-
141
-
142
Radicalization and extremism of youth: Comparative case study of Palestine and Israel
Published 2024-01-01“…The Israeli-Palestinian conflict, one of the most prolonged and most severe in modern times, is a source of violence, hatred and acts of terrorism that affect the daily lives of both societies. …”
Get full text
Article -
143
A Challenge to Systematic and Undifferentiated Data Collection Through Strategic Litigation: The Passenger Name Record Case (Ligue des Droits Humains) Before the Court of Justice o...
Published 2024-08-01“…At a time when the European Union and its Member States are constantly adopting measures to combat serious crime and terrorism, particularly through the prism of data protection rules, the CJEU is acting as a bulwark by imposing compliance with strict conditions, thereby encroaching on national rules of criminal procedure, which are initially the responsibility of the Member States. …”
Get full text
Article -
144
Agroterrorism in the U.S.: An Overview
Published 2005-10-01“… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
Get full text
Article -
145
Agroterrorism in the U.S.: An Overview
Published 2005-10-01“… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
Get full text
Article -
146
SCO as an Effective Tool of Regional Integration: Problems of Expansion
Published 2013-02-01“…The article focuses on the formation and subsequent development of the Shanghai Cooperation Organization (SCO), which was a response of the association’ states-founders to a dangerous increase the threat of terrorism, separatism and extremism in the post-Cold War period. …”
Get full text
Article -
147
Violation of human rights as the basis for the threats to international security
Published 2021-12-01“…The main research question is identifying the nexus between human rights violations (concerning terrorism and migration) and threats to international stability on global levels. …”
Get full text
Article -
148
On the issue of the development of criminological science in Ukraine
Published 2022-12-01“…These are, first of all, Russian armed aggression against Ukraine, violation of the laws and customs of war, separatism, complete non-compliance with international law, international terrorism, extremism, organized transnational crime and other factors of a destabilizing nature. …”
Get full text
Article -
149
SCO and BRICS in an emerging multipolar world order
Published 2024-09-01“…The author emphasizes that in addition to addressing traditional challenges, the SCO member states are actively cooperating in countering new threats, such as separatism, drug trafficking, terrorism, and Islamic extremism. …”
Get full text
Article -
150
Current Aspects of Legal Regulation for Monitoring Electronic Communications and Removal of Information from Electronic Communication Networks in Ukraine
Published 2021-09-01“…The author has suggested measures, the realization of which should improve the capacity of authorized law enforcement agencies to combat crime in the field of information and communication technologies: adoption of the Law of Ukraine “On Interception of Electronic Communications”, amendments to the Laws of Ukraine “On Electronic Communications”, “On Operative and Search Activities”, “On Counterintelligence Activities”, “On Combating Terrorism”; bringing the norms of domestic legislation in line with the provisions of the Convention on Cybercrime; creation of conditions necessary to improve the capacity of authorized state agencies to remove information from electronic communication networks; establishing proper cooperation with foreign law enforcement agencies.…”
Get full text
Article -
151
THE PROBLEM OF WORLD ORDER IN WESTERN IR STUDIES
Published 2016-10-01“…Discussion of the structure of world order is underway in various countries, both at the state level and in the expert community. Some researchers insist on the fact that after the end of the cold war, the collapse of the bipolar model of international relations, the world has become unipolar. …”
Get full text
Article -
152
Security and religion in democratizing Tunisia: re-enacting surveillance through religious narratives and gendered dynamics
Published 2024-07-01“…In conclusion, the role of wa’ydhat within the control and surveillance apparatus in Tunisia exists at the intersection between the evolution of surveillance practices worldwide, under the umbrella of the global war on terror, and the history of state control over religion in the country, dating back to the years of Bourguiba. …”
Get full text
Article -
153
The 1945 World Order – Process with «Open» Continuation
Published 2020-09-01“…The Yalta-Potsdam system of international relations, established by culmination of World War II, was created to maintain the security and cooperation of states in the post-war world. Leaders of the Big Three, who ensured the Victory over the fascist-militarist bloc in 1945, made decisive contribution to its creation. …”
Get full text
Article -
154
Réprimer par le droit : L’intervention de la Brigade nationale de police judicaire dans les procès du Hirak El-Rif
Published 2023-12-01“…A look at the historical development of this brigade from the late 1990s to the present day shows how it has broadened its scope of intervention, moving from a brigade dealing only with cases linked to state security, mainly dealing with the files of left-wing political opponents, to a brigade including cases of national scope and falling within the scope of the fight against organized crime (terrorism, drug trafficking, etc.). …”
Get full text
Article -
155
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01“…The results of this study show that national security priorities are number one, and especially defense priorities for the United States are no longer terrorism but great power competition. …”
Get full text
Article -
156
Cross-border cooperation as a key element of internal security – selected aspects
Published 2024-09-01“…Contemporary challenges such as transnational organized crime, terrorism, cyber threats, and migration require states to engage in collaborative frameworks that transcend traditional territorial boundaries. …”
Get full text
Article -
157
COOPERAREA ÎN INTELLIGENCE DINTRE ALIANȚA NORD-ATLANTICĂ ȘI UNIUNEA EUROPEANĂ
Published 2023-01-01“…Punctually, through a collaboration and cooperation between all the intelligence structures of the member states under the same strategic umbrella, the NATO-EU alliance could come up with a much faster joint response to the actions of terrorism, disinformation and destabilization of unfriendly states, succeeding so that the desired becomes a reality - a world in which peace and freedom prevaill.…”
Get full text
Article -
158
Information Warfare, Threats and Information Security
Published 2014-12-01“…This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. …”
Get full text
Article -
159
Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges
Published 2024-12-01“…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
Get full text
Article -
160
THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH
Published 2018-07-01“…Special role in the implementation of the scenario is played by the structures of international terrorism which regard Kosovo as one of the central training zones for militants. …”
Get full text
Article