Results 61 to 70 of about 17,274 (278)
ABSTRACT The article examines post‐Stalinist Soviet expertise on girls’ education and upbringing, analysing texts for and about female adolescents created by specialists in pedagogical sciences, psychology, sociology, medicine as well as children's writers and journalists from different parts of the Union, including national republics. The text focuses
Ella Rossman
wiley +1 more source
ENHANCING ORGANIZATIONAL AND LEGAL SUPPORT IN CONTEMPORARY COUNTERTERRORISM EFFORTS
The article draws on the previous research and delves into the nuances of the organizational and legal support of countering terrorism as a component of the national security system in Ukraine. With a focus on contemporary challenges, the article aims
Oksana Markieieva +1 more
doaj +1 more source
The use and effectiveness of migration controls as a counter-terrorism instrument in the European Union [PDF]
This article examines the use and effectiveness of migration controls as an instrument to fight terrorism in the European Union (EU). It examines the evolution of the role of migration controls in the EU counter-terrorism policy, through an analysis of ...
Leonard, Sarah
core +1 more source
ABSTRACT A new archive of oral history interviews from LGBTQIA‐identified alumni, faculty and staff reveals the complex ways that queer and transgender students understood, experienced and remembered the long transition from single‐sex to coeducation at Princeton University.
Ezelle Sanford III +2 more
wiley +1 more source
Aspects of prioritizing preventive policy in combating money laundering crimes under Law No. 23-01
The phenomenon of money laundering is considered one of the phenomena of human behavior that is characterized by complexity and danger, due to the threats it poses to the security, safety and interests of individuals and societies in all its forms.
Nacer Douaidi
doaj +1 more source
Abstract While many African cities, such as Nairobi, fared comparatively well during the pandemic years, urban residents still faced compounded uncertainties and an unequal distribution of burdens that were infrastructurally co‐mediated, for example, within and through place‐specific waterscapes and their socio‐technical infrastructures.
Moritz Kasper +2 more
wiley +1 more source
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley +1 more source
Cryptocurrency technology revolution: are Bitcoin prices and terrorist attacks related? [PDF]
Song Y, Chen B, Wang XY.
europepmc +1 more source
Bound by blood and bloodshed: Sibling ties and participation in genocidal violence
Abstract Focusing on the 1994 genocide in Rwanda, we examine how sibling relationships—one of the most salient familial bonds—influence individual engagement in violence during mass atrocity. Drawing on an adaptation of differential association and social learning theories for contexts of mass atrocity, we analyze a novel dataset linking over 300,000 ...
Jack G. R. Wippell +3 more
wiley +1 more source
FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE
The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology.
Mykola Bunchuk
doaj

