best strategies to enhance students’ speaking skills. The implications of these findings and the importance of viewing learners holistically are discussed, and recommendations are made for ongoing research.Keywords: learning strategies, speaking skills, memorization strategies, cognitive strategies, affective strategies
Procedia PDF Downloads 1035416 Compare Online Metacognitive Reading Strategies Used by Iranian Postgraduate Students with Internal and External Locus of Control
Authors: Mitra Mesgar
Abstract:
Online learning environment is becoming more popular among learners because of their multiple information representations. Despite the growing importance of online reading strategies among adult learners, little attention has been carried out to postgraduate EFL learners. This study is quantitative research designed and aimed to investigate metacognitive reading strategies employed by Iranian postgraduate learners to read online academic texts. This study is conducted by over 50 Iranian postgraduate students studying in different Malaysian universities. This study used two different survey questionnaires, namely, 1) background questionnaire and 2) OSORS questionnaire. The collected data were analyzed using SPSS. The findings of the study emphasized metacognitive reading strategies used by different aged adult learners. The results of the survey questionnaires revealed that adult learners use global reading strategies as well as problem-solving strategies and support reading strategies. Also, through one-way analysis of variance toward age factor revealed that it has no meaningful changes on metacognitive reading strategy usage. This means that metacognitive reading strategies used by adult learners are independent of age variable. Drawing from findings, adult learners have learning goals, and since they have more exposure to online academic texts, they are able to use different metacognitive online reading strategies that affect their understanding of academic texts.Keywords: online reading strategies, metacognitive strategies, online learning, independent students, locus of control
Procedia PDF Downloads 885415 Adoption of Proactive and Reactive Supply Chain Resilience Strategies: A Comparison between Apparel and Construction Industries in Sri Lanka
Authors: Anuradha Ranawakage, Chathurani Silva
Abstract:
With the growing expansion of global businesses, supply chains are increasingly exposed to numerous disruptions. Organizations adopt various strategies to mitigate the impact of these disruptions. Depending on the variations in the conditions and characteristics of supply chains, the adoption of resilience strategies may vary across industries. However, these differences are largely unexplored in the existing literature. Hence, this study aims to evaluate the adoption of three proactive strategies: proactive collaboration, digital connectivity, integrated SC risk management, and three reactive strategies: reactive collaboration, inventory and reserve capacity, and lifeline maintenance in the apparel and construction industries in Sri Lanka. An online questionnaire was used to collect data on the implementation of resilience strategies from a sample of 162 apparel and 185 construction companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the extent to which different resilience strategies are functioned within the apparel and construction industries in Sri Lanka, particularly in an era after a global pandemic that significantly disrupted supply chains all around the world.Keywords: apparel, construction, proactive strategies, reactive strategies, supply chain resilience
Procedia PDF Downloads 54