Security Concerns: Insights from the Israel Experience

Author(s):  
D. Bar-Tal ◽  
◽  
D. Jacobson ◽  
A. Klieman
1997 ◽  
Vol 42 (4) ◽  
pp. 346-347
Author(s):  
Daniel Bar-Tal

2021 ◽  
Vol 59 (1) ◽  
pp. 1-20
Author(s):  
Cédric Jourde ◽  
Marie Brossier ◽  
Muriel Gomez-Perez

ABSTRACTThis article analyses how the state in Senegal has managed the hajj since the liberalisation era in the early 2000s. Although the essence of the hajj is religious, it is also deeply political and requires that the state manages complex relations with pilgrims, religious leaders, private travel agencies, politicians and Saudi authorities. This article argues that three inter-related imperatives structure the conduct of the Senegalese state: a security imperative, a legitimation imperative, and a clientelistic imperative. Security concerns lead the state to monitor and control pilgrims travelling to Mecca. Legitimation is seen in the collaborative relations with Sûfi orders and in the framing of the hajj organisation as a ‘public service’. Finally, given the magnitude of financial and symbolic resources attached to the hajj, clientelistic relations are constitutive of state officials’ actions. Overall, despite the post-2000 liberalisation of the hajj, the state has maintained its role as a gatekeeper, regulator and supervisor.


1984 ◽  
Vol 19 (2) ◽  
pp. 110-114
Author(s):  
Yannis Valinakis
Keyword(s):  

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


Author(s):  
Vera Mironova ◽  
Sam Whitt

Abstract What drives public support for retributive violence against insurgents, a desire for revenge or security? We consider the case of suspected Islamic State (ISIS) militants in Mosul Iraq. Using survey experiments, we inquire about public support for judicial as well as extrajudicial violence against insurgent combatants. We sample among ordinary civilians in Mosul who lived under ISIS rule as well as ISIS-affiliated families in displacement camps outside Mosul. We find that many Mosul civilians are highly tolerant of retributive violence against insurgents, but this tolerance is driven primarily by security concerns rather than revenge. In contrast, others, especially in displacement camps, oppose the punitive killing of insurgents because they regard such actions as counterproductive to long-term security goals. This tension speaks to potential security dilemmas surrounding retaliatory responses to insurgency. Instead, public security interests may be better served through nonviolent strategies, to include negotiations with insurgent forces and more restorative approaches to justice.


Sign in / Sign up

Export Citation Format

Share Document