Search results for: root causes of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1418

Search results for: root causes of terrorism

1358 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 314
1357 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 430
1356 Anti-inflammatory Effect of Wild Indigo (Baptisia tinctoria) Root on Raw 264.7 Cells with Stimulated Lipopolysaccharide

Authors: Akhmadjon Sultanov, Eun-Ho Lee, Hye-Jin Park, Young-Je Cho

Abstract:

This study tested the anti-inflammatory effect of wild indigo (Baptisia tinctoria) root in Raw 264.7 cells. We prepared two extracts of B. tinctoria; one in water and the other in 50% ethanol. Then we evaluated the toxicities of the B. tinctoria root extracts at 10 to 100 mg mL-1 concentrations in raw 264.7 cells and observed 80% cell viability. The anti-inflammatory effect of B. tinctoria root extract in lipopolysaccharide (LPS)-stimulated Raw 264.7 cells were observed with concentrations at 10, 30, and 50 μg mL-1. The results showed that 77.27-66.82% of nitric oxide (NO) production was inhibited by 50 μg mL-1 B. tinctoria root extract. The protein expression of Inducible NO synthase (iNOS) expression dramatically decreased by 93.14% and 52.65% in raw 264.7 cells treated with water and ethanol extracts of B. tinctoria root, respectively. Moreover, cyclooxygenase-2 (COX-2) protein expression decreased by 42.85% and 69.70% in raw 264.7 cells treated with water and ethanol extracts of B. tinctoria root, respectively. Furthermore, the mRNA expression of pro-inflammatory markers, such as tumor necrosis factor-alpha, interleukin-1β, interleukin-6, monocyte chemoattractant protein-1, and prostaglandin E synthase 2, was significantly suppressed in a concentration-dependent manner. Additionally, the B. tinctoria root extracts effectively inhibited enzymes involved in physiological activities. The B. tinctoria root extracts showed excellent anti-inflammatory effects and can be used as a functional material for biological activities.

Keywords: cytokine, macrophage, pro-inflammatory, protein expression, real-time PCR

Procedia PDF Downloads 45
1355 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram

Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola

Abstract:

The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.

Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents

Procedia PDF Downloads 101
1354 Root System Architecture Analysis of Sorghum Genotypes and Its Effect on Drought Adaptation

Authors: Hailemariam Solomon, Taye Tadesse, Daniel Nadew, Firezer Girma

Abstract:

Sorghum is an important crop in semi-arid regions and has shown resilience to drought stress. However, recurrent drought is affecting its productivity. Therefore, it is necessary to explore genes that contribute to drought stress adaptation to increase sorghum productivity. The aim of this study is to evaluate and determine the effect of root system traits, specifically root angle, on drought stress adaptation and grain yield performance in sorghum genotypes. A total of 428 sorghum genotypes from the Ethiopian breeding program were evaluated in three drought-stress environments. Field trials were conducted using a row-column design with three replications. Root system traits were phenotyped using a high-throughput phenotyping platform and analyzed using a row-column design with two replications. Data analysis was performed using R software and regression analysis. The study found significant variations in root system architecture among the sorghum genotypes. Non-stay-green genotypes had a grain yield ranging from 1.63 to 3.1 tons/ha, while stay-green genotypes had a grain yield ranging from 2.4 to 2.9 tons/ha. The analysis of root angle showed that non-stay-green genotypes had an angle ranging from 8.0 to 30.5 degrees, while stay-green genotypes had an angle ranging from 12.0 to 29.0 degrees. Improved varieties exhibited angles between 14.04 and 19.50 degrees. Positive and significant correlations were observed between leaf areas and shoot dry weight, as well as between leaf width and shoot dry weight. Negative correlations were observed between root angle and leaf area, as well as between root angle and root length. This research highlights the importance of root system architecture, particularly root angle traits, in enhancing grain yield production in drought-stressed conditions. It also establishes an association between root angle and grain yield traits for maximizing sorghum productivity.

Keywords: roor sysytem architecture, root angle, narrow root angle, wider root angle, drought

Procedia PDF Downloads 43
1353 Effect of Different Salt Concentrations and Temperatures on Seed Germination and Seedling Characters in Safflower (Carthamus tinctorius L.) Genotypes

Authors: Rahim Ada, Zamari Temory, Hasan Dalgic

Abstract:

Germination and seedling responses of seven safflower seed genotypes (Dinçer, Remzibey, Black Sun2 cultivars and A19, F4, I1, J19 lines) to different salinity concentrations (0, 5, 10, and 20 g l-1) and temperatures (10 and 20 oC) evaluated in Completely Randomized Factorial Designs in Department of Field Crops of Selcuk University, Konya, Turkey. Seeds in the control (distilled water) had at 10 and 20 oC the highest germination percentage (93.88 and 94.32 %), shoot length (4.60 and 8.72 cm), root length (4.27 and 6.54 cm), shoot dry weight (22.37 mg and 25.99 mg), and root dry weight (2.22 and 2.47 mg). As the salt concentration increased, values of all characters were decreased. In this experiment, in 20 g l-1 salt concentration found germination percentage (21.28 and 26.66 %), shoot (1.32 and 1.35 cm) and root length (1.04 and 1.10 cm), shoot (8.05 mg and 7.49 mg) and root dry weight (0.83 and 0.98 mg) at 10, and 20 oC.

Keywords: safflower, NaCl, temperature, shoot and root length, salt concentration

Procedia PDF Downloads 260
1352 Investigate the Mechanical Effect of Different Root Analogue Models to Soil Strength

Authors: Asmaa Al Shafiee, Erdin Ibraim

Abstract:

Stabilizing slopes by using vegetation is considered as a cost-effective and eco-friendly alternative to the conventional methods. The main aim of this study is to investigate the mechanical effect of analogue root systems on the shear strength of different soil types. Three objectives were defined to achieve the main aim of this paper. Firstly, explore the effect of root architectural design to shear strength parameters. Secondly, study the effect of root area ratio (RAR) on the shear strength of two different soil types. Finally, to investigate how different kinds of soil can affect the behavior of the roots during shear failure. 3D printing tool was used to develop different analogue tap root models with different architectural designs. Direct shear tests were performed on Leighton Buzzard (LB) fraction B sand, which represents a coarse sand and Huston sand, which represent medium-coarse sand. All tests were done with the same relative density for both kinds of sand. The results of the direct shear test indicated that using plant roots will increase both friction angle and cohesion of soil. Additionally, different root designs affected differently the shear strength of the soil. Furthermore, the directly proportional relationship was found between root area ratio for the same root design and shear strength parameters of soil. Finally, the root area ratio effect should be combined with branches penetrating the shear plane to get the highest results.

Keywords: leighton buzzard sand, root area ratio, rooted soil, shear strength, slope stabilization

Procedia PDF Downloads 119
1351 Genetic Divergence Study of Rice on the Basis of Various Morphological Traits

Authors: Muhammad Ashfaq, Muhammad Saleem Haider, Muhammad Ali, Muhammad Sajjad, Amna Ali, Urooj Mubashar

Abstract:

Phenotypic diversity was confirmed by measuring different morphological traits i.e. seed traits (seed length, seed width, seed thickness, seed length-width ratio, 1000 grain weight) and root-shoot traits (shoot length, root length, shoot fresh weight, root fresh weight, root-shoot ratio, root numbers and root thickness). Variance and association study of desirable traits determine the genotypic differences among the rice germplasm. All the traits showed significant differences among the genotypes. The traits were studied in Randomized complete block design (RCBD) at different water levels. Some traits showed positive correlation with each other and beneficial for increasing the yield and production of the crop. Seed thickness has positive correlation with seed length and seed width (r= 0.104**, r=0.246**). On the other hand, various root shoot traits showed positive highly significant association at different water levels i.e. root length, fresh root weight, root thickness, shoot thickness and root numbers. Our main focus to study the performance/correlation of root shoots traits under stress condition. Fresh root weight, shoot thickness and root numbers showed positive significant association with shoot length, root length, fresh root and shoot weight (r=0.2530**, r=0.2891**, r=0.4626**, r=0.4515**, r=0.5781**, r=0.7164**, r=0.0603**, r= 0.5570**, r=0.5824**). Long root length genotypes favors and suitable for drought stress conditions and screening of diverse genotypes for the further development of new plant material that performing well under different environmental conditions. After screening genetic diversity of potential rice, lines were studied to check the polymorphism by using some SSR markers. DNA was extracted, and PCR analyses were done to study PIC values and allelic diversity of the genotypes. The main objective of this study is to screen out the genotypes on the basis of various genotypic and phenotypic traits.

Keywords: rice, morphological traits, association, germplasm, genetic diversity, water levels, variation

Procedia PDF Downloads 294
1350 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India

Authors: Sumanta Meher, Gaurav Shukla

Abstract:

The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.

Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India

Procedia PDF Downloads 140
1349 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 148
1348 Tourism a Ray of Hope to Peace: Case Study of Kashmir

Authors: Khurshid Ahmad Sheikh

Abstract:

This study describes tourism can be a ray of hope to overcome terrorism, especially in places having great tourism potential but could not successfully market their breathtaking beauty and enormous tourism potential because of terrorism threats. It is not so that the area is dangerous, but it does not look attractive. In Asia, regardless of a famous and most important tourist destination, the growth of tourism in Kashmir is stalled by terrorism in the valley. Kashmir has many seasonal tourist destinations like Walur Lake, Pahalgam, Sonamarg, Gulmarg, Dal Lake and other undiscovered virgin tourist destinations, which makes it the preferred tourist destination throughout the year. This research is based on the ideas of the local people who are suffering because of this social evil and have seen changes happen from prosperity to perish. Tourism can be the right adopted measure that brings back life to its virgin origin and makes it a heaven for the rest of the world. Tourism has the power to heal up all the wounds which have been created in this long gap of war and terrorism. In this paper, we will describe the influence of tourism is be the best solution for the harmony and fortune of Kashmir.

Keywords: Kashmir, tourism, solution to peace, culture

Procedia PDF Downloads 90
1347 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 82
1346 Towards a Deeper Understanding of 21st Century Global Terrorism

Authors: Francis Jegede

Abstract:

This paper examines essential issues relating to the rise and nature of violent extremism involving non-state actors and groups in the early 21st century. The global trends in terrorism and violent extremism are examined in relation to Western governments’ counter terror operations. The paper analyses the existing legal framework for fighting violent extremism and terrorism and highlights the inherent limitations of the current International Law of War in dealing with the growing challenges posed by terrorists and violent extremist groups. The paper discusses how terrorist groups use civilians, women and children as tools and weapon of war to fuel their campaign of terror and suggests ways in which the international community could deal with the challenge of fighting terrorist groups without putting civilians, women and children in harm way. The paper emphasises the need to uphold human rights values and respect for the law of war in our response to global terrorism. The paper poses the question as to whether the current legal framework for dealing with terrorist groups is sufficient without contravening the essential provisions and ethos of the International Law of War and Human Rights. While the paper explains how terrorist groups flagrantly disregard the rule of law and disrespect human rights in their campaign of terror, it also notes instances in which the current Western strategy in fighting terrorism may be viewed or considered as conflicting with human rights and international law.

Keywords: terrorism, law of war, international law, violent extremism

Procedia PDF Downloads 296
1345 Iron Influx, Its Root-Shoot Relations and Utilization Efficiency in Wheat

Authors: Abdul Malik Dawlatzai, Shafiqullah Rahmani

Abstract:

Plant cultivars of the same species differ in their Fe efficiency. This paper studied the Fe influx and root-shoot relations of Fe at different growth stages in wheat. The four wheat cultivars (HD 2967, PDW 233, PBW 550 and PDW 291) were grown in pots in Badam Bagh agricultural researching farm, Kabul under two Fe treatments: (i) 0 mg Fe kg⁻¹ soil (soil with 2.7 mg kg⁻¹ of DTPA-extractable Fe) and (ii) 50 mg Fe kg⁻¹ soil. Root length (RL), shoot dry matter (SDM), Fe uptake, and soil parameters were measured at tillering and anthesis. Application of Fe significantly increased RL, root surface area, SDM, and Fe uptake in all wheat cultivars. Under Fe deficiency, wheat cv. HD 2967 produced 90% of its maximum RL and 75% of its maximum SDM. However, PDW 233 produced only 69% and 60%, respectively. Wheat cultivars HD 2967, and PDW 233 exhibited the highest and lowest value of root surface area and Fe uptake, respectively. The concentration difference in soil solution Fe between bulk soil and root surface (ΔCL) was maximum in wheat cultivar HD 2967, followed by PBW 550, PDW 291, and PDW 233. More depletion at the root surface causes steeper concentration gradients, which result in a high influx and transport of Fe towards root. Fe influx in all the wheat cultivars increased with the Fe application, but the increase was maximum, i.e., 4 times in HD 2967 and minimum, i.e., 2.8 times in PDW 233. It can be concluded that wheat cultivars HD 2967 and PBW 550 efficiently utilized Fe as compared to other cultivars. Additionally, iron efficiency of wheat cultivars depends upon uptake of each root segment, i.e., the influx, which in turn depends on depletion of Fe in the rhizosphere during vegetative phase and higher utilization efficiency of acquired Fe during reproductive phase that governs the ultimate grain yield.

Keywords: Fe efficiency, Fe influx, Fe uptake, Rhizosphere

Procedia PDF Downloads 97
1344 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 129
1343 RACK1 Integrates Light and Brassinosteroid Signaling to Coordinate Cell Division During Root Soil Penetration

Authors: Liang Jiansheng, Zhu Wei

Abstract:

Light and brassinosteroids are essential external and internal cues for plant survival. Although the coordination of light with phytohormone signals is crucial for plant growth and development, the molecular connection between light and brassinosteroid signaling during root soil penetration remains elusive. Here, we reveal that light-stabilized RACK1 couples a brassinosteroid signaling cascade to drive cell division in root meristems. RACK1 family scaffold proteins positively regulate light-induced the promotion of root elongation during soil penetration. Under the light condition, RACK1A interacts with both phyB and SPA1, then reinforces the phyB-SPA1 association to accumulate its abundance in roots. In response to brassinosteroid signals, RACK1A competes with BKI1 to attenuate the BRI1-BKI1 interaction, thereby leading to activating BRI1 actions in root development. Furthermore, RACK1A binds to BES1 to repress its DNA binding activity toward the target gene CYCD3;1. This ultimately allows to release the inhibition of CYCD3;1 transcription, and promotes cell division during root growth. Our study illustrates a new mechanistic model of how plants engage scaffold proteins in transducing light information to facilitate brassinosteroid signaling for root growth in the soil.

Keywords: root growth, cell division, light signaling, brassinosteroid signaling, soil penetration, scaffold protein, RACK1

Procedia PDF Downloads 40
1342 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 356
1341 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State

Authors: Godiya Pius Atsiya

Abstract:

One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.

Keywords: changing democratic state, policy measures, terrorism, women

Procedia PDF Downloads 202
1340 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 554
1339 Sufism as Therapy of Terrorism and Extremism with Special Reference to the Teaching of Khawaja Ghulam Fareed and Bulleh Shah

Authors: Arshad Munir, Naseem Akhtar

Abstract:

The determination of the Sufi is to effort towards unity. His main purpose is to bring humanity, separated as it is into so many different units, closer together in the deeper understanding of life. His mission is to bring about brotherhood among races, nations and faiths and to respect one another's faith, scripture and teacher. Sufi is to confer sympathy on these lives, to impart love, compassion and kindheartedness on all creations. The Sufi message is the resonance of the same Divine message which has always come and will always come to inform humanity. It is the continuation of all the pronounced religions which have come at several times and it is amalgamation of them all, which was the wish of all the prophets. Pakistan, who came into being in the name of Islam unfortunately, have linked with terrorism. It is a disgrace that in contemporary day Pakistan, mullahism and the recent cancer of Talibanisation are gradually eating into what had kept us integral as a society. Terrorism has grown-up to develop a prime safety pressure to the area. The terrorism has deadly caused decrease in overseas and local investment, exports, physical infrastructure, and wealth stock ultimately leading to damage of the socio-economic status of Pakistan. Main reasons are ignorance about the actual teaching of Islam both by Muslim and non-Muslim, exploitation by the religious and political influential, sectarianism and extremism, lack of tolerance and broadmindedness and reaction and retortion by the sufferer. The key treatment and therapy of the abovementioned illnesses exist in the messages of Sufism.

Keywords: sufism, love, Pakistan, terrorism

Procedia PDF Downloads 272
1338 The Fifth Political Theory and Countering Terrorism in the Post 9/11 Era

Authors: Rana Eijaz Ahmad

Abstract:

This paper is going to explain about the Fifth Political Theory that challenges all existing three plus one (Capitalism, Marxism and Fascism + Fourth Political Theory) theories. It says, ‘it is human ambiance evolve any political system to survive instead of borrowing other imported thoughts to live in a specific environment, in which Legitimacy leads to authority and promotes humanism.’ According to this theory, no other state is allowed to dictate or install any political system upon other states. It is the born right of individuals to choose a political system or a set of values that are going to make their structures and functions efficient enough to support the system harmony and counter the negative forces successfully. In the post 9/11 era, it is observed that all existing theories like Capitalism, Marxism, Fascism and Fourth Political Theory remained unsuccessful in resolving the global crisis. The so-called war against terrorism is proved as a war for terrorism and creates a vacuum on the global stage, worsening the crisis. The fifth political theory is an answer to counter terrorism in the twenty-first century. It calls for accountability of the United Nations for its failure in sustaining peace at global level. Therefore, the UN charter is supposed to be implemented in its true letter and spirit. All independent sovereign states have right to evolve their own system to carry out a political system that suits them best for sustaining harmony at home. This is the only way to counter terrorism. This paper is comprised of mixed method. Qualitative, quantitative and comparative methods will be used along with secondary sources. The objective of this paper is to create knowledge for the benefit of human beings with a logical and rational argument. It will help political scientists and scholars in conflict management and countering terrorism on pragmatic grounds.

Keywords: capitalism, fourth political theory, fifth political theory, Marxism, fascism

Procedia PDF Downloads 346
1337 Effect of Eddy Irrigant Activation on Cleanliness of the Root Canal Wall during Pulpectomy of Primary Teeth

Authors: Rasha Sharaf, Nehal Sharaf

Abstract:

Pulpectomy of primary teeth aims to remove the necrotic pulp tissue from the infected root canal and clean the root canal walls from any remnant of pulp tissue. Different irrigant activation systems have been recently used, and one of these devices is the Eddy which helps in removal of smear layer and improves the intimate contact between the filling material and the root canal wall. Aim: To evaluate the efficacy of Eddy in cleanliness of the root canal during pulpectomy of primary teeth. Materials and methods: 45 freshly extracted primary anterior teeth were divided into 3 equal groups, in the 1st group sodium hypochlorite only was used during pulpectomy, in the 2nd group irrigation using sodium hypochlorite with file agitation was performed and in the 3rd group sodium hypochlorite was used with Eddy for irrigant activation. All samples were sectioned longitudinally and scanned using scanning electron microscope to evaluate the cleanliness of the root canals. Results: It was found that Eddy showed high efficacy in removal of smear layer during pulpectomy of primary teeth.

Keywords: Eddy, irrigant activation, irrigation, pulpectomy

Procedia PDF Downloads 113
1336 The Potential Role of University Libraries in the Fight against Terrorism in Upper Egypt

Authors: Essam Mansour

Abstract:

The purpose of this study is to explore the potential role of South Valley University (SVU) libraries’ manpower, collections and services in the fight against terrorism in the Upper Egypt. A quantitative research methodology was used in the form of a survey sent to 127 library staff at the SVU. The survey was undertaken from June to July 2015 with a response rate 73.2%. Printed materials were the most adequate collections in the SVU libraries. Other materials, such as CDs/DVDs, audiovisual materials, microfilm and microfiche, online resources and electronic materials respectively were inadequate at SVU libraries. Few of the services provided by SVU libraries were characterized as adequate services, some are inadequate and other services do not exist. The average of the facilities provided by SVU libraries was somewhat adequate. Activities, such as holding social field trips, holding training workshops and holding academic field trip were, at least, somewhat adequate to SVU libraries. SVU libraries had no a significant role in fighting terrorism in the Upper Egypt. There is no a relationship between the SVU library staff’s professional characteristics and the potential role that their libraries may play in the fight against this phenomenon. As a result of the lack of SVU libraries’ collections, services, facilities and activities, this study concluded that that such role could not be achieved. Almost all the library staff admitted that this severe lack has affected the provision of library patrons and members of the library community to these collections and services, which help in countering the threat of terrorism. Despite the significance of all these problems faced by SVU libraries in the fight against terrorism, it was found that the inadequacy of the library opening hours is significantly correlated with the professional characteristics of the library staff, particularly their job title and work experience.

Keywords: terrorism, national security, university libraries, south valley university, Egypt, survey

Procedia PDF Downloads 231
1335 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 355
1334 Nuclear Terrorism and Proliferation: A Conceptual Clarification

Authors: Uche A. Nnawulezi

Abstract:

This paper analyzes the advancing nature of nuclear terrorism and proliferation in the global environment and its attendant impacts. It analyzes discourse and practice with respect to the general prohibition on the utilization of fissionable radioactive materials. Thus, there has been a few ideological, reasonable and academic recommendations of policies aimed at eliminating nuclear weapons which its ultimate nightmare has remained an assault including nuclear explosion in densely populated urban areas. Likewise, this paper concentrates on safety measures aimed at preventing nuclear assaults which should not just concentrate on endeavors to prevent terrorists from exploding nuclear gadgets but should be more concerned on endeavors aimed at preventing the acquisition of nuclear weapons in the first place. The author of this paper has pointed out that the non-proliferation treaty should be vigorously supported as well as the Comprehensive Test Ban Treaty brought into force. This paper depended unequivocally on secondary sources, for example, textbooks, journals, articles, and periodicals. It concludes that the fundamental proposals made in this paper if completely used shall remain a cornerstone of efforts made in preventing the spread of nuclear weapons. At last, the only way is to eliminate stockpiles of nuclear weapons in the world or else the likelihood of nuclear terrorism remains a nightmare.

Keywords: nuclear, terrorism, proliferation, global environment

Procedia PDF Downloads 225
1333 Anatomical and Histological Characters of Cymbopogon nardus Roots and Its Mutagenic Properties

Authors: Pravaree Phuneerub, Chanida Palanuvej, Nijsiri Ruangrungsi

Abstract:

Cymbopogon nardus Rendel (Family Gramineae) is commonly known as citronella grass. The dried root of C. nardus is used for antipyretic, anti-inflammation, anti-analgesic and anticancer in traditional Thai medicine. Transverse sectional and pulverized C. nardus root were illustrated. The volatile oil was extracted from oil gland by hydrodistillation and analysed by GC/MS. Cymbopogon nardus root was exhaustively extracted by continuously maceration in ethanol and water respectively. The mutagenic and antimutagenic properties of the ethanol extract and fractionated water extract of C. nardus root were evaluated by Ames assay using the S. typhimurium strains TA98 and TA100 as the models. The result indicated that the anatomical character of root transverse section displayed epidermis, parenchyma, oil gland, phloem, xylem vessel, endodermis and pith. Histological characters of root powder showed parenchyma containing oleoresin, parenchyma in longitudinal view, reticulate vessel, annular vessel, starch granules and fragment of fiber. The root volatile oil was rich in sesquiterpenes dominated by elemol (22.87%) and alpha-eudesmol (16.09%). For mutagenic activity, the both extracts of C. nardus were no mutagenic toward S. typhimurium strains TA98 and TA100. Furthermore, the ethanol extract and fractionated water extract of C. nardus root demonstrated strong antimutagenic effect against of nitrite treated 1-aminopyrene to S. typhimurium strains TA98 and TA100. This present investigation suggested that the dried root extract of C. nardus can be further developed as promising antimutagenic agent.

Keywords: Cymbopogon nardus, volatile oil analysis, mutagenic, antimutagenic effect, Ames Salmonella assay

Procedia PDF Downloads 318
1332 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 267
1331 A Computational Cost-Effective Clustering Algorithm in Multidimensional Space Using the Manhattan Metric: Application to the Global Terrorism Database

Authors: Semeh Ben Salem, Sami Naouali, Moetez Sallami

Abstract:

The increasing amount of collected data has limited the performance of the current analyzing algorithms. Thus, developing new cost-effective algorithms in terms of complexity, scalability, and accuracy raised significant interests. In this paper, a modified effective k-means based algorithm is developed and experimented. The new algorithm aims to reduce the computational load without significantly affecting the quality of the clusterings. The algorithm uses the City Block distance and a new stop criterion to guarantee the convergence. Conducted experiments on a real data set show its high performance when compared with the original k-means version.

Keywords: pattern recognition, global terrorism database, Manhattan distance, k-means clustering, terrorism data analysis

Procedia PDF Downloads 352
1330 Salicylic Acid Signalling in Relation to Root Colonization in Rice

Authors: Seema Garcha, Sheetal Chopra, Navraj Sarao

Abstract:

Plant hormones play a role in internal colonization by beneficial microbes and also systemic acquired resistance. They define qualitative and quantitative nature of root microbiome and also influence dynamics of root rhizospheric soil. The present study is an attempt to relate salicylic acid (signal molecule) content and qualitative nature of root endophytes at various stages in the growth of rice varieties of commercial value- Parmal 121 and Basmati 1121. Root seedlings of these varieties were raised using tissue culture techniques and then they were transplanted in the fields. Cultivation was done using conventional methods in agriculture. Field soil contained 0.39% N, 75.12 Kg/hectare of phosphorus and 163.0 Kg/hectare of potassium. Microfloral profiling of the root tissue was done using the selective microbiological medium. The salicylic acid content was estimated using HPLC-Agilent 1100 HPLC Series. Salicylic acid level of Basmati 1121 remained relatively low at the time of transplant and 90 days after transplant. It increased marginally at 60 days. A similar trend was observed with Parmal 121 as well. However, Parmal variety recorded 0.935 ug/g of salicylic acid at 60 days after transplant. Salicylic acid content decreased after 90 days as both the rice varieties remained disease free. The endophytic root microflora was established by 60 days after transplant in both the varieties after which their population became constant. Rhizobium spp dominated over Azotobacter spp. Genetic profiling of endophytes for nitrogen-fixing ability is underway.

Keywords: plant-microbe interaction, rice, root microbiome, salicylic acid

Procedia PDF Downloads 169
1329 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 144