South–South Migration and Security Risks: Political Islam and Violent Extremism in the Shadow of Globalisation in Bangladesh

2017 ◽  
Vol 73 (3) ◽  
pp. 312-326 ◽  
Author(s):  
Mubashar Hasan

Against the backdrop of 2016 terrorist attack in Dhaka, this article argues that in the terrain of Bangladeshi literatures on migration, little is explored about the impact of south–south migration in unleashing security threat to Bangladesh. This article offers a historic trajectory of south–south migration and security threat to Bangladeshi state. It argues that while it is important to understand migration from various point of views, scholars have ignored to explore the nexus between migration and security threat of the sender state. This article explains why to some Muslim migrants of Bangladesh, bad ideas such as terrorism may seem to form an option and how globalisation played a role in fostering bad ideas. It proposes that scholars of migration require to indulge in further research to understand the nexus between outward migration and security threat to Bangladesh.

2021 ◽  
Author(s):  
Ljiljana B. Lazarevic ◽  
Goran Knezevic ◽  
Maša Vukčević Marković ◽  
Janko Mileta Međedović ◽  
Boban Petrović ◽  
...  

This study investigates group differences in Militant Extremist Mindset (MEM) measures of Pro-violence, Divine Power, Utopianism, Vile World, and West, together with several variables building its nomological network. The study was based on groups from domicile population living within and outside the conflict zone and a sample of refugees/asylum seekers. We hypothesize that refugees as a group do not present a higher risk for engagement in militant extremism and, consequently, terrorism. Therefore, they do not present security risks for the host countries. Findings show that groups living in a conflict zone tend to endorse all aspects of militant extremism and conservative ideology. Furthermore, our results do not support the widely held belief that refugees are a security threat, as they tend to reject violent extremism as a means to achieve goals.


2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


2020 ◽  
Vol 5 (9) ◽  
pp. e002879
Author(s):  
Thomas Druetz ◽  
Lalique Browne ◽  
Frank Bicaba ◽  
Matthew Ian Mitchell ◽  
Abel Bicaba

IntroductionMost of the literature on terrorist attacks’ health impacts has focused on direct victims rather than on distal consequences in the overall population. There is limited knowledge on how terrorist attacks can be detrimental to access to healthcare services. The objective of this study is to assess the impact of terrorist attacks on the utilisation of maternal healthcare services by examining the case of Burkina Faso.MethodsThis longitudinal quasi-experimental study uses multiple interrupted time series analysis. Utilisation of healthcare services data was extracted from the National Health Information System in Burkina Faso. Data span the period of January 2013–December 2018 and include all public primary healthcare centres and district hospitals. Terrorist attack data were extracted from the Armed Conflict Location and Event Data project. Negative binomial regression models were fitted with fixed effects to isolate the immediate and long-term effects of terrorist attacks on three outcomes (antenatal care visits, of facility deliveries and of cesarean sections).ResultsDuring the next month of an attack, the incidence of assisted deliveries in healthcare facilities is significantly reduced by 3.8% (95% CI 1.3 to 6.3). Multiple attacks have immediate effects more pronounced than single attacks. Longitudinal analysis show that the incremental number of terrorist attacks is associated with a decrease of the three outcomes. For every additional attack in a commune, the incidence of cesarean sections is reduced by 7.7% (95% CI 4.7 to 10.7) while, for assisted deliveries, it is reduced by 2.5% (95% CI 1.9 to 3.1) and, for antenatal care visits, by 1.8% (95% CI 1.2 to 2.5).ConclusionTerrorist attacks constitute a new barrier to access of maternal healthcare in Burkina Faso. The exponential increase in terrorist activities in West Africa is expected to have negative effects on maternal health in the entire region.


2016 ◽  
Vol 28 (3) ◽  
pp. 82-103 ◽  
Author(s):  
Mohd Hisham Mohd Sharif ◽  
Indrit Troshani ◽  
Robyn Davidson

Limited attention has been directed towards understanding the impact of social media in the public sector, particularly in local government organisations. Although social media offer substantial benefits and opportunities to local government, research into the impact of social media remains scant. To address this gap, the authors draw on the technology, organisation, and environment (TOE) framework and propose a model of the determinants of social media impact in local government. The model is tested with data collected via a survey with 173 Australian local government organisations using social media. Data were analysed using the partial least squares-structural equation modelling (PLS-SEM) technique. The results indicate that TOE factors including perceived benefits, perceived security risks, compatibility, and degree of formalisation are important predictors of social media impact in local government.


2002 ◽  
Vol 12 ◽  
pp. 214-218
Author(s):  
A. Brunini ◽  
M.D. Melita

AbstractA set of self-consistent simulations of the formation of Uranus and Neptune are performed to study the evolution of the native KBOs in the process. Our main goal is to have a deeper understanding of the impact of the formation of the outer planets on the present orbital structure of the trans-neptunian region. We aim to understand if resonance capture driven by the outward migration of Neptune can actually occur and its interplay with the invasion of massive planetesimals expelled from the Uranus-Neptune region as a byproduct of their formation. Also the putative present existence in the Oort reservoir of a population of objects originated in the Kuiper belt is analyzed.


2015 ◽  
Vol 4 (2) ◽  
pp. 390 ◽  
Author(s):  
Alaa Zain ◽  
Heba El-khobby ◽  
Hatem M. Abd Elkader ◽  
Mostafa Abdelnaby

A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


2021 ◽  
Vol 21 (4) ◽  
pp. 772-784
Author(s):  
Yury V. Borovsky

In the early 2020s the worlds transition from carbon-intensive to climate-neutral energy use has already become a discernible and a difficult-to-reverse process. With Joe Bidens election as US president, the United States have returned to the Paris Climate Agreement and have become a key driver of this process (along with the EU and China). As a result, the international community has reached a consensus on the ongoing energy transition. This process will require considerable effort and may take several decades. Nevertheless, the impact of energy transition on traditional approaches to energy security, which emerged largely as a result of the global oil crises of the 1970s and 1980s and are centered around the supply of fossil fuels, is already a relevant research topic. This problem is examined relying on the relevant terminological, theoretical and factual material. The article concludes that energy transition will ultimately undermine the carbon paradigm that has underpinned energy security policies since the 1970s. Rapid development of renewable and other low-carbon energy sources will certainly remove key energy security risks of energy importers and, possibly, allow them to achieve energy independence. However, a post-carbon era may also generate new risks. For countries that rely heavily on oil, gas and coal exports, energy transition will result in the loss of markets and revenues. It may present an energy security threat for them as well as it will require a costly and technologically complex process of the energy sector decarbonization. Some exporters, especially those with high fuel rents and insufficient financial reserves, may face serious economic and social upheavals as a result of energy transition. The EU and the US energy transition policies reflect provisions of all three fundamental international relations theoretical paradigms, including realism. This means that the EU and the US policy, aimed at promoting climate agenda, may be expected to be rather tough and aggressive. China as the third key player in energy transition is still following a liberal course; however, it may change in the future.


Sign in / Sign up

Export Citation Format

Share Document