Contemporary Terrorist Challenges and Threats in Europe

2021 ◽  
Vol 38 (38) ◽  
pp. 122-137
Author(s):  
Darko Trifunovic ◽  
Juliusz Piwowarski

This article generally contains two parts. One is a theoretical approach to dealing with the phenomenon of terrorism as well as international terrorism. Within the first part, a unique definition of the concept of security science is given, without which it is not possible to properly perceive or investigate security threats and risks within which terrorism is one of the significant threats. The second part deals with models of terrorist activities with special attention to the webspace and the significant role that terrorists attach to the increasing use of the Internet for their purposes. The theoretical part leads to the conclusion that there are five essential elements whose presence, if detected in one territory or state, indicates the existence of a mechanism that produces or creates new jihad warriors. The paper also gives a unique forecast of the degree of endangerment on the example of a territory, which gives scientists who investigate these threats a new direction of research.

Author(s):  
L. Walsh

This article seeks to provide a brief overview of the current development of digital democracy in Australia, with emphasis on the use of the Internet to extend and enhance citizen participation. Use of the Internet within the definition of digital democracy proposed is categorized into three overlapping groups: (1) e-government services and administration; (2) participatory technologies; and (3) informal modes of participation.


Phonology ◽  
2001 ◽  
Vol 18 (1) ◽  
pp. 1-6 ◽  
Author(s):  
Carlos Gussenhoven ◽  
René Kager

If there is such a person as the average phonologist, he might have a conception of the relation between phonetics and phonology that comes close to the relation between social perceptions of crimes and a Code of Criminal Law. The Code's definition of various types of crimes and the penalty each type carries ultimately reflect, to put it crudely, the feelings of the people. Also, the Code's development will reflect social change. Criminal codes will typically incorporate the changing perceptions of the general public, and will now begin to include articles devoted to the use of the Internet, for instance. But at the end of the day, what counts in a law suit is what is in the Criminal Code, not the feelings of the people. So it is with phonology. It is easy to show that lexical forms are frequently related to functional (ergonomic) considerations, and that the way the grammar processes them into surface representations will amount to a reasonable articulatory task for the speaker, while equally the acoustic result will enable the listener to recognise these forms with reasonable ease. However, ultimately we say things the way we do because our lexical representations are the way they are, and our phonological grammar is the way it is.


2010 ◽  
Vol 1 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Lorenzo Mosca

This article focuses on the political use of the Internet by the Italian Global Justice Movement (GJM) considering both the organizations and the individuals involved in the movement. First, a definition of the concept ‘political use of the Internet’ and its operationalization is provided. Second, light is shed on how the Internet is used politically by participants in social movements taking into account their organizational and participatory experiences. Data were gathered with quantitative and qualitative instruments during different researches: a survey of participants in a demonstration against the ‘Bolkestein’ directive and a series of interviews with representatives of different organizational sectors of the Italian GJM, complemented by a qualitative website analysis of the same organizations. While quantitative data allows for controlling relations among variables concerning the political use of the Internet by individuals, qualitative data provides more detailed information on Internet use in the everyday life of activists and organizations.


Author(s):  
Azza A Abubaker ◽  
Joan Lu

A textbook in any e-educational system is an important element that requires a closer look at its components and structure, as well as identifying the barriers that affect the level of learning. This can be achieved in different aspects such as the analysis of textual content or sentence structure which is one of the concerns of linguists. On the other hand, examining the textual content can determine the appropriateness of the education level for students. This type of assessment is part of educators' concerns and by examining and defining the factors that could affect reading a text on screen, this is usually related to the way of displaying text such as font size, colour, background colour, amount of text and the location of the text on the screen. This is a key focus of this research. In this chapter, the concern will be to define the concepts and the structure of an e- document as a starting point to investigate the usability of e-texts as it covers the following: definition of e-document; history of eBook; structure of e-textbook; contribution of e-textbook for education; comparison between reading electronic and paper book; young people and the use of the internet and computer; statistical data for using the internet in Arabic countries; designing an e-textbook.


2020 ◽  
Vol 16 (12) ◽  
pp. 64
Author(s):  
Wejdan Suleiman Irtaimeh

This study deals with the issue of criminal protection of privacy in the Jordanian Cybercrime Law No. 27 of 2015, as the great developments in computer technologies and the widespread use of the Internet have led to the emergence of new forms of electronic crimes related to the protection of the privacy of individuals. The study indicated that the Jordanian legislator did not include in the Jordanian Constitution or in the Cybercrime Law any definition of the right to privacy that delineates its boundaries and clarifies its features. The study concluded that the Cybercrime Law was ambiguous in some of its articles, especially those related to the protection of the right to privacy. The Jordanian legislator did not include special provisions that explicitly criminalize assault on privacy, as it included provisions for other crimes that include assault on this right, which made it lose clarity, precision and accuracy of wording. Moreover, such provisions omitted other forms of electronic crimes related to the right to privacy, which constituted a legislative deficiency. The study concludes that there is a need to amend the Cybercrime Law No. 27 of 2017 and to have explicit provisions that stipulate the criminalization of assault on privacy, as well as the need to issue a special law to protect the personal information of individuals.


2011 ◽  
Vol 16 (17) ◽  
Author(s):  
C Betsch

This paper provides a psychological perspective on the possible effect of the Internet on the decision against vaccination. The reported importance of the Internet in health decisions is still low, but rising; especially the amount of interactive use of the Internet is increasing, e.g. due to the use of social media. It is argued that the fact that individuals do not report the Internet to be an important source of information does not necessarily mean that the information obtained in their Internet searches is not influential in their decisions. Evidence is summarised here regarding the (anti-)vaccination information on the Internet, and its influence on risk perceptions and on vaccination intentions and behaviour in relation to the encoded information. The conclusion suggests that scholars should strive to explain the underlying processes and potential mediators of vaccination decisions to increase the effectiveness of health communication. In reference to a definition of evidence-based medicine, a great future challenge lies in evidence-based public health communication based on interdisciplinary research involving public health, medical research, communication science and psychology.


Author(s):  
Lorenzo Mosca

This article focuses on the political use of the Internet by the Italian Global Justice Movement (GJM) considering both the organisations and the individuals involved in the movement. First, a definition of the concept ‘political use of the internet’ and its operationalization is provided. Second, light is shed on how the internet is used politically by participants in social movements taking into account their organizational and participatory experiences. Data were gathered with quantitative and qualitative instruments during different researches: a survey of participants in a demonstration against the ‘Bolkestein’ directive and a series of interviews with representatives of different social movement families of the Italian GJM, complemented by a qualitative website analysis of the same organisations. While quantitative data allows for controlling relations among variables concerning the political use of the internet by individuals, qualitative data provides more detailed information on internet use in the everyday life of activists and organisations.


2012 ◽  
Vol 2 (2) ◽  
pp. 6-17
Author(s):  
Amanbir kaur Chahal ◽  
Gurpreet Singh

In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process outsourcing (BPO) is a more comprehensive definition of the current situation within the outsourcing domain. BPO has become increasingly interesting as more and more business processes are commoditized and thus easier to be hosted by an external party. Cloud Computing has all the attributes and potential to support a global BPO environment. These attribute are: virtualization, service oriented architecture (SOA), utility based pricing and grid computing. Cloud Computing involves the movement of IT services . application, infrastructure and platform . onto the Internet and deployment models. Because of the high availability, high bandwidth and the increased use of the Internet it has become easier to access a variety of services, traditionally originating from within a company.s data center.


2020 ◽  
Vol 11 (1) ◽  
pp. 67-75
Author(s):  
Valerio Ferro Allodola

Moving from the definition of fake news and its application to the first studies in the field, especially in the Italian context, this paper aims at reflecting on violent forms of online and offline dialogue today, also referring to the recent spread of Covid-19, an extremely complex situation in which we have been able to “touch closely” the importance of having access to true and reliable information to adopt adequate health behaviors. At the same time, this contribution intends to examine how to promote users’ awareness of responsible use of the internet and their resilience through Media Literacy, by referring to national and international training initiatives, studies and research on the topic.


Sign in / Sign up

Export Citation Format

Share Document