The Antiradicalization Protection Racket

2020 ◽  
pp. 169-190
Author(s):  
Katherine E. Brown

This chapter addresses program failures. The masculinities supported are premised on a “chivalric” defense of citizens, which only works if “bad men are lurking to attack women.” As societies accept an increasingly paternalistic state, they are expected to extend gratitude for protection; dissent or criticism is marginalized. There is a proliferation of securitization, where areas of ordinary life are reclassified as “security” concerns. Broad methods create unsafe spaces through increased surveillance and the appropriation of other institutions for security measures. Attempts by the state to lessen women’s suffering are utilitarian, aimed at reducing the risk of detainees regressing by placing women as their “wives,” making detainees dependent upon the state to which they owe gratitude. These programs present a “protection racket,” which undermines the rights and security of women and constitutes a demand for deference from citizens in exchange for governance and security. Dissent is delegitimized be evoking security needs.

2021 ◽  
Vol 59 (1) ◽  
pp. 1-20
Author(s):  
Cédric Jourde ◽  
Marie Brossier ◽  
Muriel Gomez-Perez

ABSTRACTThis article analyses how the state in Senegal has managed the hajj since the liberalisation era in the early 2000s. Although the essence of the hajj is religious, it is also deeply political and requires that the state manages complex relations with pilgrims, religious leaders, private travel agencies, politicians and Saudi authorities. This article argues that three inter-related imperatives structure the conduct of the Senegalese state: a security imperative, a legitimation imperative, and a clientelistic imperative. Security concerns lead the state to monitor and control pilgrims travelling to Mecca. Legitimation is seen in the collaborative relations with Sûfi orders and in the framing of the hajj organisation as a ‘public service’. Finally, given the magnitude of financial and symbolic resources attached to the hajj, clientelistic relations are constitutive of state officials’ actions. Overall, despite the post-2000 liberalisation of the hajj, the state has maintained its role as a gatekeeper, regulator and supervisor.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


2020 ◽  
Vol 15 (4) ◽  
Author(s):  
Bojan Žikić ◽  
Mladen Stajić ◽  
Marko Pišev

The situation caused by the appearance of Covid-19 can be viewed as a critical event: typologically, it is an unprecedented event, which requires and shapes new forms of historical action hitherto unknown in the given context. Critical events serve as strong value and emotional landmarks in the cultural cognition of each social environment, and form the basis for a meaningful determination towards other events. Using material collected primarily from the online versions of electronic and printed media, we consider how the reality they presented is shaped through the news through the statements of politicians and medical doctors in Serbia. We trace how the narrative transformation of socio-cultural reality took place from the time before the of Covid-19 outbreak in our country to the time immediately after the lifting of the state of emergency declared due to that infection. The premise of all that is being done to tackle the infection is not a purpose in itself, but aims to enable a return to the life we were accustomed to before the outbreak of the epidemic. Covid-19 destabilizes our everyday life – a life that consists of work or study, use of free time, socializing etc. Such everyday life is a reference point of "normalcy". Socio-cultural normalcy refers to all that is understood as a normal and undisturbed course of everyday life. The appearance of Covid-19 gave rise to the notion of the "new normal", that is, a course of everyday life that is similar to normal, ordinary life, but with adherence to measures aimed at preventing the spread of infection by the authorities. In the paper we deal with the period that begins just before the outbreak of Covid-19 in our country, and ends with the period after the lifting of the state of emergency, to show the discursively produced picture of social reality in which the concept of the "new normal" serves as a cultural cognitive tool for understanding a situation in which one has to live with Covid-19 in order to one day be able to return to the way of life that existed before it.


2018 ◽  
Vol 6 (7) ◽  
pp. 234-247
Author(s):  
Joyjit Sanyal ◽  
Sujit Sikidar

Labour plays a very important role in the industrial production of the country. The human resource managers are concerned with the management of people at work. It is necessary to secure the co-operation of labour force in order to increase the production and earn higher profits. The co-operation of labour force is possible only when they are fully satisfied with their employer and the working conditions on the job. In the past, industrialists and the employers believed that their only duty towards their employees was to pay them satisfactory wages and salaries. But in due course of time, in addition to providing monetary benefits, human treatment given to employees started to play a very important role in seeking their co-operation. Labour or employee welfare activities benefit not only the workers but also the management in the form of greater industrial efficiency. The welfare activities pay a good dividend in the long run, because they contribute a lot towards the health and efficiency of the workers and towards a high morale. On the other hand, social security has come up as a dynamic concept which is considered in all advanced countries of the world as an indispensable chapter of the national programme. Social security is that security which the society furnishes through appropriate organisation against certain risks or certain contingencies to which its members are exposed. These risks are essentially contingencies against which the individual cannot afford by his small means and by his ability or foresight alone. As the name stands for general well- being of the people it is the duty of the state to promote social security which may provide the citizens with benefits designed to prevent or cure disease, to support him when he is not able to earn and to restore him to gainful activity. The state as an employer has provided for certain measures for the welfare and social security of the labourers, who contribute towards the economic development of a country and in this regard, the government has to see towards the proper implementation of such measures to maintain a harmonious industrial relation on the one side and on the other hand towards the upliftment of the members of the society. Thus, there arise the vital needs for the detailed assessments of the measures so provided, its quality of implementation so far and the level of satisfaction of the same among the different class of employees. The present study acts as a working paper with an objective to gather the opinion of the organized workforce in the Central Public Sector Enterprises with regards to their acceptance and satisfaction level of the various ‘Employees welfare and Social Security’ measures by the employers. However, the present study is restricted to two enterprises only and is undertaken with the following objectives: To analyze the opinions of the employees in respect of the labour welfare measures & social security benefits. To analyze the level of satisfaction or otherwise of the workers in respect of social security measures.


1982 ◽  
Vol 36 (2) ◽  
pp. 357-378 ◽  
Author(s):  
Robert Jervis

Regimes are harder to establish in the security area than they are in the economic realm because of the inherently competitive cast of many security concerns, the unforgiving nature of the problems, and the difficulty in determining how much security the state has or needs. Nevertheless, there is at least one example of a functioning security regime—the Concert of Europe. Under the Concert the great powers sharply moderated their individualistic and competitive policies and exercised restraint in the expectation that others would reciprocate. The self-interest that they followed was broader and longer-run than usual. The Balance of Power, however, is a regime only if the restraints are internal, as Kaplan implies, as contrasted with Waltz's formulation in which states restrain each other. Current superpower relations should not be considered a regime because the principles, rules, and norms have little autonomy but instead can be best understood as quite direct reflections of the states' power and interests.


Author(s):  
Olga Shulga

The purpose of the work is to consider the theoretical and practical aspects of fraud in the Internet sphere and on this basis to identify ways to ensure the confidentiality and cybersecurity of private users and commercial organizations. The methodological basis of the work is the use of general and special methods of scientific knowledge. Methods of combining analysis and synthesis, induction and deduction have been used to identify different types of fraud in the Internet. Generalization methods, logical and empirical, were used in determining the directions of development of the national cyber defense system and ensuring confidentiality. The main results of the work: The most common methods of fraud with the use of bank payment cards are identified, among which: a fake poll on social networks with a prize draw; a phone call to obtain classified information; SIM card replacement for access to online banking; online payments on unsecured sites; phishing; copying card data when handed over; unsecured WI-Fi networks; computers in public places; skimming for card data theft; unauthorized micropayments; ATM fraud; use of malicious programs (viruses), fake sites in order to compromise the details of electronic payment instruments and/or logins/passwords for access to Internet/mobile banking systems; dissemination (sale, dissemination) of information on compromised data; terminal network fraud; fraud in remote service systems; social engineering. Basic security rules are defined to prevent fraud. The experience of European countries in the field of cybersecurity is analyzed. The directions of adaptation of the current legislation on cybersecurity to the EU standards are outlined and the directions of development of the national system of cybersecurity are defined. The practical significance of the results is to deepen the understanding of the nature and mechanism of various types of fraud in the Internet. The recommendations proposed in the paper can form a methodological and theoretical basis for the development of economic policy of the state to ensure the confidentiality and cybersecurity of private users and commercial organizations. Conclusions. The state should establish an effective oversight body in the field of personal data protection, but security measures and online restrictions should comply with international standards. The use of encryption should not be prohibited at the legislative level, as such restrictions reduce the ability of citizens to protect themselves from illegal intrusions into privacy. In addition, the state policy in the Internet should be aimed at promoting the development and operation of secure Internet technologies and the formation of mechanisms to protect against services and protocols that threaten the technical functioning of the Internet from viruses, phishing and more.


Author(s):  
Dragan Jovašević

In 2008, the Republic of Serbia adopted a special Law on Liability of Legal Persons for Criminal Offenses. In doing so, on the basis of the international standards contained in the relevant international documents, it joined a large number of countries that introduced criminal liability of legal persons for crimes committed in addition to their responsible persons at the end of the 20th century. For legal persons, the law prescribed a disparate system of criminal sanctions in response to the state-society’s response to such unlawful and punishable conduct. The system of criminal sanctions in the law of the Republic of Serbia includes: penalties, probation and security measures. The law defined the concept, character, legal nature, manner, procedure, pronouncement and execution of criminal sanctions, whose characteristics this particular work speaks of.


2018 ◽  
pp. 99-109
Author(s):  
Victor KRYVYTSKY

Introduction. The globalization processes of the 21st century have influenced the exacerbation of existing and the emergence of new challenges for the national security of states. Modern conditions of functioning of Ukraine actualize the search for the latest conceptual basis of the national security paradigm in the customs sphere. The purposeof the article is to substantiate the conceptual basis of the customs security paradigm of Ukraine on the basis of generalization, analysis and systematization of the economic essence of its conceptual constructs, identification of the principles of security and the criteria for the effectiveness of customs security measures. Results. The expediency of differentiating the concept of “customs interests” in the context of customs interests of the state, subjects of foreign economic activity and international institutions is determined. It is substantiated that the notion of customs security is a multidimensional phenomenon, the interpretation of which is based on the norms of the Customs Code, according to which it reflects the state of the security of customs interests of Ukraine. Conclusions. The essence of the mechanism of customs security is to identify, prevent and neutralize probable and real risks and threats, ensure sustainable development, to protect the customs interests of the state and subjects of foreign economic activity.


Author(s):  
H. Yarovenko

Over the past decade, there has been an increase in the volume of cybercrime in various spheres of life at the level of the state, economic agents, and individuals. Therefore, the issues of studying the processes of forming information security and identifying the impact on its effectiveness are becoming topical. The aim of this study is to prove the hypothesis that the behaviour of the population associated with the use of personal security measures and the formation of the corresponding consequences of incidents occurs under the influence of the level of economic development of the country. This was done using k-means cluster analysis via the Deductor Academic analytical platform and based on data from a survey conducted among respondents from EU countries. Analysis of the responses showed that there is a growing trend in the use of online banking and e-commerce services; there is an increase in the number of respondents who have become victims of cybercrimes, especially social engineering; the trend towards the use of reliable personal security equipment is declining. The results of the cluster analysis, for which data on the number of respondents who are victims of cybercrimes and the number of respondents using various personal security tools were used, made it possible to form 7 clusters of countries. Analysis of GDP per capita for the obtained clusters and visualization of the map of countries allowed us to confirm the hypothesis, but it was also determined that the dependence of the use of personal security measures and the consequences of cybercrimes is also influenced by the mental characteristics of countries formed due to the close territorial location of neighboring countries. The results obtained will be of practical importance for the development of the concept of information security and economic development of the state. They can be used to determine which sets of protection are appropriate for the income level of the population. Priority areas for further research are to determine the influence of other factors on the formation of the country's information security and the formation of a barycentric model of their measurements to ensure sustainable economic development of the state.


Sign in / Sign up

Export Citation Format

Share Document