Showing 141 - 160 results of 190 for search 'terrorism’s state', query time: 0.06s Refine Results
  1. 141
  2. 142

    Radicalization and extremism of youth: Comparative case study of Palestine and Israel by Dobrucka Weronika

    Published 2024-01-01
    “…The Israeli-Palestinian conflict, one of the most prolonged and most severe in modern times, is a source of violence, hatred and acts of terrorism that affect the daily lives of both societies. …”
    Get full text
    Article
  3. 143

    A Challenge to Systematic and Undifferentiated Data Collection Through Strategic Litigation: The Passenger Name Record Case (Ligue des Droits Humains) Before the Court of Justice o... by Catherine Forget

    Published 2024-08-01
    “…At a time when the European Union and its Member States are constantly adopting measures to combat serious crime and terrorism, particularly through the prism of data protection rules, the CJEU is acting as a bulwark by imposing compliance with strict conditions, thereby encroaching on national rules of criminal procedure, which are initially the responsibility of the Member States. …”
    Get full text
    Article
  4. 144

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
    Get full text
    Article
  5. 145

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. The United States (U.S.) has identified the protection of national systems and infrastructure, such as the transportation, communication, water supply, and agriculture networks, as priorities to defend against terrorism. …”
    Get full text
    Article
  6. 146

    SCO as an Effective Tool of Regional Integration: Problems of Expansion by O. Y. Kolegova

    Published 2013-02-01
    “…The article focuses on the formation and subsequent development of the Shanghai Cooperation Organization (SCO), which was a response of the association’ states-founders to a dangerous increase the threat of terrorism, separatism and extremism in the post-Cold War period. …”
    Get full text
    Article
  7. 147

    Violation of human rights as the basis for the threats to international security by Botirjon Ruzmetov

    Published 2021-12-01
    “…The main research question is identifying the nexus between human rights violations (concerning terrorism and migration) and threats to international stability on global levels. …”
    Get full text
    Article
  8. 148

    On the issue of the development of criminological science in Ukraine by T. A. Shevchuk

    Published 2022-12-01
    “…These are, first of all, Russian armed aggression against Ukraine, violation of the laws and customs of war, separatism, complete non-compliance with international law, international terrorism, extremism, organized transnational crime and other factors of a destabilizing nature. …”
    Get full text
    Article
  9. 149

    SCO and BRICS in an emerging multipolar world order by D. V. Malyshev

    Published 2024-09-01
    “…The author emphasizes that in addition to addressing traditional challenges, the SCO member states are actively cooperating in countering new threats, such as separatism, drug trafficking, terrorism, and Islamic extremism. …”
    Get full text
    Article
  10. 150

    Current Aspects of Legal Regulation for Monitoring Electronic Communications and Removal of Information from Electronic Communication Networks in Ukraine by V. M. Lazebnyi

    Published 2021-09-01
    “…The author has suggested measures, the realization of which should improve the capacity of authorized law enforcement agencies to combat crime in the field of information and communication technologies: adoption of the Law of Ukraine “On Interception of Electronic Communications”, amendments to the Laws of Ukraine “On Electronic Communications”, “On Operative and Search Activities”, “On Counterintelligence Activities”, “On Combating Terrorism”; bringing the norms of domestic legislation in line with the provisions of the Convention on Cybercrime; creation of conditions necessary to improve the capacity of authorized state agencies to remove information from electronic communication networks; establishing proper cooperation with foreign law enforcement agencies.…”
    Get full text
    Article
  11. 151

    THE PROBLEM OF WORLD ORDER IN WESTERN IR STUDIES by M. V. Soljanova

    Published 2016-10-01
    “…Discussion of the structure of world order is underway in various countries, both at the state level and in the expert community. Some researchers insist on the fact that after the end of the cold war, the collapse of the bipolar model of international relations, the world has become unipolar. …”
    Get full text
    Article
  12. 152

    Security and religion in democratizing Tunisia: re-enacting surveillance through religious narratives and gendered dynamics by Fabrizio Leonardo Cuccu, Alessandra Bonci

    Published 2024-07-01
    “…In conclusion, the role of wa’ydhat within the control and surveillance apparatus in Tunisia exists at the intersection between the evolution of surveillance practices worldwide, under the umbrella of the global war on terror, and the history of state control over religion in the country, dating back to the years of Bourguiba. …”
    Get full text
    Article
  13. 153

    The 1945 World Order – Process with «Open» Continuation by V. T. Yungblud

    Published 2020-09-01
    “…The Yalta-Potsdam system of international relations, established by culmination of World War II, was created to maintain the security and cooperation of states in the post-war world. Leaders of the Big Three, who ensured the Victory over the fascist-militarist bloc in 1945, made decisive contribution to its creation. …”
    Get full text
    Article
  14. 154

    Réprimer par le droit : L’intervention de la Brigade nationale de police judicaire dans les procès du Hirak El-Rif by Mariam Benalioua

    Published 2023-12-01
    “…A look at the historical development of this brigade from the late 1990s to the present day shows how it has broadened its scope of intervention, moving from a brigade dealing only with cases linked to state security, mainly dealing with the files of left-wing political opponents, to a brigade including cases of national scope and falling within the scope of the fight against organized crime (terrorism, drug trafficking, etc.). …”
    Get full text
    Article
  15. 155

    Russia vs America cyber war: space technology mastery competition by Fadra Fadra, Joseph Teguh Santoso

    Published 2024-10-01
    “…The results of this study show that national security priorities are number one, and especially defense priorities for the United States are no longer terrorism but great power competition. …”
    Get full text
    Article
  16. 156

    Cross-border cooperation as a key element of internal security – selected aspects by Ireneusz Fabia, Urszula Fabia, Sebastian Piotrowski

    Published 2024-09-01
    “…Contemporary challenges such as transnational organized crime, terrorism, cyber threats, and migration require states to engage in collaborative frameworks that transcend traditional territorial boundaries. …”
    Get full text
    Article
  17. 157

    COOPERAREA ÎN INTELLIGENCE DINTRE ALIANȚA NORD-ATLANTICĂ ȘI UNIUNEA EUROPEANĂ by Şerban-Dan PREDESCU, Tiberiu TĂNASE

    Published 2023-01-01
    “…Punctually, through a collaboration and cooperation between all the intelligence structures of the member states under the same strategic umbrella, the NATO-EU alliance could come up with a much faster joint response to the actions of terrorism, disinformation and destabilization of unfriendly states, succeeding so that the desired becomes a reality - a world in which peace and freedom prevaill.…”
    Get full text
    Article
  18. 158

    Information Warfare, Threats and Information Security by D. N. Bespalov, M. A. Kazakov

    Published 2014-12-01
    “…This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. …”
    Get full text
    Article
  19. 159

    Use of Extra-judicial Technical Surveillance in Criminal Decision-making: European Limitations and National Challenges by Andrei Zarafiu

    Published 2024-12-01
    “…The case law of the European Court of Human Rights in Strasbourg has consistently stated that even a severe threat to national security, such as acts of terrorism, or other risks of a global nature are not to be relied upon in order to override this form of protection and control. …”
    Get full text
    Article
  20. 160

    THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH by E. G. Ponomareva

    Published 2018-07-01
    “…Special role in the implementation of the scenario is played by the structures of international terrorism which regard Kosovo as one of the central training zones for militants. …”
    Get full text
    Article