Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
370 result(s) for "Alexander, Dean C"
Sort by:
Business Confronts Terrorism
Central banks and stock exchanges are bombed. Suicide bombers ravage cinemas, nightclubs, and theaters. Planes crash into skyscrapers and government buildings. Multiple bombs explode on commuter trains. Thousands of people are killed and injured while millions are terrorized by these attacks. These scenarios could be part of a future Hollywood movie. Sadly, they are representative of previous terror attacks against industry and government interests worldwide. Moreover, they are harbingers of global terror threats. Industry constitutes a prime target of contemporary terrorism. This timely book analyzes the threats companies face due to terrorism, industry responses to these dangers, and terrorism’s effects on conducting business in the post-9/11 environment. Dean C. Alexander details the conventional and unconventional terror capabilities facing industry. He describes the activities of terrorists in the economic system and the ways they finance their operations. Alexander discusses how companies can reduce terrorist threats and that corporate security can minimize political violence. He outlines the dynamics of the public-private partnership against terrorism: government aiding industry, business supporting government, and tensions between the two. He also delineates terrorism’s effects—financial, physical, and emotional—on workers and employers. He highlights the negative financial and economic consequences of terrorism. He discusses the impact of terrorism on traditional business practices and concludes with an assessment of future trends.
The Islamic State
This book offers insights into the nature of the Islamic State and what the international community can do to combat it. The origins, intentions, leadership, capabilities, and operations of the IS, as well as specific steps that governmental, intergovernmental, and non-governmental bodies can take to counter the IS menace, are examined.
Combating terrorist financing in the first decade of the twenty-first century
Purpose - The purpose of this paper is to investigate the strategic intelligence oversights with regards to the funding of terrorism.Design methodology approach - The paper considers the modus operandi of terrorist financing, and how and how speedily or otherwise they were identified, and the international and national anti-terrorist financing measure implemented post 9 11.Findings - The paper concludes that there were (and still are) strategic oversights, delays and distractions by government law enforcement and financial regulatory agencies in combating terrorist financing.Practical implications - The paper suggests there should be more proactive exchange of intelligence by law enforcement and financial regulatory agencies in combating financing of terrorism.Originality value - The added value is lessons learned in international efforts against financing of terrorism.
Insights from Comparing Pre-Attack Variables in the Las Vegas Mass Shooting with Ideologically Motivated Violent Extremist Attacks
This article provides a review of recent literature, summarizing the development and discussion of pre-attack variables as an area of focus for threat assessment and proactive risk mitigation concerning lone actor attacks and targeted violence attacks. An in-depth case study of the motivationally elusive Las Vegas mass shooter Stephen Paddock is presented, including an analysis of Paddock’s pre-attack planning behaviors, using the same variable nomenclature as a recent FBI pre-attack planning behaviors study of active shooters. The pre-attack planning and preparation activities are compared both factually and in the context of recent literature regarding lone actor attacks. The pre-attack process of radicalization is discussed as a primary distinction between motivation-elusive actors and ideologically motivated extremists. The article concludes with a discussion of pre-attack intervention opportunities and potential lessons learned to improve future threat assessment and risk-mitigation efforts.
How are Family Structures Influential in Potential Terrorist Participation?
There are many schemes by which to analyze the prevalence of terrorists in family units, aptly designated as family terror networks or family affiliated terrorism. This deviancy, occurring within the rubric of social networks, is not new. Terrorism within family units is a fact that has occurred throughout history. Family frameworks enable higher instances of conversion to radical beliefs, given the credibility and trust that attach as opposed to that in unaffiliated networks. Such radicalization has materialized across diverse ideologies: from religiously motivated precepts to national liberation and from hate-based ideologies to other right-wing perspectives. Even those outside the nuclear family can have significant effects on others to spur participation in terrorism. In November 2016, Ohio-based Munir Abdulkader was sentenced to twenty years in prison for providing material support to ISIS and trying to kill a returning US soldier, among other crimes. Abdulkader claimed he wanted to fight with ISIS.
Trade Publication Article
Contemporary and Future Terror Threats
Chemical agents are released into the ventilation system of a train station. Simultaneous cyberterrorism attacks cripple electricity grids. A “dirty bomb” explodes at a financial center. Deadly pathogens are introduced into the food supply. An explosives-laden cargo plane crashes into an open-air stadium. These scenarios illustrate some contemporary and future terror threats. This chapter builds upon the earlier perspectives by examining contemporary and future terrorist threats, including terrorist tactics and targets. Additionally, U.S. government terror warnings and advisories will be discussed. From 9/11 to February 2003, the FBI issued over 100 terror warnings to state and local law enforcement and
Financing Terror
Terror groups raise money through legal and illegal means. Among criminal financing schemes terrorists have utilized include: trading in commodities (e.g., “conflict” diamonds and gold); bogus financial instruments; currency smuggling and wire transfers; drug-trafficking; extortion, money laundering; smuggling products; securities fraud; and scams. Traditional banking and alternative financial services, including hawalas, are used to distribute terror-destined funds. These methodologies contributing to funding terror are covered in this chapter. Terrorists, terrorist-front companies, and individuals contributing to terrorist groups have at their disposal the vast, multinational banking system. Bankers and law enforcement officials have difficulties distinguishing account holders with benign intentions from
Terrorists and Their Supporters Participate in the Economic System
Terrorists and their abettors exploit the assets available in the economic system to their advantage. In doing so, they are able to acquire financial, organizational, and operational resources (e.g., arms, training, intelligence, and information) from governments, companies, nonprofits, and individuals. Terrorists complement their manipulation of traditional economic resources through the commission of crimes as diverse as: counterfeiting currency, credit cards, and ATM cards; misappropriating and using credit card information; forging documents; identity theft; money laundering; drug trafficking; corruption; commercial espionage; and other unlawful activities. This chapter discusses these actors and their multi-pronged legal and illegal pursuits—all in the furtherance
Public-Private Partnership in Combating Terrorism
The multi-faceted public-private partnership in the war on terrorism is discussed in this chapter. This dynamic can be characterized along three main themes: government supporting industry, business helping government, and challenges to further cooperation between the two. Government assists business through various means, such as: purchasing homeland security products and services; guiding industry on threats and responses; reducing industry risk; privatization of some government activities; and other issues. In the war on terrorism, government assists industry in a number of ways. The public sector purchases homeland security products and services. For our purposes, such goods and services include: defense (e.g.,
Additional Perspectives on Terror’s Impact on Business
A discussion of initial trends arising from terror’s impact on business is critical given global terror threats against industry, government, and the public. This chapter addresses the broad consequences of political violence on business accordingly: the initial impact of large-scale terror attacks on business, subsequent industry responses, and long-term structural issues affecting business. The short-term effects of catastrophic terrorism are discussed in terms of economic and sector responses, including ramifications on financial markets and effects on business activity. Industry responses crafted thereafter include: shifts and flexibility within and among business sectors, development and expansion of homeland security companies, funding such