Showing 101 - 120 results of 145 for search 'state terrorism', query time: 0.07s Refine Results
  1. 101
  2. 102

    REGIONAL ANTI-MONEY LAUNDERING COOPERATION IN THE AFRICAN UNION by H. D. Gambarov

    Published 2018-07-01
    “…The paper includes the results of comparative analysis of various international conventions and local acts and regulations, and considers the compliance of regional “soft law” and institutional cooperation framework with the accepted anti-money-laundering standards, where it particularly discusses the characteristics of African Peer-Review Mechanism and the Centre for the Study and Research on Terrorism as essential elements for African Union member states’ cooperation. …”
    Get full text
    Article
  3. 103
  4. 104

    MONEY LAUNDERING AND CONSTITUTIONAL RIGHTS by A. V. Shashkova

    Published 2013-12-01
    “…Such deliberate aim shall be stated in the legislation, that means that while concealing, non-reporting, taking or granting funds the person shall mentally understand the illegal origin of such funds: actions shall be dedicated to concealing, covering or assistance in money-laundering. …”
    Get full text
    Article
  5. 105

    BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA by Simon Nankap KUMS, Cornelius Ishaya KWEDE

    Published 2023-08-01
    “…This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
    Get full text
    Article
  6. 106

    COMMUNITY POLICING AS A PANACEA FOR MITIGATING ARMED BANDITARY IN CENTRAL NIGERIA by Fidelis Achoba, Peace Oluwatoyin Irefin

    Published 2023-08-01
    “… Given the dearth of studies on community policing in Nigeria and Kogi State in particular, this study has focused on Ankpa Local Government Area, located in the north-east of Igalaland in Central Nigeria. …”
    Get full text
    Article
  7. 107

    Reviewing South Africa’s Non-Proliferation Policy and Strategic Trade Controls by Melanie Reddiar

    Published 2024-10-01
    “… The prohibition of Weapons of Mass Destruction (WMDs) in South Africa is governed through the implementation of an integrated and robust non-proliferation and arms control policy, legislative and regulatory framework, which has been revised and improved over time to address global developments; scientific and technological developments; and advancement of the threat landscape in terms of illicit trafficking of restricted goods and technologies as well as terrorism. Nonetheless, deficiencies in the regulatory framework and legislation became apparent over the years, especially after the infiltration of the South African industry by the A.Q. …”
    Get full text
    Article
  8. 108

    INTERNET COMMUNICATION: NEW CHALLENGES FOR THE YOUTH by D. N. Karpova

    Published 2013-10-01
    “…Besides above-mentioned personal security, special attention is paid to the problem of international cyber terrorism which can cause more damage not only to companies but the whole governments. …”
    Get full text
    Article
  9. 109

    EU SCIENCE DIPLOMACY AND FRAMEWORK PROGRAMS AS INSTRUMENTS OF STI COOPERATION by К. А. Ibragimova

    Published 2017-11-01
    “…The success of these programs and scientific diplomacy shows the effectiveness of the EU as a global actor.In its foreign policy global innovation strategy, the EU proceeds from the premise that no state in the world today can cope independently with modern global challenges such as climate change, migration, terrorism, etc. …”
    Get full text
    Article
  10. 110
  11. 111

    China-Pakistan Economic Corridor: Meeting Security Challenges in Balochistan Through Trade and Development by Hashmat Ullah Khan, Shan Yu

    Published 2022-11-01
    “…It remains an economically underdeveloped and socially and politically marginalized province, facing extensive poverty and lack of economic opportunities despite the enormous economic potential, separatism movements, terrorism, and severe clashes with the federal government over its financial share in the state's divisible pool and natural resources found in the province. …”
    Get full text
    Article
  12. 112

    A Challenge to Systematic and Undifferentiated Data Collection Through Strategic Litigation: The Passenger Name Record Case (Ligue des Droits Humains) Before the Court of Justice o... by Catherine Forget

    Published 2024-08-01
    “…At a time when the European Union and its Member States are constantly adopting measures to combat serious crime and terrorism, particularly through the prism of data protection rules, the CJEU is acting as a bulwark by imposing compliance with strict conditions, thereby encroaching on national rules of criminal procedure, which are initially the responsibility of the Member States. …”
    Get full text
    Article
  13. 113

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
    Get full text
    Article
  14. 114

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
    Get full text
    Article
  15. 115

    SCO as an Effective Tool of Regional Integration: Problems of Expansion by O. Y. Kolegova

    Published 2013-02-01
    “…The article focuses on the formation and subsequent development of the Shanghai Cooperation Organization (SCO), which was a response of the association’ states-founders to a dangerous increase the threat of terrorism, separatism and extremism in the post-Cold War period. …”
    Get full text
    Article
  16. 116

    Violation of human rights as the basis for the threats to international security by Botirjon Ruzmetov

    Published 2021-12-01
    “…The main research question is identifying the nexus between human rights violations (concerning terrorism and migration) and threats to international stability on global levels. …”
    Get full text
    Article
  17. 117

    On the issue of the development of criminological science in Ukraine by T. A. Shevchuk

    Published 2022-12-01
    “…These are, first of all, Russian armed aggression against Ukraine, violation of the laws and customs of war, separatism, complete non-compliance with international law, international terrorism, extremism, organized transnational crime and other factors of a destabilizing nature. …”
    Get full text
    Article
  18. 118

    SCO and BRICS in an emerging multipolar world order by D. V. Malyshev

    Published 2024-09-01
    “…The author emphasizes that in addition to addressing traditional challenges, the SCO member states are actively cooperating in countering new threats, such as separatism, drug trafficking, terrorism, and Islamic extremism. …”
    Get full text
    Article
  19. 119

    Current Aspects of Legal Regulation for Monitoring Electronic Communications and Removal of Information from Electronic Communication Networks in Ukraine by V. M. Lazebnyi

    Published 2021-09-01
    “…The author has suggested measures, the realization of which should improve the capacity of authorized law enforcement agencies to combat crime in the field of information and communication technologies: adoption of the Law of Ukraine “On Interception of Electronic Communications”, amendments to the Laws of Ukraine “On Electronic Communications”, “On Operative and Search Activities”, “On Counterintelligence Activities”, “On Combating Terrorism”; bringing the norms of domestic legislation in line with the provisions of the Convention on Cybercrime; creation of conditions necessary to improve the capacity of authorized state agencies to remove information from electronic communication networks; establishing proper cooperation with foreign law enforcement agencies.…”
    Get full text
    Article
  20. 120

    THE PROBLEM OF WORLD ORDER IN WESTERN IR STUDIES by M. V. Soljanova

    Published 2016-10-01
    “…Discussion of the structure of world order is underway in various countries, both at the state level and in the expert community. Some researchers insist on the fact that after the end of the cold war, the collapse of the bipolar model of international relations, the world has become unipolar. …”
    Get full text
    Article