WorldWideScience

Sample records for terrorist networks money

  1. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  2. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  3. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  4. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  5. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  6. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  7. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  8. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  9. The EU Legislative Framework Against Money Laundering and Terrorist Finance:A Critical Analysis in the Light of Evolving Global Standards

    OpenAIRE

    Gilmore, William; Mitsilegas, Valsamis

    2007-01-01

    This article examines the evolution of the EU anti-money laundering legislative framework (which in recent years has also included measures to counter terrorist finance), by focusing in particular on recent legislation such as the third money laundering Directive and the Regulation on controls of cash entering the EU, both adopted in 2005. The analysis highlights the relationship between these instruments and international initiatives in the field (in particular FATF standards), and addresses...

  10. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  11. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  12. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  13. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  14. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  15. The global anti-money laundering regime: an assessment of effectiveness

    OpenAIRE

    Ramírez Vásquez, Daniel

    2017-01-01

    Money laundering is the most commonly occurring form of financial crime -- This has been facilitated by the presence of diverse technology that has made money laundering easier -- Globally, money laundering is a major concern since it is linked to terrorist financing and corruption of the financial systems -- In response, the international community has strengthened the AML/CFT structures following the terrorist act in the Unites States in September 2011 -- The thesis presents an analysis of ...

  16. Money Laundering and its Regulation

    OpenAIRE

    Alberto E. Chong; Florencio López-de-Silanes

    2007-01-01

    The recent wave of terrorist attacks has increased the attention paid to money laundering activities. Using several methodologies, this paper investigates empirically the determinants of money laundering and its regulation in over 80 countries by assembling a cross-country dataset on proxies for money laundering and the prevalence of feeding activities. The paper additionally constructs specific money laundering regulation indices based on available information on laws and their mechanisms of...

  17. Liquidity and Counterparty Risks Tradeoff in Money Market Networks

    NARCIS (Netherlands)

    Leon Rincon, C.E.; Sarmiento, M.

    2016-01-01

    We examine how liquidity is exchanged in different types of Colombian money market networks (i.e. secured, unsecured, and central bank’s repo networks). Our examination first measures and analyzes the centralization of money market networks. Afterwards, based on a simple network optimization problem

  18. Designing Supervision under the preventive Anti-money laundering policy in the European Union

    OpenAIRE

    van den Broek, Melissa

    2014-01-01

    Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing is currently one of the main instruments which regulates efforts to combat money laundering (and terrorist financing) in the European Union. Respecting national procedural autonomy, this directive leaves a high degree of freedom for the Member States in designing their own supervisory architectures under the preventive anti-money laundering policy. This contrib...

  19. The role of social networks for combating money laundering

    NARCIS (Netherlands)

    Imanpour, M.

    2017-01-01

    Money laundering is the disguising of the illegal origin of money by bringing it back into the legal financial circuit. Therefore, in this dissertation I try to establish a theoretical framework to understand the role of social networks, and the link between criminals and legal actors in the money

  20. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  1. Bitcoin as cash in terms of the european anti-money laundering directive

    NARCIS (Netherlands)

    Kaiser, Carolin

    2016-01-01

    The European Anti-Money Laundering Directive 2015/849 sets out detailed rules for the prevention of money laundering and terrorist financing. It presents a clear framework for financial institutions, covering both cash and electronic payments systems. However, the directive fails to regulate digital

  2. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  3. 75 FR 60377 - Financial Crimes Enforcement Network; Cross-Border Electronic Transmittals of Funds

    Science.gov (United States)

    2010-09-30

    ... Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and is... regulatory authorities detect, investigate, and prosecute money laundering and other financial crimes by... at national and international levels, to combat money laundering and terrorist financing. See...

  4. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  5. Designing Supervision under the Preventive Anti-Money Laundering Policy in the European Union

    Directory of Open Access Journals (Sweden)

    Melissa van den Broek

    2014-12-01

    Full Text Available Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing is currently one of the main instruments which regulates efforts to combat money laundering (and terrorist financing in the European Union. Respecting national procedural autonomy, this directive leaves a high degree of freedom for the Member States in designing their own supervisory architectures under the preventive anti-money laundering policy. This contribution adopts a systematic approach to the institutional differences between the EU Member States and presents four models of supervision that are currently present in the European Union. It explains the main characteristics of these models, categorises the EU Member States accordingly and analyses the potential strengths and weaknesses of each model, thereby providing a first indication of their effectiveness.

  6. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  7. Anti-Money Laundering and Combating the Financing of Terrorism : Republic of Uganda

    OpenAIRE

    World Bank

    2007-01-01

    This assessment of the anti-money laundering (AML) and combating the financing of terrorism (CFT) regime of Uganda was based on the 2003 Forty Recommendations on Money Laundering and the Nine Special Recommendations on Terrorist Financing of the Financial Action Task Force (FATF) (FATF 40+9), and was prepared using the AML/CFT Methodology of 2004. During the mission, the assessment team me...

  8. 75 FR 36589 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Definitions...

    Science.gov (United States)

    2010-06-28

    ... exempting certain categories of prepaid access products and services posing lower risks of money laundering... potential for the use of prepaid access as a means for furthering money laundering, terrorist financing, and... abuses of terrorist financing, money laundering, and other financial crime. In the course of our...

  9. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  10. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  11. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  12. Regulating Money Laundering and Tax Havens: The Role of Blacklisting

    NARCIS (Netherlands)

    Unger, B.|info:eu-repo/dai/nl/290994926; Ferwerda, J.|info:eu-repo/dai/nl/314405526

    Since ten years, and more so, since September 11, 2001, international organizations such as the IMF, OECD and EU try to combat harmful tax competition, money laundering and terrorist financing. Blacklisting, the naming and shaming of uncooperative countries, was one of the strategies used from the

  13. The Money Laundering Prevention System

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2007-03-01

    Full Text Available The paper presents the money laundering and terrorist financing prevention system in Croatia. The basic concepts are defined, the principles and fundamentals of international regulations analysed, and the regulatory system in Croatia covered by statute and money laundering prevention Regulations is presented, in conjunction with a description of the organisation, remit and international actions of the Money Laundering Prevention Office.The infiltration of dirty money is a crucial problem from national economies. The purchase of shares, of real estate, the establishment of dirty investment funds and the use of the banking system for the embedding of such resources is a danger to the credibility of a whole country, and in particular to the security of the financial and banking system. Croatia has adopted statutory measures aimed at the effective detection and prevention of suspicious financial transactions, in other words the prevention of money laundering.Launderers constantly find new ways, make use of new non-financial channels and expand their activities to real estate, artworks and insurance. Hence it is necessary to keep up with European approaches and recommendations, to strive for further improvement of the laws and the modernisation of the system, and to adopt new regulations harmonised with international standards, particularly with Directive 2005/60/EC.

  14. Anti-money Laundering and Combating the Financing of Terrorism : Pakistan

    OpenAIRE

    World Bank

    2009-01-01

    This assessment of the anti-money laundering (AML) and combating the financing of terrorism (CFT) regime of Pakistan is based on the Forty Recommendations 2003 and the Nine Special Recommendations on Terrorist Financing 2001 of the Financial Action Task Force (FATF), and was prepared using the AML/CFT assessment Methodology 2004, as updated in February 2008. The assessors reviewed the inst...

  15. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  16. The money trail: a new historiography for networks, patronage and scientific careers

    DEFF Research Database (Denmark)

    Andersen, Casper; Bek-Thomsen, Jakob; Kjærgaard, Peter C.

    2012-01-01

    in the nineteenth and twentieth centuries. Drawing on cases and materials relating to a number of scientific fields including electrical engineering, aeronautics, agriculture and palaeontology, the articles examine the continuous role of money in industrial and military patronage, personal connections and networks...

  17. Hour-Glass Neural Network Based Daily Money Flow Estimation for Automatic Teller Machines

    Science.gov (United States)

    Karungaru, Stephen; Akashi, Takuya; Nakano, Miyoko; Fukumi, Minoru

    Monetary transactions using Automated Teller Machines (ATMs) have become a normal part of our daily lives. At ATMs, one can withdraw, send or debit money and even update passbooks among many other possible functions. ATMs are turning the banking sector into a ubiquitous service. However, while the advantages for the ATM users (financial institution customers) are many, the financial institution side faces an uphill task in management and maintaining the cash flow in the ATMs. On one hand, too much money in a rarely used ATM is wasteful, while on the other, insufficient amounts would adversely affect the customers and may result in a lost business opportunity for the financial institution. Therefore, in this paper, we propose a daily cash flow estimation system using neural networks that enables better daily forecasting of the money required at the ATMs. The neural network used in this work is a five layered hour glass shaped structure that achieves fast learning, even for the time series data for which seasonality and trend feature extraction is difficult. Feature extraction is carried out using the Akamatsu Integral and Differential transforms. This work achieves an average estimation accuracy of 92.6%.

  18. The Topology of Danish Interbank Money Flows

    DEFF Research Database (Denmark)

    Rørdam, Kirsten Bonde; Bech, Morten Linnemann

    This paper presents the first topological analysis of Danish money market flows. We analyze the structure of two networks with different types of transactions. The first network is the money market network, which is driven by banks' behavior on the interbank market, the second is the network...

  19. 76 FR 43585 - Bank Secrecy Act Regulations; Definitions and Other Regulations Relating to Money Services...

    Science.gov (United States)

    2011-07-21

    ... more other countries'' is intended to capture the fact that some foreign currencies are used by...'' to include, in part: a currency exchange; an issuer, redeemer, or cashier of travelers' checks... the MSB from being used to facilitate money laundering and the financing of terrorist activities; \\7...

  20. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  1. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  2. Descriptive Analysis and Strategic Options to Defeat Commodity-Based Threat Financing Methodologies Related to Gold

    Science.gov (United States)

    2015-09-01

    auditing firms. 14. SUBJECT TERMS Counter threat finance, commodity-based money laundering , terrorist financing, social network analysis, bright...51 2. Asia/Pacific Group on Money Laundering ................................52 3. Caribbean Financial Action Task Force...53 4. Eurasian Group on Combating Money Laundering and Financing of Terrorism

  3. Increased Anti-Money Laundering Banking Regulations and Terrorism Prosecutions

    Science.gov (United States)

    2013-03-01

    transactions to further terrorist activities do not have to be large to constitute money laundering. The connection between questions 1 and 7 is more...2005 1:05-cr-00059-DC USA v. Vincent Nafta Petroleum Company Limited 92 2005 1:05-cr-00059-DC USA v. Vincent Mednafta Trading Company Limited 93...00059-DC USA v. Vincent Nafta Petroleum Company Limited No No No No No No No 1:05-cr- 00059-DC USA v. Vincent Mednafta Trading Company

  4. 75 FR 75593 - Financial Crimes Enforcement Network; Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\3\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA...

  5. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  6. 75 FR 6560 - Financial Crimes Enforcement Network; Expansion of Special Information Sharing Procedures To...

    Science.gov (United States)

    2010-02-10

    ...; Expansion of Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity AGENCY... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter...-5332, to promote the prevention, detection, and prosecution of international money laundering and the...

  7. Terrorist Networks, Money Laundering Schemes, and Nation Stability

    Science.gov (United States)

    2010-06-01

    Stabilization Initiative  $106,400,000.00 to recon/stab  Seven countries per fiscal year  American Academy of Actuaries insured losses (relatively...Indicators  Political Instability Task Force Report  Mathematical Model (Linear Program Optimization)  Develop a value system (utility theory) to...deeper ahead. 47 LIST OF REFERENCES American Academy of Actuaries (Finance Data). Retrieved September 20, 2009, from, http://www.actuary.org

  8. Transnational Challenges and U.S. National Security: Defining and Prioritizing Borderless Threats

    Science.gov (United States)

    2017-11-01

    gangs; piracy; money laundering , fraud, and extortion; illicit networks; intellectual property theft Terrorism / Violent Extremism The use of...example: Terrorist organizations can conduct business with criminal organizations to raise money for their cause. One area in which this can happen is

  9. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  10. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  11. Money Laundering Detection Framework to Link the Disparate and Evolving Schemes

    Directory of Open Access Journals (Sweden)

    Murad Mehmet

    2013-09-01

    Full Text Available Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing to detect money laundering. Our framework captures an ongoing single scheme as an event, and associations among such ongoing sequence of events to capture complex relationships among evolving money laundering schemes. The framework can detect associated multiple money laundering networks even in the absence of some evidence. We validated the accuracy of detecting evolving money laundering schemes using a multi-phases test methodology. Our test used data generated from real-life cases, and extrapolated to generate more data from real-life schemes generator that we implemented.

  12. Private Electronic Money, Fiat Money and the Payments System

    OpenAIRE

    Andrew B. Whinston; Paula Hernandez-Verme; Haibo Huang

    2004-01-01

    Temzelides and Williamson (2001) provides valuable contribution into the private money literature, however, as pointed out by Schreft (2001), while the model provides insight about historical experiences with private paper monies, it does not provide a clear insight on how a modern system of private electronic money would work and how the necessary network shall function. Our target of this paper is to fill in that gap. We present a model with two types of private electronic currencies with o...

  13. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  14. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  15. Agent-based approach for generation of a money-centered star network

    Science.gov (United States)

    Yang, Jae-Suk; Kwon, Okyu; Jung, Woo-Sung; Kim, In-mook

    2008-09-01

    The history of trade is a progression from a pure barter system. A medium of exchange emerges autonomously in the market, a position currently occupied by money. We investigate an agent-based computational economics model consisting of interacting agents considering distinguishable properties of commodities which represent salability. We also analyze the properties of the commodity network using a spanning tree. We find that the “storage fee” is more crucial than “demand” in determining which commodity is used as a medium of exchange.

  16. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  17. Networks model of the East Turkistan terrorism

    Science.gov (United States)

    Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo

    2015-02-01

    The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.

  18. Practical Algorithms for Subgroup Detection in Covert Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Wiil, Uffe Kock; Qureshi, Pir Abdul Rasool

    2010-01-01

    In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations...... and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, funds transfer, etc. The findings are represented by a network in the form of an Attributed Relational Graph (ARG). Paths from a node to any other node in the network indicate...

  19. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  20. The Meaning of Money Revisited: Workers' View.

    Science.gov (United States)

    Tang, Thomas Li-Ping

    Money has significant impacts on people's motivation and their work-related behavior in organizations. This study was conducted to develop the Money Ethic Scale (MES) and to examine the initial nomological network of the scale. A 25-page questionnaire on attitudes toward money was distributed to 1,200 subjects, including students and faculty of a…

  1. Money Laundering Detection Framework to Link the Disparate and Evolving Schemes

    OpenAIRE

    Murad Mehmet; Miguel Fuentes Buchholtz

    2013-01-01

    Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of...

  2. 31 CFR 103.100 - Information sharing between Federal law enforcement agencies and financial institutions.

    Science.gov (United States)

    2010-07-01

    ... FOREIGN TRANSACTIONS Special Information Sharing Procedures To Deter Money Laundering and Terrorist... money laundering—(1) In general. A law enforcement agency investigating terrorist activity or money... suspected based on credible evidence of engaging in, terrorist activity or money laundering; include enough...

  3. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  4. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  5. A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

    Directory of Open Access Journals (Sweden)

    Dhiman Chowdhury

    2018-05-01

    Full Text Available During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot communicate with each other and also the terrorists cannot go through the ongoing apprehensive operation via wireless communications. This paper presents a novel framework of an unmanned aerial vehicular networking signal jammer which is oriented to block incoming and outgoing signals of all frequencies transmitted from a specifically marginalized territory scanned and explored by the aerial vehicle. During such a cyber-vigilance operation, the aerial vehicle is equipped with a transmitter and an auto-tuning band-pass filter module with automatic regulation of center frequencies according to the surrounding networking signals, which are considered to be the suppressing noise parameters. In order to restrict the signal blocking operation within the militant hub, the aerial vehicle with the network terminator is controlled to navigate within a particular boundary of a residential area and its navigation is continuously mapped and stored for effective evacuation process directed to save the innocent stranded people. A very low frequency (VLF metal detector has been designed to trace the explosives and buried landmines inside the exploration arena. An algorithm for 3-D mapping of the metal traces detected by the aerial navigator has been presented in this paper. Signal blocking, metal tracing and stable confined movements have been tested where the testbed is provided with signals of different frequencies along with variation in dimensions of the testing region to evaluate the reliability of the proposed framework.

  6. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  7. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  8. Department of Treasury Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... from the abuses of terrorist financing, money laundering, and other financial crime. The proposed... money laundering, terrorist financing, and other illicit transactions through the financial system. This... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...

  9. 75 FR 79837 - Semiannual Agenda and Fiscal Year 2011 Regulatory Plan

    Science.gov (United States)

    2010-12-20

    .... financial system from the abuses of terrorist financing, money laundering, and other financial crime. The... furthering money laundering, terrorist financing, and other illicit transactions through the financial system... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...

  10. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  11. 77 FR 7998 - Semiannual Agenda and Fiscal Year 2012 Regulatory Plan

    Science.gov (United States)

    2012-02-13

    ... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...

  12. 75 FR 21867 - Semiannual Agenda

    Science.gov (United States)

    2010-04-26

    ... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...

  13. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  14. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  15. Predicate Offences of Money Laundering and Anti Money Laundering Practices in Bangladesh Among South Asian Countries

    Directory of Open Access Journals (Sweden)

    Islam Mohammad Saiful

    2017-12-01

    Full Text Available The purpose of the study is to identify the main reasons of money laundering in Bangladesh among the twenty seven predicate offences of money laundering prescribed by Bangladesh Bank and position of Bangladesh among South Asian Countries regarding anti-money laundering practices. Besides, an anti-money laundering model has been developed to combat against money laundering as 14 percent bankers think that only existing know your customer form and transaction profile of banking sector are not enough to detect money laundering. To conduct the study, 91 bankers have been surveyed to take response through structured questionnaire regarding their opinion about the predicate offences of money laundering and sufficiency of existing KYC form of banking sector to detect money laundering. From the responses, factor analysis, test of hypothesis, correlation and regression analysis have been conducted using SPSS software. The study identifies that predicate offences of money laundering can be minimized mainly through scrutinizing the activities of local criminals with foreign network and strict anti-corruption measures through automation in National Board of Revenue, strict policy adoption of criminal detection and support from foreign experts. Besides, regression model shows that only six predicate offences of money laundering explains 87.2 percent of money laundering that should get more emphasize to combat against money laundering. From the comparative analysis, it has been found that Bangladesh in holding better position just after India among six South Asian Countries according to Basel AML Index score. This study provides a complete understanding of the position of Bangladesh in case of money laundering and anti-money laundering practices. The integration of four domains, i.e. AML model development, factor analysis, econometric analysis and comparative analysis of AML index will provide insights to managers and policy makers about the money laundering

  16. How the science of complex networks can help developing strategies against terrorism

    International Nuclear Information System (INIS)

    Latora, Vito; Marchiori, Massimo

    2004-01-01

    A new method, based on a recently defined centrality measure, allows to spot the critical components of a generic complex network. The identification and protection of the critical components of a given communication-transportation network should be the first concern in order to reduce the consequences of terrorist attacks. On the other hand, the critical components of a terrorist organization are the terrorists to target to disrupt the organization and reduce the possibility of terroristic attacks

  17. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  18. Bankrupting terrorism: the role of US anti-terrorism litigation in the prevention of terrorism and other hybrid threats: a legal assessment and outlook

    OpenAIRE

    Bachmann, Sascha

    2012-01-01

    Global terrorist networks are dependent on receiving financial support from a variety of sources, including individuals, charities and corporations. Also known as terrorist financing, the potential of terrorism finance to resemble a global threat has been recognised and also its closeness to other international crimes such as money laundering and organized crime. As a result, possible responses have to constitute co-ordinated, multi-lateral and multi faceted actions under the umbrella of a wi...

  19. Debate: Money, Money, Money

    Directory of Open Access Journals (Sweden)

    Nina Ilona Ellinger

    2014-09-01

    Full Text Available The question: ‘What would be the best way to use ten million dollars?’ leads to many other questions when related to anti-trafficking work. What should the money be spent on? Who should be appointed to spend the money? And, perhaps most importantly, who should be the beneficiaries? In other words, are the ten million dollars to prevent trafficking of people meant for activities to stop smuggling of people, to stop unwanted migrants, or to protect and uphold people’s rights when they move across borders and need to be protected from trafficking? Would the money be best spent on anti-trafficking work, or would it be better spent on strengthening the rights of all migrants to minimise the risk of trafficking?

  20. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  1. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  2. Endogenous Money Supply and Money Demand

    OpenAIRE

    Woon Gyu Choi; Seonghwan Oh

    2000-01-01

    This paper explores the behavior of money demand by explicitly accounting for the money supply endogeneity arising from endogenous monetary policy and financial innovations. Our theoretical analysis indicates that money supply factors matter in the money demand function when the money supply partially responds to money demand. Our empirical results with U.S. data provide strong evidence for the relevance of the policy stance to the demand for MI under a regime in which monetary policy is subs...

  3. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  4. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  5. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  6. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  7. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  8. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  9. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  10. Saving Money or Spending Tomorrow's Money

    Institute of Scientific and Technical Information of China (English)

    罗芳梅

    2017-01-01

    Chinese are normally believed to be thrifty.However,economic development has had a tremendous impact upon Chinese society,uprooting the long-engraved ideas.With the emergence of the credit cards,spending tomorrow's money becomes a reality.In this way,people are in dilemma:saving money or spending tomorrow's money.Firstly,this paper focuses on the benefits of spending tomorrow's money.Secondly,it shows that spending tomorrow's money is confronted with many challenges.Finally,the paper comes up with some suggestions to solve these problems.

  11. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  12. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  13. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  14. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  15. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  16. Undermining and Strengthening Social Networks through Network Modification

    Science.gov (United States)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  17. 78 FR 12420 - Submission for OMB Review; Comment Request

    Science.gov (United States)

    2013-02-22

    ... of Special Information Sharing Procedures to Deter Money Laundering and Terrorist Activity. Abstract... efficiency and effectiveness of its anti-money laundering and counter- terrorist financing policies. Affected...

  18. 78 FR 65764 - Information Collection Proposed Renewal Without Change; Comment Request; Anti-Money Laundering...

    Science.gov (United States)

    2013-11-01

    ... Renewal Without Change; Comment Request; Anti-Money Laundering Programs; Due Diligence Programs for... policies, procedures, and controls reasonably designed to detect and report money laundering through... Enforcement Network, P.O. Box 39, Vienna, VA 22183, Attention: Comments on Anti-Money Laundering Program and...

  19. 76 FR 40114 - Semiannual Agenda

    Science.gov (United States)

    2011-07-07

    ... abuses of terrorist financing, money laundering, and other financial crime. The proposed changes are... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN... Money Services Businesses to include stored value or prepaid access. In this proposed rulemaking, we are...

  20. 31 CFR 103.16 - Reports by insurance companies of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ..., such as terrorist financing or ongoing money laundering schemes, the insurance company shall... fraudulent submission relates to money laundering or terrorist financing. (e) Retention of records. An... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by insurance companies of...

  1. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  2. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  3. 76 FR 45403 - Bank Secrecy Act Regulations-Definitions and Other Regulations Relating to Prepaid Access

    Science.gov (United States)

    2011-07-29

    ... prepaid access products and services posing lower risks of money laundering and terrorist financing from... exceptions to: (1) Establish written anti-money laundering (AML) programs that are reasonably designed to prevent the MSB from being used to facilitate money laundering and the financing of terrorist activities...

  4. 31 CFR 103.110 - Voluntary information sharing among financial institutions.

    Science.gov (United States)

    2010-07-01

    ... Information Sharing Procedures To Deter Money Laundering and Terrorist Activity § 103.110 Voluntary.... 5312(a)(2) that is required under this part to establish and maintain an anti-money laundering program... suspects may involve possible terrorist activity or money laundering. (2) Notice requirement. A financial...

  5. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  6. On the frontline against money-laundering: the regulatory minefield

    OpenAIRE

    Gelemerova , Liliya

    2008-01-01

    Abstract Intelligence gathering plays a vital role in the `war? against money laundering. Particularly important in this intelligence gathering process is the global network of Financial Intelligence Units (FIUs) fed by a host of auxiliary (primarily financial) institutions required to report suspicious transactions. This paper briefly reviews the history of the international system of anti-money laundering measures imposed on the financial industry and other regulated businesses, ...

  7. Saving Money and Time with Virtual Server

    CERN Document Server

    Sanders, Chris

    2006-01-01

    Microsoft Virtual Server 2005 consistently proves to be worth its weight in gold, with new implementations thought up every day. With this product now a free download from Microsoft, scores of new users are able to experience what the power of virtualization can do for their networks. This guide is aimed at network administrators who are interested in ways that Virtual Server 2005 can be implemented in their organizations in order to save money and increase network productivity. It contains information on setting up a virtual network, virtual consolidation, virtual security, virtual honeypo

  8. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  9. A networks analysis of terrorism in Africa: implications for Kenya

    Directory of Open Access Journals (Sweden)

    Steven Kigen Morumbasi

    2016-12-01

    Full Text Available This paper highlights the challenges that the international community faces in responding to the terrorists and the need to change tactics to respond more effectively to an increasingly nebulous enemy. Terrorism can take different forms and is perpetrated by both state and non-state actors. This research looks into the network structure of terrorism and terrorist groups. In the contemporary setting, terrorist organizations operate transnationally hence the use of the term ‘terrorism without borders’. An enabling factor of terrorism today is the network structure that it has adopted which gives it the ability to both project its reach and prevent easy infiltration. The network structure has also brought about renewed interests in Africa, where global terror networks such as al-Qaeda and the Islamic State compete for influence. Boko Haram in West Africa is an affiliate of the Islamic State and this provides possible linkages with the Islamic State in Libya. Boko Haram refers to itself as the Islamic State’s Western Province. Al-Shabaab has dominated headlines by carrying out deadly attacks in East Africa. The al-Qaeda affiliate has however faced resistance from a section of its members who seek ties with the Islamic State. This resulted in the formation of Jabha East Africa, a group that aligns itself to the Islamic State. The Sinai Peninsula has also witnessed an upsurge of terror attacks perpetrated by the Sinai Province, which views itself as a province of the Islamic State. This surmounts to a complex network structure of terrorist networks in Africa and the growing threat to militant Islam. The special attention is paid to analysis of terrorist challenges in Kenia.

  10. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  11. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  12. Making Money from Making Money

    OpenAIRE

    Macfarlane, Laurie; Ryan-Collins, Josh; Bjerg, Ole; Nielsen, Rasmus; McCann, Duncan

    2017-01-01

    Who has control over the supply of new money and what benefits does it bring? There is now widespread acceptance that in modern economies, commercial banks, rather than the central bank or state, create the majority of the money supply. This report examines ‘seigniorage’ – the profits that are generated through the creation of money. We show that in the UK, commercial bank seigniorage profits amount to a hidden annual subsidy of £23 billion, representing 73% of banks’ profits after prov...

  13. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  14. Making Money from Making Money

    DEFF Research Database (Denmark)

    Macfarlane, Laurie; Ryan-Collins, Josh; Bjerg, Ole

    Who has control over the supply of new money and what benefits does it bring? There is now widespread acceptance that in modern economies, commercial banks, rather than the central bank or state, create the majority of the money supply. This report examines ‘seigniorage’ – the profits...... that are generated through the creation of money. We show that in the UK, commercial bank seigniorage profits amount to a hidden annual subsidy of £23 billion, representing 73% of banks’ profits after provisions and taxes....

  15. 75 FR 76677 - Financial Crimes Enforcement Network: Anti-Money Laundering Program and Suspicious Activity...

    Science.gov (United States)

    2010-12-09

    ...: Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for Residential... loan or finance companies for the purpose of requiring them to establish anti-money laundering programs...-money laundering program requirements on financial institutions.\\3\\ The authority of the Secretary to...

  16. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  17. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  18. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. TOWARDS THE INVESTIGATION OF USING SOCIAL NETWORK ANALYSIS FOR COUNTER TERRORISM IN WEST AFRICA: CASE STUDY OF BOKO HARAM IN NIGERIA

    Directory of Open Access Journals (Sweden)

    F. OLAJIDE

    2016-11-01

    Full Text Available In this paper, an investigative review of social network analysis (SNA to counter terrorism is presented. Various measures used for predicting key players of terrorist networks are discussed. The methods used for the survey is based on the existing research work that was carried out on counter terrorism of insurgency, for example, 9/11 (2001 attack in the United States. The research papers have shown that the SNA is one of the most efficient and effective methods for understanding terrorist networks. For example, the National security agency has been mapping phone calls ever since the 9/11 event and through this research work, United States have been able to uncover so many hidden terrorist and criminal groups. This paper provides an avenue for a suggestive idea that the Nigerian government can make use of SNA technique by phone mapping. This is based on the fact that Nigeria can combat terrorism in the nation. The Nigerian government can emulate phone mapping technique as Boko Haram terrorists are within the country and they actually make use of phone calls. The government only needs to collaborate with the telecommunication and network providers companies in Nigeria to track down these terrorists. Using SNA to understand/discover terrorist networks in the region is novel.

  20. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  1. Money, morality, and politics in the slums of Buenos Aires

    Directory of Open Access Journals (Sweden)

    Ariel Wilkis

    2016-06-01

    Full Text Available Abstract Studies on the political life of the poor in Latin American have rarely focused on money, although there have been works focused on the survival strategies of the poor; political clientelism; and collective mobilizations. In this article, I analyze political life in the poor neighborhoods of Greater Buenos Aires through the lens of money that circulates within the Peronist networks. I conducted ethnography fieldwork between 2006 and 2010. Does money have a legitimate role in politics? Has the monetization of political activities dissolved values, commitments, and loyalties among the poor? Is this corruption, or is this an ethical exchange among people who lack cash but possess moral capital? Here, I analyze how money becomes necessary to strengthen commitments, loyalties, obligations, expectations, and plans for both leaders and activists. Reconstructing this process can provide a foundation for the revision of place of money in political life.

  2. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  3. How the brain responds to the destruction of money

    DEFF Research Database (Denmark)

    Becchio, Cristina; Skewes, Joshua; Lund, Torben Ellegaard

    2011-01-01

    Is our attitude to money like that to any other tool even though its use is symbolic and is not implemented in its physical structure? Knowledge of the functional use of concrete tools, such as hammers or screwdrivers, has been associated with activation of a left hemisphere network including...... the higher the value of the banknote. This lends plausibility to a genuinely psychological interpretation of the explanation of money as a tool for parametrically symbolizing exchange....

  4. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  5. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  6. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  7. 31 CFR 103.125 - Anti-money laundering programs for money services businesses.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Anti-money laundering programs for... Laundering Programs Anti-Money Laundering Programs § 103.125 Anti-money laundering programs for money..., and maintain an effective anti-money laundering program. An effective anti-money laundering program is...

  8. The Cyber Intelligence Challenge of Asyngnotic Networks

    Directory of Open Access Journals (Sweden)

    Edward M. Roche

    2015-09-01

    Full Text Available The intelligence community is facing a new type of organization, one enabled by the world’s information and communications infrastructure. These asyngnotic networks operate without leadership and are self-organizing in nature. They pose a threat to national security because they are difficult to detect in time for intelligence to provide adequate warning. Social network analysis and link analysis are important tools but can be supplemented by application of neuroscience principles to understand the forces that drive asyngnotic self-organization and triggering of terrorist events. Applying Living Systems Theory (LST to a terrorist attack provides a useful framework to identify hidden asyngnotic networks. There is some antecedent work in propaganda analysis that may help uncover hidden asyngnotic networks, but computerized SIGINT methods face a number of challenges.

  9. Efforts of Controlling Money Laundering of Narcotics Money in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    Khaled A. ALASMARI

    2014-06-01

    Full Text Available Money laundering is a silent crime. Its goal is to cover up the source of large sums of money that criminals often gather from their criminal activities. This paper will analyze the situation of money laundering in narcotics as it applies in Saudi Arabia. To achieve this end, the paper will first define important terms such as money laundering and narcotics. It will then explain the relationship between money laundering, narcotics trade, and terrorism activities. This background information will form the base for analyzing the various efforts that the Saudi Arabia nation has in place for countering money laundering in narcotics trade. The paper will then explain the challenges facing these efforts, and the future of money laundering in Saudi Arabia. The largest criminal activity associated with money laundering is terrorism financing. The several terror attacks associated with Saudi Arabia’s terror groups like Al-Qaida have made the government realize the importance of curbing money laundering in an effort to counter terrorism. Thus, anti-money laundering strategies are set in place to address all the avenues of money laundering.

  10. Does parental job insecurity matter? Money anxiety, money motives, and work motivation.

    Science.gov (United States)

    Lim, Vivien K G; Sng, Qing Si

    2006-09-01

    A structural model focusing on the spillover effect of parental perceived job insecurity on money anxiety was developed and tested. The crossover effect of parents' money anxiety on their children's money anxiety, money motives, and motivation to work was also examined. Data were collected from a sample of undergraduates and their parents. Results of structural equation modeling analyses supported a spillover effect of paternal perceived job insecurity on paternal money anxiety. However, maternal perceived job insecurity was not significantly associated with maternal money anxiety. Results also supported a crossover effect of parental money anxiety on youths' money anxiety. Youths' money anxiety was significantly related to youths' negative money motives. In turn, youths' negative money motives were associated with their intrinsic motivation to work. Implications of the findings are discussed. (c) 2006 APA, all rights reserved

  11. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  12. Discount rates in risk versus money and money versus money tradeoffs.

    Science.gov (United States)

    Alberini, Anna; Chiabai, Aline

    2007-04-01

    We use data from a survey of residents of five Italian cities conducted in late spring 2004 to estimate the discount rates implicit in (1) money versus future risk reductions and (2) money versus money tradeoffs. We find that the mean personal discount rate is 0.3-1.7% in (1) and 8.7% in (2). The latter is lower than the discount rates estimated in comparable situations in many recent studies, greater than market interest rates in Italy at the time, and exhibits modest variation with age and gender. The discount rate implicit in money versus risk tradeoffs is within the range of estimates from studies in the United States and Europe, and does not depend on observable individual characteristics. We use split samples to investigate whether a completely abstract risk reduction - one where the risk reduction delivery has been stripped of all specifics, so that respondents should focus on the risks without being distracted by details - results in WTP and discount figures comparable to those from an identified delivery mechanism (a medical test). We find that while WTP for an immediate risk reduction is 42-73% higher with the abstract risk reduction, the discount rate in the money versus risk tradeoffs and the variance of the error term in the WTP equation are the same across the two variants of the questionnaire.

  13. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  14. 76 FR 72756 - Finding That the Islamic Republic of Iran Is a Jurisdiction of Primary Money Laundering Concern

    Science.gov (United States)

    2011-11-25

    ... Money Laundering Concern AGENCY: The Financial Crimes Enforcement Network (``FinCEN''), Treasury. ACTION... that the Islamic Republic of Iran is a jurisdiction of primary money laundering concern. DATES: The... PATRIOT Act''), Public Law 107-56. Title III of the USA PATRIOT Act amends the anti- money laundering...

  15. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  16. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  17. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  18. Multiplying Money

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2013-05-01

    Full Text Available This article is not a comprehensive factual history of money as an economic instrument. It aims rather to present an essential psychological history of the power of money as a social organization or social technology. It explores the catalytic role of money in the development of society and its ever-increasing capacity for accomplishment in both economic and non-economic fields. This perspective focuses attention on the unutilized potential for harnessing the social power of money for promoting full employment, global development and human welfare. The title ‘multiplying money’ is intended to convey the idea that this untapped potential is exponential in nature. In order to recognize it, some fundamental misconceptions about the nature of money, how it is created and on what it is based need to be examined. This is the second article in a series.

  19. Money laundering

    OpenAIRE

    Kryvosheieva, Ganna

    2017-01-01

    The thesis deals with evaluation of ant-money laundering effectiveness. In theoretical part money laundering, FATF (Financial Ask Task Force) and AML(anti-money laundering) are defined. Practical part concentrates on the biggest scandals of the latest years and assessment of AML effectiveness. Based on this evaluation, weak places in AML mechanisms were identified. Additionally, tools of AML improvement were determined.

  20. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  1. An Apology for Money

    OpenAIRE

    Svozil, Karl

    2008-01-01

    This review is about the convenience, the benefits, as well as the destructive capacities of money. It deals with various aspects of money creation, with its value, and its appropriation. All sorts of money tend to get corrupted by eventually creating too much of them. In the long run, this renders money worthless and deprives people holding it. This misuse of money creation is inevitable and should come as no surprise. Abusive money creation comes in various forms. In the present fiat money ...

  2. A Preliminary Theory of Dark Network Resilience

    Science.gov (United States)

    Bakker, Rene M.; Raab, Jorg; Milward, H. Brinton

    2012-01-01

    A crucial contemporary policy question for governments across the globe is how to cope with international crime and terrorist networks. Many such "dark" networks--that is, networks that operate covertly and illegally--display a remarkable level of resilience when faced with shocks and attacks. Based on an in-depth study of three cases…

  3. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  4. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  5. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  6. Money Markets

    OpenAIRE

    Marvin Goodfriend

    2011-01-01

    Money markets offer monetary services and short-term finance in the capital market with the credit support of institutional sponsors. Investors finance money market instruments at low interest because their salability on short notice confers an implicit monetary services yield. Low interest attracts borrowers to money markets. The fragile equilibrium depends on collective confidence in the credit quality of instruments supplied to the market. Federal Reserve monetary and credit policies have ...

  7. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  8. Money Demand in Latvia

    OpenAIRE

    Ivars Tillers

    2004-01-01

    The econometric analysis of the demand for broad money in Latvia suggests a stable relationship of money demand. The analysis of parameter exogeneity indicates that the equilibrium adjustment is driven solely by the changes in the amount of money. The demand for money in Latvia is characterised by relatively high income elasticity typical for the economy in a monetary expansion phase. Due to stability, close fit of the money demand function and rapid equilibrium adjustment, broad money aggreg...

  9. Wall Street: money never sleeps : Motion picture (2010)

    OpenAIRE

    Lauri Lucente, Gloria; Buhagiar, Celaine

    2011-01-01

    The Social Network : Harvard student Mark Zuckerberg creates the social networking site that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the cofounder who was later squeezed out of the business. Wall Street: money never sleeps : Now out of prison but still disgraced by his peers, Gordon Gekko works his future son-in-law, an idealistic stock broker, when he sees an opportunity to take down a Wall Street enemy and rebuild his empire.

  10. A preliminary theory of dark network resilience

    NARCIS (Netherlands)

    Bakker, R.M.; Raab, J.; Milward, H.B.

    2012-01-01

    A crucial contemporary policy question for governments across the globe is how to cope with international crime and terrorist networks. Many such “dark” networks—that is, networks that operate covertly and illegally—display a remarkable level of resilience when faced with shocks and attacks. Based

  11. Big Money: The Effect of Money Size on Value Perceptions and Saving Motivation.

    Science.gov (United States)

    Peetz, Johanna; Soliman, Monica

    2016-01-28

    Motivated perception has been shown to affect people's estimates of money (e.g., perceiving coins as larger than real size). In the present research, we examine whether simply varying the size of a picture of money can affect its perceived value and subsequent decisions. Participants presented with a picture of money enlarged by 15% perceived the depicted money as more valuable compared with those seeing a real-size picture (Study 1). When told to imagine their own cash and banked money in the depicted form, participants presented with a picture enlarged by 15% felt more subjectively wealthy and reported fewer intentions to conserve their money compared with those seeing a real-size picture of the same money (Study 2). Together, these studies suggest that judgments about money and even attitudes toward personal spending can be influenced by manipulating the size of a picture of money. © The Author(s) 2016.

  12. Money and sociality: Measuring the unmeasurable money as justice, time and usury

    Directory of Open Access Journals (Sweden)

    Janković Zoran

    2016-01-01

    Full Text Available Levinas confirms: a reflection about a money as a social and economical reality is not possible without a serious analysis of empirical data. On the other hand, this reflection always involves something else, so a money is never a merely economical category. In that sense, Levinas proposes an intriguing meditation about some “dimensions” of a money in the western tradition. Contrary to the traditional moral condemnation of a money - which however remains unquestionable because of the fact that a man always carries a risk of becoming a merchandise - Levinas suggests that money never simply means a reification, but always implies some positive dimensions. Levinas suggests that a money is not something morally bad or simply neutral covering human relationships, but rather a condition of human community. Furthermore, he claims that a money is a fundament of the justice. A money makes possible a community, he explains, because it opens up the dimension of the future, and implies the existence of human beings who give themselves a credit; a credit understood as a time and a confidence. We shall try to address some problems implied by this thesis, particularly the problem of the relationship between time, money and credit. Finally, we are going to ask whether this cred­it - inseparable from the very essence of the money - is not always already a sort of usury.

  13. Analysis of world terror networks from the reduced Google matrix of Wikipedia

    Science.gov (United States)

    El Zant, Samer; Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2018-01-01

    We apply the reduced Google matrix method to analyze interactions between 95 terrorist groups and determine their relationships and influence on 64 world countries. This is done on the basis of the Google matrix of the English Wikipedia (2017) composed of 5 416 537 articles which accumulate a great part of global human knowledge. The reduced Google matrix takes into account the direct and hidden links between a selection of 159 nodes (articles) appearing due to all paths of a random surfer moving over the whole network. As a result we obtain the network structure of terrorist groups and their relations with selected countries including hidden indirect links. Using the sensitivity of PageRank to a weight variation of specific links we determine the geopolitical sensitivity and influence of specific terrorist groups on world countries. The world maps of the sensitivity of various countries to influence of specific terrorist groups are obtained. We argue that this approach can find useful application for more extensive and detailed data bases analysis.

  14. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  15. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  16. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  17. When Love Meets Money: Priming the Possession of Money Influences Mating Strategies.

    Science.gov (United States)

    Li, Yi Ming; Li, Jian; Chan, Darius K-S; Zhang, Bo

    2016-01-01

    Money is an important factor that influences the development of romantic relationships. The current paper examines how the feeling of having relatively more or less money influences human mating strategies in long-term and short-term mating contexts under the framework of evolutionary psychology. We recruited mainland Chinese college students involved in steady, heterosexual romantic relationships to participate in two experiments. In each study, we experimentally triggered participants' feelings of having relatively more or less money and then examined their thoughts and behaviors related to mating. Results of Study 1 showed that men who were primed to feel that they had relatively more money were less satisfied with their partners' physical attractiveness than those primed to feel that they had less money, suggesting that the subjective feeling of having more or less money may affect men's preferences regarding the physical appearance of a mate in a long-term relationship. Interestingly, this difference was not significant for women. Results of Study 2 indicated that both men and women who were primed to feel that they had relatively more money exhibited a greater "behavioral approach tendency" toward an attractive member of the opposite sex than those primed to feel that they had less money. This finding suggests that people who feel they have relatively more money may have more interest in an attractive alternative than those who feel they have relatively less money. The differences in mating strategies between and within the genders brought about by money support the evolutionary hypothesis that individuals adopt conditional mating strategies in response to environmental conditions. Additionally, the results of experimental studies provide evidence for the causal effects of money on mating strategies. These findings have both conceptual and practical implications for the psychology of evolution and romantic relationships.

  18. When Love Meets Money: Priming the Possession of Money Influences Mating Strategies

    Science.gov (United States)

    Li, Yi Ming; Li, Jian; Chan, Darius K.-S.; Zhang, Bo

    2016-01-01

    Money is an important factor that influences the development of romantic relationships. The current paper examines how the feeling of having relatively more or less money influences human mating strategies in long-term and short-term mating contexts under the framework of evolutionary psychology. We recruited mainland Chinese college students involved in steady, heterosexual romantic relationships to participate in two experiments. In each study, we experimentally triggered participants' feelings of having relatively more or less money and then examined their thoughts and behaviors related to mating. Results of Study 1 showed that men who were primed to feel that they had relatively more money were less satisfied with their partners' physical attractiveness than those primed to feel that they had less money, suggesting that the subjective feeling of having more or less money may affect men's preferences regarding the physical appearance of a mate in a long-term relationship. Interestingly, this difference was not significant for women. Results of Study 2 indicated that both men and women who were primed to feel that they had relatively more money exhibited a greater “behavioral approach tendency” toward an attractive member of the opposite sex than those primed to feel that they had less money. This finding suggests that people who feel they have relatively more money may have more interest in an attractive alternative than those who feel they have relatively less money. The differences in mating strategies between and within the genders brought about by money support the evolutionary hypothesis that individuals adopt conditional mating strategies in response to environmental conditions. Additionally, the results of experimental studies provide evidence for the causal effects of money on mating strategies. These findings have both conceptual and practical implications for the psychology of evolution and romantic relationships. PMID:27047415

  19. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  20. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  1. The Meaning of Money Revisited: The Development of the Money Ethic Scale.

    Science.gov (United States)

    Tang, Thomas Li-Ping

    Despite the fact that money is important in everyday life, there is a dearth of empirical material and research concerning the meaning of money and people's attitudes towards money in the psychological literature. This study examined the underlying concepts or beliefs people hold about money and the extent to which different needs can be fulfilled…

  2. When Does Money Make Money More Important? Survey and Experimental Evidence

    OpenAIRE

    Sanford E. DeVoe; Jeffrey Pfeffer; Byron Y. Lee

    2013-01-01

    The authors investigate how the amount and source of income affects the importance placed on money. Using a longitudinal analysis of the British Household Panel Survey and evidence from two laboratory experiments, they found that larger amounts of money received for labor were associated with individuals placing greater importance on money; but this effect did not hold for money not related to work. The longitudinal survey analysis demonstrated these differential effects of the source of inco...

  3. Money demand elasticity, effective money supply and money market disequilibrium: ¡°China¡¯s Puzzle¡± and long-term excessive liquidity

    OpenAIRE

    LI Zhiguo

    2008-01-01

    Chinese excessive liquidity problems are more serious than other main countries. The upgrading industrial structure and the increasing opening degree lead to the excessive money demand and higher money demand elasticity. Bad credits weaken money supply effectiveness and lead to illusive increasing money. We set up the money market disequilibrium model under the condition of the excessive liquidity. The imbalance between money demand and money supply is the key of Chinese excessive liquidity p...

  4. المعالجة التشريعية لمكافحة غسل الأموال و تمويل الإرهاب في سوق الأوراق المالية (دراسة مقارنة

    Directory of Open Access Journals (Sweden)

    سماح حسين علي

    2017-03-01

    Full Text Available The process of money laundering and terrorist financing in the stock market of illegal practices that have contributed to a number of factors for its location, but the seriousness of dealing in the stock market and to prevent the exploitation of this activity, or to exploit licensed to work in those who are in contact with customers We find that the anti-money laundering and terrorist financing in the stock market legislation committed these authorities to take a number of requirements to Anti- money laundering and terrorist financing. This came to our search marked (legislative treatment to Anti- money laundering and terrorist financing in the stock market As comparative study with all of the US legislation, which became aware of the seriousness of the funds and the financing of terrorism wash after the events / 11 / September / 2001 and which resulted in the issuance of (PATRIOT ACT 2001 , and the legislation of Kuwait of the instructions of the Capital Markets Authority (2 for the year 2015 on anti-money laundering and the financing of terrorism, for the purpose of shedding light on the position of this legislation, and compare it with what is happening in Iraq Stock Exchange.

  5. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  6. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  7. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  8. Designing New Money

    DEFF Research Database (Denmark)

    Bjerg, Ole

    The prospect of central banks issuing digital currency (CBDC) immediately raises the question of how this new form of money should co-exist and interact with exist-ing forms of money. This paper evaluates three different scenarios for the imple-mentation of CBDC in terms of their monetary policy...... simultaneously only pursue two out of the following three policy objectives: Free convertibility between CBDC and bank money, parity between CBDC and bank money, and central bank monetary sovereignty, which is the use of monetary policy for anything else than support for commercial bank credit creation...

  9. When Love Meets Money: Priming the Possession of Money Influences Mating Strategies

    Directory of Open Access Journals (Sweden)

    Yi Ming eLi

    2016-03-01

    Full Text Available Money is an important factor that influences the development of romantic relationships. The current paper examines how the feeling of having relatively more or less money influences human mating strategies in long-term and short-term mating contexts under the framework of evolutionary psychology. We recruited mainland Chinese college students involved in steady, heterosexual romantic relationships to participate in two experiments. In each study, we experimentally triggered participants’ feelings of having relatively more or less money and then examined their thoughts and behaviors related to mating. Results of Study 1 showed that men who were primed to feel that they had relatively more money were less satisfied with their partners’ physical attractiveness than those primed to feel that they had less money, suggesting that the subjective feeling of having more or less money may affect men’s preferences regarding the physical appearance of a mate in a long-term relationship. Interestingly, this difference was not significant for women. Results of Study 2 indicated that both men and women who were primed to feel that they had relatively more money exhibited a greater behavioral approach tendency toward an attractive member of the opposite sex than those primed to feel that they had less money. This finding suggests that people who feel they have relatively more money may have more interest in an attractive alternative than those who feel they have relatively less money. The differences in mating strategies between and within the genders brought about by money support the evolutionary hypothesis that individuals adopt conditional mating strategies in response to environmental conditions. These findings have both conceptual and practical implications for the psychology of evolution and romantic relationships.

  10. World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism

    Science.gov (United States)

    2008-12-01

    disgruntled with the amount of money he was paid and eventually quit. To con- tinue the anthrax work, al Qaeda then hired a Malaysian terrorist, Yazid...and by not stopping Chinese entities from supporting Pakistan’s strategic programs. At present, all three are expanding their nuclear arsenals with no...attack occur. Serious consideration should be given to harnessing the existing distribution networks of large retail stores and forging effective

  11. Characterizing and predicting the robustness of power-law networks

    International Nuclear Information System (INIS)

    LaRocca, Sarah; Guikema, Seth D.

    2015-01-01

    Power-law networks such as the Internet, terrorist cells, species relationships, and cellular metabolic interactions are susceptible to node failures, yet maintaining network connectivity is essential for network functionality. Disconnection of the network leads to fragmentation and, in some cases, collapse of the underlying system. However, the influences of the topology of networks on their ability to withstand node failures are poorly understood. Based on a study of the response of 2000 randomly-generated power-law networks to node failures, we find that networks with higher nodal degree and clustering coefficient, lower betweenness centrality, and lower variability in path length and clustering coefficient maintain their cohesion better during such events. We also find that network robustness, i.e., the ability to withstand node failures, can be accurately predicted a priori for power-law networks across many fields. These results provide a basis for designing new, more robust networks, improving the robustness of existing networks such as the Internet and cellular metabolic pathways, and efficiently degrading networks such as terrorist cells. - Highlights: • Examine relationship between network topology and robustness to failures. • Relationship is statistically significant for scale-free networks. • Use statistical models to estimate robustness to failures for real-world networks

  12. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Smart Money

    Science.gov (United States)

    Ullman, Ellen

    2009-01-01

    From using virtualization technology to accepting lunch payments online, school districts are seeking money-saving methods. In this article, the author discusses some methods used by school districts that allow them to save money from using virtualization technology to accepting lunch payments online.

  14. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  15. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  16. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  17. Smart Money

    DEFF Research Database (Denmark)

    Avital, Michel; Hedman, Jonas; Albinsson, Lars

    2017-01-01

    Legal tender in the form of coins and banknotes is expected to be replaced at one point in the future by digital legal tender. This transformation is an opportunity for central banks to rethink the idea of money and overhaul the prevailing payment systems. Digital legal tender is expected to reduce...... exchange instrument that relies on computer protocols to facilitate, verify, and enforce certain conditions for its appropriation as payment, e.g. who may use the money, where, and for what. If we believe that digital legal tender will become ubiquitous, then the emergence and diffusion of smart money...

  18. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  19. Money and Design

    Directory of Open Access Journals (Sweden)

    Artur Borcuch

    2015-01-01

    Full Text Available The purpose of this article is to analyze the influence of the money design on willingness to make purchases. In this paper, we focus on three aspects that structure the relation between money and design: the link between design and finance (in general, determinants of design and perspective of currency design. The main research problem explored in this paper is: Does the money design have influence on the willingness to make purchases by employees/employers at design studios, design students and students of economics/management? The main hypothesis is as follows – the more experience in design practice, the more important is money design.

  20. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  1. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  2. Money growth volatility and the demand for money in Germany: Friedman's volatility hypothesis revisited

    OpenAIRE

    Brüggemann, Imke; Nautz, Dieter

    1997-01-01

    Recently, the Bundesbank claimed that monetary targeting has become considerably more diffcult by the increased volatility of short-term money growth. The present paper investigates the impact of German money growth volatility on income velocity and money demand in view of Friedman's money growth volatility hypothesis. Granger-causality tests provide some evidence for a velocity-volatility linkage. However the estimation of volatility-augmented money demand functions reveals that - in contras...

  3. ENDOGENEITY OF INDONESIAN MONEY SUPPLY

    Directory of Open Access Journals (Sweden)

    Meutia Safrina Rachma

    2011-09-01

    Full Text Available There has been a long debate about the endogeneity of money supply. The main objective of this article is to identify whether money supply in Indonesia is an exogenous or an endogenous variable. Using a Vector Autoregressive model and monthly data 1997(5-2010(6, the estimation result shows that money supply in Indonesia is an endogenous variable. The movement of broad money supply does influence the movement of base money and Consumer Price Index. Consequently, the central bank does not have control power on money supply. The bank is only able to maintain the stability and control the movement of broad money supply. Keywords: Endogenous variable, money supply, vector autoregressionJEL classification numbers: E51, E52, E58

  4. Money Laundering

    DEFF Research Database (Denmark)

    Tsingou, Eleni

    2014-01-01

    This chapter provides an overview of the role of the European Union in the emergence, consolidation and development of the governance of money laundering. In particular, it identifies three sets of factors that explain the role of the European Union in the global Anti-Money Laundering (AML) regime...

  5. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  6. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  7. Aggregate Uncertainty, Money and Banking

    OpenAIRE

    Hongfei Sun

    2006-01-01

    This paper studies the problem of monitoring the monitor in a model of money and banking with aggregate uncertainty. It shows that when inside money is required as a means of bank loan repayment, a market of inside money is entailed at the repayment stage and generates information-revealing prices that perfectly discipline the bank. The incentive problem of a bank is costlessly overcome simply by involving inside money in repayment. Inside money distinguishes itself from outside money by its ...

  8. Young Money

    DEFF Research Database (Denmark)

    Roelsgaard Obling, Anne

    2015-01-01

    Book review of: Kevin Roose: "Young Money: Inside the Hidden World of Wall Street's Post-Crash Recruits". New York: Grand Central Publishing, 2014. 320 pp.......Book review of: Kevin Roose: "Young Money: Inside the Hidden World of Wall Street's Post-Crash Recruits". New York: Grand Central Publishing, 2014. 320 pp....

  9. Smart Money

    DEFF Research Database (Denmark)

    Avital, Michel; Hedman, Jonas; Albinsson, Lars

    2017-01-01

    transaction costs by providing seamless real-time payments. In addition, digital legal tender that is based on blockchain technology can provide a foundation for customizable “smart money” which can be used to manage the appropriation of money and its use. In essence, the smart money is a customizable value...

  10. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  11. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  12. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  13. GENDERED DOLLARS: Pin Money, Mad Money, and Changing Notions of a Woman’s Proper Place

    Directory of Open Access Journals (Sweden)

    Janice Traflet

    2008-01-01

    Full Text Available This essay examines the evolution in the meaning and usage of two types of special currencies: pin money and mad money. At the start of the twentieth century, both currencies were considered a woman’s money. By the end of the century, however, both pin money and mad money had lost a large measure of their original gendered connotations. By situating the evolving meanings of these currencies alongside concepts of domesticity, virtuous womanhood, and a woman’s proper place, this essay strives to illuminate the rise and fall of pin money and mad money as uniquely “women’s dollars." 

  14. Moneta e quasi-moneta. (Money and quasi-money

    Directory of Open Access Journals (Sweden)

    F. CESARANO

    2013-12-01

    Full Text Available L'analisi della definizione degli aggregati monetari ha avuto un ruolo di primo piano nel dibattito sul denaro negli anni Sessanta e la prima metà degli anni Settanta . I problemi connessi con il rapporto tra denaro e quasi- denaro ha importanti implicazioni per i vari aspetti fondamentali della teoria monetaria e della politica monetaria . In Italia , per motivi legati alla peculiarità del  quadro istituzionale , il problema in questione non ha ricevuto molta attenzione . Solo di recente , a seguito della diffusione di strumenti di mercato monetario ,  molti partiti hanno sollevato la questione per quanto riguarda l'inclusione di questi strumenti nella definizione dello stock del denaro . Dopo aver spiegato la natura del problema , il presente lavoro fornisce un'analisi empirica della questione .The analysis of the definition of monetary aggregates has had a leading role in the debate on money in the sixties and the first half of the seventies. The problems associated with the relationship between money and quasi-money has important implications for various fundamental aspects of monetary theory and monetary policy. In Italy, for reasons related to the peculiar institutional framework, the issue in question has not received much attention. Only recently, as a result of the diffusion of money market instruments, have many parties raised the question regarding the inclusion of these instruments in the definition of the stock of money. After explaining the nature of the problem, the present work provides an empirical analysis of the issue.JEL: E42, E52

  15. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  16. College Students Discount Money "Won" More than Money "Owed"

    Science.gov (United States)

    Weatherly, Jeffrey N.; Derenne, Adam; Terrell, Heather K.

    2010-01-01

    Evidence in the research literature indicates people may treat "won" money differently than they would their own money. The present study had a sample of 648 college students complete a delay-discounting task that involved the hypothetical monetary amounts of $1,000 or $100,000. Participants were asked repeatedly what amount they would…

  17. The symbolic power of money: reminders of money alter social distress and physical pain.

    Science.gov (United States)

    Zhou, Xinyue; Vohs, Kathleen D; Baumeister, Roy F

    2009-06-01

    People often get what they want from the social system, and that process is aided by social popularity or by having money. Money can thus possibly substitute for social acceptance in conferring the ability to obtain benefits from the social system. Moreover, past work has suggested that responses to physical pain and social distress share common underlying mechanisms. Six studies tested relationships among reminders of money, social exclusion, and physical pain. Interpersonal rejection and physical pain caused desire for money to increase. Handling money (compared with handling paper) reduced distress over social exclusion and diminished the physical pain of immersion in hot water. Being reminded of having spent money, however, intensified both social distress and physical pain.

  18. 77 FR 552 - Proposed Collection; Comment Request; Renewal of Suspicious Activity Reporting by the Securities...

    Science.gov (United States)

    2012-01-05

    ..., to protect against international terrorism, and to implement counter-money laundering programs and... proceedings involving domestic and international money laundering, terrorist financing, tax violations, fraud...

  19. Money Creation and Destruction

    OpenAIRE

    Faure, Salomon; Gersbach, Hans

    2017-01-01

    We study money creation and destruction in today’s monetary architecture and examine the impact of monetary policy and capital regulation in a general equilibrium setting. There are two types of money created and destructed: bank deposits, when banks grant loans to firms or to other banks and central bank money, when the central bank grants loans to private banks. We show that equilibria yield the first-best level of money creation and lending when prices are flexible, regardless of the monet...

  20. Money distribution with intermediation

    OpenAIRE

    Teles, Caio Augusto Colnago

    2013-01-01

    This pap er analyzes the distribution of money holdings in a commo dity money search-based mo del with intermediation. Intro ducing heterogeneity of costs to the Kiyotaki e Wright ( 1989 ) mo del, Cavalcanti e Puzzello ( 2010) gives rise to a non-degenerated distribution of money. We extend further this mo del intro ducing intermediation in the trading pro cess. We show that the distribution of money matters for savings decisions. This gives rises to a xed p oint problem for the ...

  1. Hume and Endogenous Money

    OpenAIRE

    Maria Pia Paganelli

    2006-01-01

    David Hume’s monetary theory has three standard yet inconsistent readings. As a forefather of the quantity theory of money, Hume sees money as neutral. As an inflationist, Hume sees an active positive role for monetary policy. As a monetarist, Hume sees an active positive role for monetary policy only in the short run. This paper reads Hume consistently instead by showing that for Hume money is endogenous and demand-driven. Hume would read the money equation in terms of reverse causation and ...

  2. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  3. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  4. Recovery and money management.

    Science.gov (United States)

    Rowe, Michael; Serowik, Kristin L; Ablondi, Karen; Wilber, Charles; Rosen, Marc I

    2013-06-01

    Social recovery and external money management are important approaches in contemporary mental health care, but little research has been done on the relationship between the two or on application of recovery principles to money management for people at risk of being assigned a representative payee or conservator. Out of 49 total qualitative interviews, 25 transcripts with persons receiving Social Security insurance or Social Security disability insurance who were at risk of being assigned a money manager were analyzed to assess the presence of recognized recovery themes. The recovery principles of self-direction and responsibility were strong themes in participant comments related to money management. Money management interventions should incorporate peoples' recovery-related motivations to acquire financial management skills as a means to direct and assume responsibility for one's finances. Staff involved in money management should receive training to support client's recovery-related goals. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  5. Money Inventories in Search Equilibrium

    OpenAIRE

    Berentsen, Aleksander

    1998-01-01

    The paper relaxes the one unit storage capacity imposed in the basic search-theoretic model of fiat money with indivisible real commodities and indivisible money. Agents can accumulate as much money as they want. It characterizes the stationary distributions of money and shows that for reasonable parameter values (e.g. production cost, discounting, degree of specialization) a monetary equilibrium exists. There are multiple stationary distributions of a given amount of money, which differ in t...

  6. Anthropological perspectives on money management: considerations for the design and implementation of interventions for substance abuse.

    Science.gov (United States)

    Carpenter-Song, Elizabeth

    2012-01-01

    There remains a long-standing argument regarding the need for money management strategies to control poor spending habits among people with substance use disorders. The objective was to review issues relevant to the design and implementation of money-management-based interventions for substance abuse. Using a comparative, cross-cultural framework of anthropology, this manuscript examines three challenges for the design and implementation of money management interventions for substance abuse: (i) clients may not trust mental health centers to manage their money, (ii) clients may have different economic perspectives from clinicians and researchers, and (iii) clients may obtain substances through informal networks of exchange. This article clarifies the inherently complex symbolic and social dimensions of money and addiction and illustrates the need for researchers and clinicians to be mindful of the cultural assumptions that underlie money management interventions for substance abuse. Using an anthropological approach toward understanding the issues surrounding money management for individuals struggling with addiction and mental illness has the potential to strengthen the design and implementation of money-management-based interventions in a manner that is acceptable and meaningful for this target population.

  7. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  8. The Multidisciplinary Economics of Money Laundering

    OpenAIRE

    Ferwerda, J.

    2012-01-01

    Money laundering has been studied for many years, but mainly by lawyers and criminologists. This dissertation presents a number of ways on how an economist – mainly in a multidisciplinary fashion – can contribute to this field of research. This dissertation answers four important questions about money laundering: Why should we fight money laundering? How is money laundered? In which sectors is money laundered? And how can we fight money laundering? The literature mentions 25 effects of money ...

  9. Money illusion and coordination failure

    DEFF Research Database (Denmark)

    Fehr, Ernst; Tyran, Jean-Robert

    2007-01-01

    Economists long considered money illusion to be largely irrelevant. Here we show, however, that money illusion has powerful effects on equilibrium selection. If we represent payoffs in nominal terms, choices converge to the Pareto inferior equilibrium; however, if we lift the veil of money...... by representing payoffs in real terms, the Pareto efficient equilibrium is selected. We also show that strategic uncertainty about the other players' behavior is key for the equilibrium selection effects of money illusion: even though money illusion vanishes over time if subjects are given learning opportunities...... in the context of an individual optimization problem, powerful and persistent effects of money illusion are found when strategic uncertainty prevails...

  10. The Meaning of Money: The Measurement and Dimensionality of the Money Ethic Scale.

    Science.gov (United States)

    Tang, Thomas Li-Ping; Kim, Jwa K.

    Money has been recognized as an important factor to attract, retain, and motivate employees and has significant impacts on people's behavior, performance, and effectiveness in organizations. Created to evaluate the validity of the Money Ethic Scale, this study investigates the measurement and dimensionality of money attitudes through…

  11. Money Matters. FDIC Money Smart Financial Education Curriculum = Cuestiones de Dinero. FDIC Money Smart Plan de Educacion para Capacitacion en Finanzas.

    Science.gov (United States)

    Federal Deposit Insurance Corp., Washington, DC.

    This module on how to keep track of one's money is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to prepare a personal…

  12. Philosophy of Money

    CERN Document Server

    Simmel, Georg; Frisby, David; Bottomore, Tom

    2011-01-01

    In The Philosophy of Money, Georg Simmel provides us with a now classic discussion of the social, psychological and philosophical aspects of the money economy, full of brilliant insights into the forms that social relationships take.

  13. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  14. ENDOGENEITY OF INDONESIAN MONEY SUPPLY

    OpenAIRE

    Rachma, Meutia Safrina

    2011-01-01

    There has been a long debate about the endogeneity of money supply. The main objective of this article is to identify whether money supply in Indonesia is an exogenous or an endogenous variable. Using a Vector Autoregressive model and monthly data 1997(5)-2010(6), the estimation result shows that money supply in Indonesia is an endogenous variable. The movement of broad money supply does influence the movement of base money and Consumer Price Index. Consequently, the central bank does not hav...

  15. Endogeneity Of Indonesian Money Supply

    OpenAIRE

    Rachma, Meutia Safrina

    2010-01-01

    There has been a long debate about the endogeneity of money supply. The main objective of this article is to identify whether money supply in Indonesia is an exogenous or an endogenous variable. Using a Vector Autoregressive model and monthly data 1997(5)-2010(6), the estimation result shows that money supply in Indonesia is an endogenous variable. The movement of broad money supply does influence the movement of base money and Consumer Price Index. Consequently, the central bank does not hav...

  16. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  17. Disordered Money Behaviors: Development of the Klontz Money Behavior Inventory

    Directory of Open Access Journals (Sweden)

    Brad T Klontz

    2012-06-01

    Full Text Available Much of the existing literature on financial behavior focuses on basic money management tasks (e.g., balancing a checkbook. However, it can be equally important to identify problematic financial behaviors that can sabotage one’s financial health. The purpose of this study was to create an assessment tool that can be used by mental health and financial professionals to identify disordered money behaviors that may impede on progress towards one’s financial goals. This study asked 422 respondents to indicate their agreement with disordered money behaviors, including compulsive buying, pathological gambling, compulsive hoarding, workaholism, financial enabling, financial dependence, financial denial, and financial enmeshment, which were correlated with demographic characteristics and financial outcomes. The results identified eight subscales derived from 68 disordered money behavior items. All eight subscales were found to have high reliability in measuring disordered behaviors, and six were associated with negative financial health indicators (e.g. less net worth, less income, and/or more revolving credit.

  18. Why Failing Terrorist Groups Persist Revisited: A Social Network Approach to AQIM Network Resilience

    Science.gov (United States)

    2017-12-01

    the approach and methods used in this analysis to organize, analyze, and explore the geospatial, statistical , and social network data...requirements for the degree of MASTER OF SCIENCE IN INFORMATION STRATEGY AND POLITICAL WARFARE from the NAVAL POSTGRADUATE SCHOOL December...research utilizes both descriptive statistics and regression analysis of social network data to explore the changes within the AQIM network 2012

  19. Money neutrality: Rethinking the myth

    Directory of Open Access Journals (Sweden)

    Issaoui Fakhri

    2015-01-01

    Full Text Available Considered as an axiomatic basis of classical, neoclassical, and monetarist theories, the long-run money neutrality assumption does not always seem to be verified. Indeed, in our view, the money, in the sense of M2, can constitute a long-run channel of growth transmission. Thus, this paper examines the long-term relationship among money supply (M2, income (GDP, and prices (CPI. The subprime crisis in 2007 has shown that the demand for money does not only meet motives of transaction, precaution, and speculation but also of fictional or quasi-fictional future demands due to the fact that they are created without real counterparts. The capacity of production systems in developed countries to respond to increases in money supply by creating more wealth, involves the assumption of money neutrality in the long-run. However, in developing countries, the excess of money supply may lead to inflation trends. The present study has confirmed the long-term non-neutrality of money supply in the USA, and its neutrality in Gabon and Morocco.

  20. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  1. 31 CFR 103.64 - Special rules for casinos.

    Science.gov (United States)

    2010-07-01

    ... money laundering and terrorist financing risks posed by the products and services provided by the casino... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Special rules for casinos. 103.64 Section 103.64 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL...

  2. Itinerancy of money

    Science.gov (United States)

    Yasutomi, Ayumu

    2003-09-01

    Previously, I studied [Physica D 82, 180-194 (1995)] the emergence and collapse of money in a computer simulation model. In this paper I will revisit the same topic, building a model in the same line. I discuss this problem from the viewpoint of chaotic itinerancy. Money is the most popular system for evading the difficulty of exchange under division of labor. It emerges autonomously from exchanges among selfish agents which behave as automata. And such emergent money collapses autonomously. I describe money as a structure in economic space, explaining its autonomous emergence and collapse as two phases of the same phenomenon. The key element in this phenomenon is the switch of the meaning of strategies. This is caused by the drastic change of environment caused by the emergence of a structure. This dynamics shares some aspects with chaotic itinerancy.

  3. Government, Money, and International Politics

    OpenAIRE

    Hoppe, Hans-Hermann

    2003-01-01

    In this paper, the author deals with: (1) Definition of government; incentive structure under government: taxation, war and territorial expansion. (2) Origin of money; government and money; the devolution of money from commodity to fiat money. (3) International politics and monetary regimes; monetary imperialism and the drive toward a one-world central bank and fiat currency.

  4. Pattern of Demand For Money

    Directory of Open Access Journals (Sweden)

    Ahmad Berlian

    2017-12-01

    Full Text Available In the activity of the modern economy, the availability of money as a means of transaction is very important, because with the money as a means to pay consumers can easily to get the basic material needs are required, the manufacturer can provide the raw materials of labor for production, and distributors can obtain a variety of merchandise to be delivered at the end consumer. The pattern of use of money is influenced by the attitude of the public in the transaction. Researchers assume, that there are differences among communities, either by group differences in income, educational differences, ethnic differences, differences in profession, and perhaps even religious differences embraced. So as to provide information to the monetary authorities, to enrich the theory of demand for money based economic agents in Indonesia, and for the application of the theory of demand for money, the researchers felt the need to study patterns of use of money. Qualitative research, in addition to knowing whether the variables that affect the demand for money as the above theory is still relevant for economic actors in Indonesia at this time, or even are new variables, as well as the motive of money demand. Keywords: Demand for money, Keynes Theory, qualitative method

  5. GENDERED DOLLARS: Pin Money, Mad Money, and Changing Notions of a Woman’s Proper Place

    OpenAIRE

    Janice Traflet

    2008-01-01

    This essay examines the evolution in the meaning and usage of two types of special currencies: pin money and mad money. At the start of the twentieth century, both currencies were considered a woman’s money. By the end of the century, however, both pin money and mad money had lost a large measure of their original gendered connotations. By situating the evolving meanings of these currencies alongside concepts of domesticity, virtuous womanhood, and a woman’s proper place, this essay strives t...

  6. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  7. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  8. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  9. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  10. 31 CFR 103.15 - Reports by mutual funds of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... suspected terrorist financing or ongoing money laundering schemes, a mutual fund shall immediately notify by... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by mutual funds of suspicious transactions. 103.15 Section 103.15 Money and Finance: Treasury Regulations Relating to Money and Finance...

  11. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  12. Exchanging the liquidity hypothesis: Delay discounting of money and self-relevant non-money rewards.

    Science.gov (United States)

    Stuppy-Sullivan, Allison M; Tormohlen, Kayla N; Yi, Richard

    2016-01-01

    Evidence that primary rewards (e.g., food and drugs of abuse) are discounted more than money is frequently attributed to money's high degree of liquidity, or exchangeability for many commodities. The present study provides some evidence against this liquidity hypothesis by contrasting delay discounting of monetary rewards (liquid) and non-monetary commodities (non-liquid) that are self-relevant and utility-matched. Ninety-seven (97) undergraduate students initially completed a conventional binary-choice delay discounting of money task. Participants returned one week later and completed a self-relevant commodity delay discounting task. Both conventional hypothesis testing and more-conservative tests of statistical equivalence revealed correspondence in rate of delay discounting of money and self-relevant commodities, and in one magnitude condition, less discounting for the latter. The present results indicate that liquidity of money cannot fully account for the lower rate of delay discounting compared to non-money rewards. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  14. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  15. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  16. The Economics of Crime and Money Laundering: Does Anti-Money Laundering Policy Reduce Crime?

    NARCIS (Netherlands)

    Ferwerda, J.|info:eu-repo/dai/nl/314405526

    2008-01-01

    Anti-money laundering policy has become a major issue in the Western world, especially in the United States after 9-11. Basically all countries in the world are more or less forced to cooperate in the global fight against money laundering. In this paper, the criminalization of money laundering is

  17. Money laundering

    OpenAIRE

    Kratochvílová, Eliška

    2012-01-01

    Money laundering is marginalized phenomenon with high social impact which comes from necessary connection of this activity with illegal activities, especially organized crime. Since the goal of almost every illegal activity is to create profit (and since the biggest profit comes from the activities which are highly dangerous for the society, such as drug trafficking) it is vital for the society to fight money laundering effectively. It is in the best interest of the whole society to fight thi...

  18. Time, money, and morality.

    Science.gov (United States)

    Gino, Francesca; Mogilner, Cassie

    2014-02-01

    Money, a resource that absorbs much daily attention, seems to be involved in much unethical behavior, which suggests that money itself may corrupt. This research examined a way to offset such potentially deleterious effects-by focusing on time, a resource that tends to receive less attention than money but is equally ubiquitous in daily life. Across four experiments, we examined whether shifting focus onto time can salvage individuals' ethicality. We found that implicitly activating the construct of time, rather than money, leads individuals to behave more ethically by cheating less. We further found that priming time reduces cheating by making people reflect on who they are. Implications for the use of time primes in discouraging dishonesty are discussed.

  19. Money talks? An experimental investigation of cheap talk and burned money

    NARCIS (Netherlands)

    de Haan, T.; Offerman, T.; Sloof, R.

    2015-01-01

    We experimentally study the strategic transmission of information in a setting where both cheap talk and money can be used. Theoretically, many equilibria exist side by side, in which senders use either costless messages, money, or both. We find that senders prefer to communicate through costless

  20. Department of the Treasury Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-12-20

    ..., money laundering, and other financial crime. The proposed changes are intended to address regulatory... for the use of prepaid access as a means for furthering money laundering, terrorist financing, and...) exempting certain categories of prepaid access products and services posing lower risks of money laundering...

  1. The Evolution of Paper Money

    OpenAIRE

    Levintal, Oren; Zeira, Joseph

    2009-01-01

    This paper tells the story of how paper money evolved as a result of lending by banks. While lending commodity money requires holding large reserves of commodity money to ensure liquidity, issuing convertible paper money reduces these costs significantly. The paper also examines the possibility of issuing inconvertible notes and shows that while they further reduce the cost of borrowing they also have adverse effects on the stability of the banking system. As a result, governments often inter...

  2. THE ORIGINS AND NATURE OF MONEY

    Directory of Open Access Journals (Sweden)

    Mihaela IAVORSCHI

    2014-06-01

    Full Text Available The importance of money and the role they hold in the economy can be seen as the keystone of economic life. For a better understanding of the essence of the monetary phenomena it is especially important to turn to history and see how money was born. By turning to their origins, we discover the real fundaments of monetary issues. Only after such a systematic analysis we will be able to suggest the appropriate solutions for the current monetary issues. Therefore, in this study I will research the origin of money and their functionality on the market.The aim of this paper is to analyse the origin of money as a social institution. The appearance and use of money has prehistoric roots. People have turned to the usage of money out of need to facilitate trade. During thousands of years money has known different forms going from money as merchandise, to coins and later to paper money and electronic currency. In this study I have analysed the role of natural money, as well as their production and functionality on the market. The main questionto be answered is whether the production and functionality of paper money nowadays is the consequence of the free market, having the Austrian’s School liberal perspective as a starting point. This methodological approach demonstrates that money is and will remain a social institution and the implication of the authorities in the currency issuing, even from ancient times, has caused distortions in the economic activity.

  3. Anti-Money Laundering Regulations And The Effective Use Of Mobile Money In South Africa – Part 2

    Directory of Open Access Journals (Sweden)

    Marike Kersop

    2015-12-01

    Full Text Available Mobile financial services, specifically mobile money, has the potential to expand access to financial services to millions of unbanked people in South Africa. As such, it looks very promising in terms of financial inclusion. However, concerns exist that mobile money can be detrimental to financial integrity since there are several proven risk factors linked to mobile financial services. These risk factors make mobile money very susceptible to money laundering. The potential for abuse and the need for appropriate controls is therefore something which cannot be ignored. While the South African legislator has made provision for comprehensive anti-money laundering preventative measures by means of the Financial Intelligence Centre Act 38 of 2001, there exists no South African legislation explicitly concerned with mobile money. It is therefore difficult to determine what the regulatory stance is in terms of mobile money in South Africa. The Financial Action Task Force (FATF is, however, currently focusing attention on the effect which mobile money may have on financial integrity. The latest FATF Recommendations make provision for several anti-money laundering controls which are specifically applicable to mobile money, including controls regarding money or value transfer services and new technologies. While it is always difficult to balance financial integrity and financial inclusion, the risk-based approach makes it possible for governments to implement effective anti-money laundering measures, thereby preserving financial integrity, without the need to compromise on financial inclusion objectives. The fact that South Africa has not fully adopted a risk-based approach is a problem which needs to be addressed if mobile money is to deliver on its promises for financial inclusion, without being detrimental to financial integrity

  4. Money talks? An experimental investigation of cheap talk and burned money

    NARCIS (Netherlands)

    de Haan, T.; Offerman, T.; Sloof, R.

    2011-01-01

    We experimentally study the strategic transmission of information in a setting where both cheap talk and money can be used for communication purposes. Theoretically a large number of equilibria exist side by side, in which senders either use costless messages, money, or a combination of the two. We

  5. Money talks? An experimental investigation of cheap talk and burned money

    NARCIS (Netherlands)

    de Haan, T.; Offerman, T.; Sloof, R.

    2012-01-01

    We experimentally study the strategic transmission of information in a setting where both cheap talk and money can be used for communication purposes. Theoretically a large number of equilibria exist side by side, in which senders either use costless messages, money, or a combination of the two. We

  6. 77 FR 33638 - Amendment to the Bank Secrecy Act Regulations-Exemption From the Requirement To Report...

    Science.gov (United States)

    2012-06-07

    ... effectiveness of its anti-money laundering and counter-terrorist financing policies. \\1\\ These customers are... enforcement purposes. \\6\\ See section 402 of the Money Laundering Suppression Act of 1994 (the ``Money...\\ 31 U.S.C. 5311. \\4\\ Treasury Order 180-01 (Sept. 26, 2002). \\5\\ 31 U.S.C. 5318(h)(2). The Money...

  7. Veblen effect, marginal utility of money, and money illusion

    OpenAIRE

    Malakhov, Sergey

    2013-01-01

    The paper discovers microeconomic mechanism of Veblen effect as well as of Giffen case as results of the negative marginal utility of money. The marginal utility of consumption also becomes negative. The total consumption-leisure utility is increased due to the increase in leisure time. This overall effect results in the phenomenon of money illusion on the macroeconomic level. This general effect has deep historical and institutional grounds and, in order to minimize its disequilibrium econom...

  8. THE TWO SIDES OF MONEY LAUNDERING

    Directory of Open Access Journals (Sweden)

    Corina – Maria ENE

    2014-12-01

    Full Text Available The mainly goal of money laundering is to carry out more and more illegal economic transactions or activities to produce individual or groups gains and then to legitimate them. Money laundering converts illicit source of money generated by criminal activities in order to hide the connection between money and their original illegal activities. This is one of money laundering side. The second side implies corruption. While money laundering is a passing channel for illicit funds due to its criminal origin source, such funds may derive from corruption offences. All corruption’s forms represent the most important illicit funds branches for money laundering process. Corrupt people methods used to exploit the national and international financial system reflect the relationship between those two criminal activities. Criminals achieve their personal interests by hiding their corruption proceeds and transfer these gains to official economies. Corruption spread in any society entails money laundering spread, and the converse, too. There is a quite “indecent” relationship between money laundering and corruption. This paper tries to identify the multiple connections between the two phenomenons showing the negative impacts these criminal behaviours are having on the national and international economy. We conclude by highlighting the necessity of a multidisciplinary approach in order to fight against money laundering and corruption by integrating these problem frameworks at national level. International community must focus their resources on money laundering and corruption risks areas and maximize their response impact.

  9. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  10. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  11. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  12. Bitcoin and Beyond: Exclusively Informational Money

    NARCIS (Netherlands)

    Bergstra, J.A.; de Leeuw, K.

    2013-01-01

    The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent

  13. Money Matters and Money Talks: German Children’s Experiences with and Perspectives on Their Own Money

    OpenAIRE

    Gebauer, Anja

    2013-01-01

    The following thesis rectifies the often assumed notion that children are economic innocents and portrays the full complexity of children’s economic lives. It traces the experiences of 17 German 6 to 8 year old children with their own money and explores their perspectives on their money relations. Empirical data is derived from semi-structured individual interviews and focus-group discussions with children, children’s drawings as well as semi-structured interviews with the parents of these ch...

  14. Combinatorial Auctions without Money

    Science.gov (United States)

    2014-05-01

    istence of thresholds (a.k.a., critical prices) (for every set). The result in Theorem 3.4 relates to the characterization of truthful CAs with money and no...with money and no verification, each bidder optimizes her valu- ation minus the critical price over all her demanded sets; in the setting without money...auctions. ICALP, pp. 90-101, 2010. [2] P. Briest, P. Krysta, and B. Vöcking. Approximation techniques for utilitarian mechanism design. STOC, pp. 39-48

  15. Keynesian multiplier versus velocity of money

    Science.gov (United States)

    Wang, Yougui; Xu, Yan; Liu, Li

    2010-08-01

    In this paper we present the relation between Keynesian multiplier and the velocity of money circulation in a money exchange model. For this purpose we modify the original exchange model by constructing the interrelation between income and expenditure. The random exchange yields an agent's income, which along with the amount of money he processed determines his expenditure. In this interactive process, both the circulation of money and Keynesian multiplier effect can be formulated. The equilibrium values of Keynesian multiplier are demonstrated to be closely related to the velocity of money. Thus the impacts of macroeconomic policies on aggregate income can be understood by concentrating solely on the variations of money circulation.

  16. 75 FR 65805 - Transfer and Reorganization of Bank Secrecy Act Regulations

    Science.gov (United States)

    2010-10-26

    ... and the other for the anti-money laundering program rules for mutual funds.\\4\\ Although the two... Special Information Sharing Procedures to Deter Money Laundering and Terrorist Activity). \\7\\ See http... B--Programs 1010.200 General. 1010.205 Exempted anti-money laundering programs for certain financial...

  17. Privately issued money reduces GDP.

    OpenAIRE

    Musgrave, Ralph S.

    2017-01-01

    The majority of the money supply is issued by private banks, not central banks. However a system that restricts money creation to central banks has been advocated for many years by leading economists. There is no reason interest rates would not be at some sort of genuine free market rate under the latter system. In contrast, when private bank money is allowed, those banks undercut the free market rate of interest because it costs them nothing to come by the money they lend out: they effective...

  18. Money, Debt, People and Planet

    Directory of Open Access Journals (Sweden)

    Jakob von Uexkull

    2012-10-01

    Full Text Available The widespread failure to understand money creation plays a key role in the current policy impasse. In a world ruled by money, this failure disempowers and prevents serious consideration of alternatives. The key reasons why we are not moving faster in tackling the global crises are, we are told, because it is too expensive, there is not enough money, it is not (yet profitable enough to do etc. Within the current global monetary framework, this is largely true. Therefore, any realistic plan to change course before we are overwhelmed by the inter-linked environmental, social and security threats facing us, is to change this framework to ensure that money becomes our servant again. The current debt crisis offers an opportunity to replace discredited debt-based money created by private banks in their interest with government-created debt-free money benefitting all, which can be used to fund a global emergency programme.“We know now that government by organised money is just as dangerous as government by organised mob.” — President F.D. Roosevelt, 31.10.36“The essence of the contemporary monetary system is creation of money, out of nothing, by private banks’ often foolish lending. Why is such privatisation of a public function right and proper, but action by the central bank to meet pressing public need, a road to catastrophe?” — Martin Wolf, ‘Financial Times’, 9.11.10“The obvious way to reduce our public and private debts is to stop having all our money created as debt.” — James Robertson, ‘Future Money’

  19. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  20. Anti-money laundering: the conditions for global governance and harmonisation

    OpenAIRE

    Oliveira, Inês Sofia de; Correia, Ines Sofia De Oliveira Gomes De Pinho

    2015-01-01

    This thesis advances global governance literature by focusing on the conditions under which procedural harmonisation occurs and how it is characterised. It suggests that the existence of a network of intergovernmental organisations (IGOs) complements great powers’ action and acts as a force for harmonisation in the making of international anti-money laundering (AML) standards. Procedural harmonisation is identified firstly, through a discussion on great power coalitions and ...

  1. The Money Market Liaison Group Sterling Money Market Survey

    OpenAIRE

    Westwood, Ben

    2011-01-01

    The Bank of England recently initiated a new survey of the sterling money market on behalf of the Money Market Liaison Group. This market — where short-term wholesale borrowing and lending in sterling takes place — plays a central role in the Bank’s pursuit of its monetary and financial stability objectives. Participants include banks, other financial institutions and non-financial companies, who use the market to manage their liquidity, by investing over short periods and raising short-term ...

  2. Redefining the money market

    African Journals Online (AJOL)

    Keywords: money market, monetary policy, money, financial markets. 1. ..... Both sides of the banks' consolidated balance sheet increase by USD 100 million. ... As substantiation of the statement that the KIR substantially influencing the.

  3. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  4. Money laundering in the norwegian securities market: on the conditions of money laundering

    OpenAIRE

    Ingvaldsen, Karsten Olaf F.; Larsson, Paul

    2009-01-01

    This is the final text version of the article, it may contain minor differences from the publisher's pdf version. Norwegian authorities often claim that the financial sector, and especially the securities market, is particularly vulnerable to activities of money laundering. Money laundering is a recurrent theme in the Norwegian media. Usually the media tend to present the forms and extent of money laundering in simple and rather vague terms. The numbers circulating in the media are based u...

  5. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  6. WDM Core Networks : regenerator placement and green networking

    OpenAIRE

    Youssef , Mayssa

    2011-01-01

    As Operators strive today to optimize their networks, considerations of cost, availability, eco-sustainability, and quality of service are beginning to converge. Solutions that reduce capital and operational expenditures not only save money, but also tend to reduce the environmental impact. In "opaque" networks, optical signals undergo expensive electrical regeneration systematically at each node. In "transparent" networks, signal quality deteriorates due to the accumulation of physical impai...

  7. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  8. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  9. Terrorism Base Potential in the Tri-Border Area of Latin America

    National Research Council Canada - National Science Library

    Halaburda, Pablo

    2006-01-01

    .... It has always been considered fertile ground for terrorist groups. Illicit activities are common, generating annually billions of dollars in money laundering, arms and drug trafficking, money and document forgery, and electronic media counterfeiting...

  10. Electronic money in russia: current state and problems of development

    Directory of Open Access Journals (Sweden)

    T. G. Bondarenko

    2016-01-01

    Full Text Available Article is devoted to urgent problems of non-cash methods of calculation development by using electronic money – as one of the modern economically developed state strategic tasks. On modern economic science strong influence appears informatization process. The control expansion tendency, influence and distribution of commerce due to informatization of society led to emergence of the new phenomenon – information economy. Information economy brought new economic events which owing to their novelty are insufficiently studied to life. It is possible to carry electronic money to such phenomena of modern network economy Relevance and, in our opinion, timeliness of this scientific work, consisting in novelty of this non-cash payment method, its prospects and innovation within non-cash methods of calculations. Authors set as the purpose – studying of problems and the prospects of development of electronic money in the Russian Federation. In article theoretical bases of electronic money functioning are described. Determinations and classifications dismissed non-cash a method, and also the principles of electronic money functioning are considered, the questions of their historical development are raised.Authors analyzed statistical data on development of electronic services and channels of their using. Features, benefits and shortcomings of the current state of the market of electronic money are studied. The emphasis on that fact that in modern conditions considerable number of economic actors perform the activities, both in the real environment of economy, and within the virtual environment that promotes expansion of methods of their customer interaction by means of technical devices of personal computers, mobile phones is placed. In article common problems and tendencies of payments with using an electronic money are designated, the research on assessment of the current state and the prospects of electronic money

  11. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  12. Time versus money.

    Science.gov (United States)

    Monga, Ashwani; Zor, Ozum

    2018-04-21

    Consumers are known to spend both time and money. These two resources are often seen as economically comparable because the value of one's time can be equated to a monetary amount, such as one's wage rate. Recent research suggests that even when time and money are economically equivalent, they are psychologically different. We discuss how time (versus money) leads to decision making that is more heuristic rather than systematic, to an orientation that is more emotional rather than value-maximizing, to a thinking process that is more holistic rather than analytic, and to a mindset that is more abstract rather than concrete. Implications arise for a variety of domains such as consumer search, happiness, product evaluation, and charitable giving. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  14. Does money matter in inflation forecasting?

    Science.gov (United States)

    Binner, J. M.; Tino, P.; Tepper, J.; Anderson, R.; Jones, B.; Kendall, G.

    2010-11-01

    This paper provides the most fully comprehensive evidence to date on whether or not monetary aggregates are valuable for forecasting US inflation in the early to mid 2000s. We explore a wide range of different definitions of money, including different methods of aggregation and different collections of included monetary assets. In our forecasting experiment we use two nonlinear techniques, namely, recurrent neural networks and kernel recursive least squares regression-techniques that are new to macroeconomics. Recurrent neural networks operate with potentially unbounded input memory, while the kernel regression technique is a finite memory predictor. The two methodologies compete to find the best fitting US inflation forecasting models and are then compared to forecasts from a naïve random walk model. The best models were nonlinear autoregressive models based on kernel methods. Our findings do not provide much support for the usefulness of monetary aggregates in forecasting inflation. Beyond its economic findings, our study is in the tradition of physicists’ long-standing interest in the interconnections among statistical mechanics, neural networks, and related nonparametric statistical methods, and suggests potential avenues of extension for such studies.

  15. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  16. Stopping Illicit Procurement: Lessons from Global Finance

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen; Kurzrok, Andrew J.

    2014-06-19

    Government regulators and the financial sector cooperate to combat money laundering and terrorist financing. This information-sharing relationship is built upon a strong legislative foundation and effective operational procedures. As with money-laundering and terrorist financing, halting the illicit procurement of dual-use commodities requires close coordination between government and industry. However, many of the legal and operational features present in financial threat cooperation do not exist in the export control realm. This article analyzes the applicability of financial industry cooperative measures to nonproliferation.

  17. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  18. Money creation and financial instability: An agent-based credit network approach

    OpenAIRE

    Lengnick, Matthias; Krug, Sebastian; Wohltmann, Hans-Werner

    2013-01-01

    The authors develop a simple agent-based and stock flow consistent model of a monetary economy. Their model is well suited to explain money creation along the lines of mainstream theory. Additionally it uncovers a potential instability that follows from a maturity mismatch of assets and liabilities. The authors analyze the impact of interbank lending on the stability of the financial sector and find that an interbank market stabilizes the economy during normal times but amplifies systemic ins...

  19. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  20. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  1. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  2. Anti-Money Laundry regulation and Crime: A two-period model of money-in-the-utility-function

    OpenAIRE

    Fanta, F; Mohsin, H

    2010-01-01

    The paper presents a two period model with two types of money i.e. dirty and cleans (legal) money in utility function. Clean money is earned from working in legal sector and dirty from illegal sector. Our two-two period model reveals that an increase in labor wage in legal sector unambiguously decease the labor hours allocated for illegal sector by increasing the opportunity cost for illegal activities. However, the crime-reducing impact of anti-money laundry regulation and the probability of...

  3. An alternative way to track the hot money in turbulent times

    Science.gov (United States)

    Sensoy, Ahmet

    2015-02-01

    During recent years, networks have proven to be an efficient way to characterize and investigate a wide range of complex financial systems. In this study, we first obtain the dynamic conditional correlations between filtered exchange rates (against US dollar) of several countries and introduce a time-varying threshold correlation level to define dynamic strong correlations between these exchange rates. Then, using evolving networks obtained from strong correlations, we propose an alternative approach to track the hot money in turbulent times. The approach is demonstrated for the time period including the financial turmoil of 2008. Other applications are also discussed.

  4. Monetary Policy Implications of Electronic Money

    OpenAIRE

    Berentsen, Aleksander

    1997-01-01

    The term digital money refers to various proposed electronic payment mechanisms designed for use by consumers to make retail payments. Digital money products have the potential to replace central bank currency, thereby affecting the money supply. This paper studies the effect of replacing central bank currency on the narrowly defined stock of money under various assumptions regarding regulatory policies and monetary operations of central banks and the reaction of the banking system.

  5. Money and the Transmission of Monetary Policy

    OpenAIRE

    Seth Carpenter; Selva Demiralp

    2009-01-01

    The transmission mechanism of monetary policy has received extensive treatment in the macroeconomic literature. Most models currently used for macroeconomic analysis exclude money or else model money demand as entirely endogenous. Nevertheless, academic research and many textbooks continue to use the money multiplier concept in discussions of money. We explore the institutional structure of the transmission mechanism beginning with open market operations through to money and loans to document...

  6. Money Marries Money - Intergenerational Top Household Income Mobility in Denmark

    DEFF Research Database (Denmark)

    Bonke, Jens; Hussain, M. Azhar; Munk, Martin David

    2016-01-01

    This paper describes intergenerational earnings and income mobility among top-income households in Denmark. Access to administrative registers allowed us to look at very small fractions of the populations, and to distinguish between sons and daughters and to observe their spouses’ incomes. At the....... At the top of the income distribution we find a correlation of 0.763 between father and mother’s pooled income and that of their son and daughter-in-law’s pooled income, which indicates that money marries money....

  7. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  8. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  9. Quantum money with classical verification

    Energy Technology Data Exchange (ETDEWEB)

    Gavinsky, Dmitry [NEC Laboratories America, Princeton, NJ (United States)

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  10. Quantum money with classical verification

    International Nuclear Information System (INIS)

    Gavinsky, Dmitry

    2014-01-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it

  11. The Economics of Crime and Money Laundering: Does Anti-Money Laundering Policy Reduce Crime?

    OpenAIRE

    J. Ferwerda

    2008-01-01

    Anti-money laundering policy has become a major issue in the Western world, especially in the United States after 9-11. Basically all countries in the world are more or less forced to cooperate in the global fight against money laundering. In this paper, the criminalization of money laundering is modelled, assuming rational behaviour of criminals, following the law and economics strand of the literature which is described as the economics of crime. The theoretical model shows that a) the prob...

  12. Endogeneity of Money Supply: Evidence From Turkey

    Directory of Open Access Journals (Sweden)

    Oguzhan Cepni

    2017-02-01

    Full Text Available There is a long discussion among academics and central bankers about the theories of money supply. According to the exogenous view, central banks have the full control over money supply via policy actions including the adjustments of interest rates and reserve ratios, both of which alter commercial banks’ lending decisions. However, the theory of endogenous money supply emphasizes the role of demand for bank loans in money creation. More specifically, banks create money by meeting the demand of economic agents. In this study, we investigate which of the money supply theories holds in Turkish economy for the period 2006-2015 by employing cointegration and causality tests. Our findings show that the causality runs from bank loans to money supply both in the short and long terms, which supports the endogenous view in a sense that central bank and the banks fully meet the total demand for money in Turkish economy.

  13. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  14. Endogeneity of Money Supply: Evidence From Turkey

    OpenAIRE

    Oguzhan Cepni; Ibrahim Ethem Guney

    2017-01-01

    There is a long discussion among academics and central bankers about the theories of money supply. According to the exogenous view, central banks have the full control over money supply via policy actions including the adjustments of interest rates and reserve ratios, both of which alter commercial banks’ lending decisions. However, the theory of endogenous money supply emphasizes the role of demand for bank loans in money creation. More specifically, banks create money by meeting the demand ...

  15. Strategies of psychological terrorism perpetrated by ETA's network: delimitation and classification.

    Science.gov (United States)

    Martín-Peña, Javier; Rodríguez-Carballeira, Alvaro; Escartín Solanelles, Jordi; Porrúa García, Clara; Willem Winkel, Frans

    2010-02-01

    This paper defines and analyzes the harassment perpetrated by ETA's terrorist network in the Basque Country, providing a taxonomy of its strategies of psychological violence. The usefulness of this taxonomy has been tested and contrasted by means of a content analysis of 19 testimonies of persons who were the victims of violence by the terrorist network. The taxonomy of strategies of psychological violence is made up of four dimensions that emphasize the actions on the context of the persons affected, and on their emotional state, cognitions, and behaviour. Results show the predominance of emotional and cognitive strategies. Intra-observer and inter-observer reliability analysis in coding showed a Cohen's Kappa coefficient of .92 and .87, respectively. The psychological violence analyzed in this study reflects a form of psychological terrorism that harasses and persecutes a specific sector of the population.

  16. Feasibility of selected private money

    Directory of Open Access Journals (Sweden)

    Lukáš Nevěděl

    2012-01-01

    Full Text Available The goal of the entry: “Feasibility of selected private money” is the assessment of practicability of selected private money types as future currency especially in terms of attributes that the currency should meet to fulfil all claims required by its users. In the first step the features that the widely used currency has to have will be described and it will be analysed which of these features are characteristic for nowadays currencies (Czech crown and Euro too. In the second step private (unnationalized money will be described as well as several concepts derived from it. The paper will concern mainly on Hayek’s concept of private money and on particular variations of Local exchange trading systems. In the next part there will be pointed out good and bad features of these types of money, mainly from the view of characteristics that the proper currency should have. At the end it will be carried out the comparison of bad and good effects resulting from using of particular currencies types and I will decide about the applicability of analysed private money types. The paper uses the standard methods of scientific work. Firstly, the method of description is used to describe the development of private money concepts and characteristic features that the currency should have. Then, a comparative analysis is used to discuss the differences between contemporary currencies and unnationalized currencies as well as between required and real features of particular private money. At the end the method of synthesis, deduction and induction is used.

  17. Combining Benford's Law and machine learning to detect money laundering. An actual Spanish court case.

    Science.gov (United States)

    Badal-Valero, Elena; Alvarez-Jareño, José A; Pavía, Jose M

    2018-01-01

    This paper is based on the analysis of the database of operations from a macro-case on money laundering orchestrated between a core company and a group of its suppliers, 26 of which had already been identified by the police as fraudulent companies. In the face of a well-founded suspicion that more companies have perpetrated criminal acts and in order to make better use of what are very limited police resources, we aim to construct a tool to detect money laundering criminals. We combine Benford's Law and machine learning algorithms (logistic regression, decision trees, neural networks, and random forests) to find patterns of money laundering criminals in the context of a real Spanish court case. After mapping each supplier's set of accounting data into a 21-dimensional space using Benford's Law and applying machine learning algorithms, additional companies that could merit further scrutiny are flagged up. A new tool to detect money laundering criminals is proposed in this paper. The tool is tested in the context of a real case. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Money market futures

    OpenAIRE

    Anatoli Kuprianov

    1992-01-01

    Virtually all financial innovation in the U.S. money market during the past 20 years has centered on interest rate derivatives, including futures and swaps. Furthermore, money market futures--especially futures contracts on Eurodollar time deposits--have been at the vanguard of the recent explosion of trading activity in interest rate derivatives. While futures markets traditionally have been viewed as markets for the transfer of price risk, recent research shows that they may serve other imp...

  19. 24 CFR 291.535 - Earnest money deposit.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Earnest money deposit. 291.535... Next Door Sales Program § 291.535 Earnest money deposit. (a) General. The earnest money deposit is the sum of money that must be paid by the law enforcement officer, teacher, or firefighter/emergency...

  20. Money Creation in a Random Matching Model

    OpenAIRE

    Alexei Deviatov

    2006-01-01

    I study money creation in versions of the Trejos-Wright (1995) and Shi (1995) models with indivisible money and individual holdings bounded at two units. I work with the same class of policies as in Deviatov and Wallace (2001), who study money creation in that model. However, I consider an alternative notion of implementability–the ex ante pairwise core. I compute a set of numerical examples to determine whether money creation is beneficial. I find beneficial e?ects of money creation if indiv...

  1. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  2. Money creation in the modern economy

    OpenAIRE

    McLeay, Michael; Radia, Amar; Thomas, Ryland

    2014-01-01

    This article explains how the majority of money in the modern economy is created by commercial banks making loans. Money creation in practice differs from some popular misconceptions — banks do not act simply as intermediaries, lending out deposits that savers place with them, and nor do they ‘multiply up’ central bank money to create new loans and deposits. The amount of money created in the economy ultimately depends on the monetary policy of the central bank. In normal times, this is carri...

  3. Money and inflation: a functional relationship

    OpenAIRE

    Wolla, Scott A.

    2013-01-01

    They say that "money makes the world go round." Just imagine a world without money as our method of payment for everyday transactions. Without money, we would all need to barter for necessary goods and services. For example, suppose an accountant needs to have her car fixed. Under a barter system, she would have to find someone who needed some tax advice in exchange for car repairs. The search to find a barter partner is time consuming and wasteful. Money solves this problem and many others. ...

  4. Money growth and aggregate stock returns

    OpenAIRE

    Böing, Tobias; Stadtmann, Georg

    2016-01-01

    We empirically evaluate the predictive power of money growth measured by M2 for stock returns of the S&P 500 index. We use monthly US data and predict multiperiod returns over 1, 3, and 5 years with long-horizon regressions. In-sample regressions show that money growth is useful for predicting returns. Higher recent money growth has a significantly negative effect on subsequent returns of the S&P 500. An out-of-sample analysis shows that a simple model with money growth as a single predictor ...

  5. The Influence of Money on Goal Pursuit and Decision-Making: Understanding Money's Unique Impact on Goal Pursuit

    Science.gov (United States)

    Moran, Nora

    Previous research suggests that activating concepts of money and wealth can increase motivation to achieve personal goals. In this dissertation, I investigate how money affects pursuit of important personal goals, and how this motivation may be affected by goal attainability. In eight studies, I show that priming concepts of money and wealth leads individuals to pursue important personal goals to a greater degree than control groups, but only when a goal is more attainable. In contrast, when a goal is less attainable, those primed with money will be less likely to work towards goals relative to control groups. Furthermore, I examine why money may have a detrimental effect on motivation when individuals are faced with less attainable but important goals, and argue those primed with money become more concerned with maintaining a sense of efficacy, and thus disengage from pursuit when success is less certain. Thus, this research identifies the needs made salient by activating money--validating one's abilities. Finally, I show the relevance of these findings for consumer behavior, and discuss the additional implications of this work, as well as future research directions.

  6. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  7. Prospects for Money Transfer Models

    OpenAIRE

    Yougui Wang; Ning Ding; Ning Xi

    2005-01-01

    Recently, in order to explore the mechanism behind wealth or income distribution, several models have been proposed by applying principles of statistical mechanics. These models share some characteristics, such as consisting of a group of individual agents, a pile of money and a specific trading rule. Whatever the trading rule is, the most noteworthy fact is that money is always transferred from one agent to another in the transferring process. So we call them money transfer models. Besides e...

  8. Money, banks and endogenous volatility

    OpenAIRE

    Pere Gomis-Porqueras

    2000-01-01

    In this paper I consider a monetary growth model in which banks provide liquidity, and the government fixes a constant rate of money creation. There are two underlying assets in the economy, money and capital. Money is dominated in rate of return. In contrast to other papers with a larger set of government liabilities, I find a unique equilibrium when agents' risk aversion is moderate. However, indeterminacies and endogenous volatility can be observed when agents are relatively risk averse.

  9. "Show me the money": vulnerability to gambling moderates the attractiveness of money versus suspense.

    Science.gov (United States)

    Hahn, Cheryl; Wilson, Timothy D; McRae, Kaichen; Gilbert, Daniel T

    2013-10-01

    Do people take risks to obtain rewards or experience suspense? We hypothesized that people vulnerable to gambling are motivated more by the allure of winning money whereas people less vulnerable to gambling are motivated more by the allure of suspense. Consistent with this hypothesis, participants with high scores on a subscale of the Gambling Attitudes and Beliefs Survey--a measure of vulnerability to gambling--reported more of a motivation to earn money (pilot study), were more likely to accept a certain or near-certain amount of money than to gamble for that same amount (Studies 1-2), and worked harder to earn money (Study 3). People vulnerable to gambling also made more accurate predictions about how much they would gamble. People less vulnerable to gambling, in contrast, gambled more than people vulnerable to gambling, but did not know that they would.

  10. 24 CFR 81.83 - Civil money penalties.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Civil money penalties. 81.83... § 81.83 Civil money penalties. (a) Imposition. The Secretary may impose a civil money penalty on a GSE... writing of the Secretary's determination to impose a civil money penalty by issuing a Notice of Intent to...

  11. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  12. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  13. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  14. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  15. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  16. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  17. On Understanding Money

    OpenAIRE

    Martin Shubik

    2001-01-01

    Fiat money is a creation of both the state and society. Its value is supported by expectations which are conditioned by the dynamics of trust in government, the socio-economic structure and by outside events such as wars, plagues or political unrest. The micro-management of a dynamic economy is not far removed in difficulty from the micro-management of the weather. However, money and the financial institutions and instruments of a modern economy provide the means to influence expectations and...

  18. Money handling influences BMI: a survey of cashiers

    OpenAIRE

    Shraddha Karve; Ketaki Shurpali; Neelesh Dahanukar; Maithili Jog; Milind Watve

    2008-01-01

    Money is a recent phenomenon in the evolutionary history of man and therefore no separate brain centre to handle money is likely to have evolved. The brain areas activated by food reward and money reward are extensively overlapping. In an experimental set-up, hunger was demonstrated to influence money related decisions and money related thoughts to influence hunger. This suggests that the brain areas evolved for handling food related emotions are exapted to handle money and therefore there co...

  19. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  20. Money and the Quality of Life

    Directory of Open Access Journals (Sweden)

    Luburić Radoica

    2017-09-01

    Full Text Available This paper deals with the influence of money on the quality of life, in the light of the major importance it has on all aspects of our lives. Bearing in mind that money is an everyday, inseperable and unavoidable companion, with all its advantages and power, as well as its numerous challenges, risks and temptations, it inevitably affects all segments of the quality of life. The relation between money and quality of life, therefore, can be viewed not only theoretically, but also at a practical level. In the times we live in, which have been labelled the digital age, with ever increasing change, the key questions which arise are whether and to what extent do people really manage their money, and to what extent does money manage people and their lives, do people own money or does money own people? Although it sounds paradoxical, money causes people financial worries, whether they have it or whether they do not and so can significantly influence their quality of life. Standard macro-economic indicators, traditionally used as measures of the well-being of society, do not always give a real and complete picture of the quality of life, as this encompasses the way of life, as well as the standard of living. The quality of life includes the whole spectrum of factors, not only economic, but also many others which lead to satisfaction, both material and spiritual. These can include financial and material living conditions, employment, health, education, leisure time and social activities, economic and physical safety, human rights and freedoms, protection of the environment and overall life satisfaction. This paper analyses the direct and indirect connections between effective and efficient money management and the aforementioned factors which are decisive in forming the quality of life.

  1. Towards a digital money structure for illiterate users

    OpenAIRE

    Mesfin, WF; Ghinea, G; Atnafu, S

    2014-01-01

    In developing countries, although money is becoming digital in the form of mobile money, it is not easily used by millions of illiterate users in their everyday transactions. Digitization of material money thus poses a challenge to many users. Existing mobile money systems and platforms represent money in terms of simple numbers, like 13, 50, 0.78, 23.64, 80 etc. This way of money representation is almost unusable by illiterate users, unless they depend on others' help. The literature has ove...

  2. 'Strange money': risk, finance and socialized debt.

    Science.gov (United States)

    Dodd, Nigel

    2011-03-01

    This paper explores an essential but neglected aspect of recent discussions of the banking and financial system, namely money itself. Specifically, I take up a distinction drawn by Susan Strange which has never been fully elaborated: between a financial system that is global, and an international monetary system that remains largely territorial. I propose a sociological elaboration of this distinction by examining each category, 'finance' and 'money', in terms of its distinctive orientation to risk and debt. Money is distinguished by its high degree of liquidity and low degree of risk, corresponding to expectations that derive from its status as a 'claim upon society'- a form of socialized debt. But as Strange argued, these features of money are being undermined by the proliferation of sophisticated instruments of financial risk management -'strange money'- that, as monetary substitutes, both weaken states' capacity to manage money, and more broadly, contribute to 'overbanking'. The ultimate danger, according to Strange, is the 'death of money'. The paper concludes by exploring the implications of the distinction for sociological arguments about the changing nature of money. © London School of Economics and Political Science 2011.

  3. Regulating peer-to-peer network currency : Lessons from Napster and payment Systems

    NARCIS (Netherlands)

    Kasiyanto, Safari

    2015-01-01

    It was only yesterday when the central banks across the world shared a similar concerns about the rise of e-money as a ‘new’ form of money. Theoretically, e-money as a network good has the potential to achieve a position necessary to replace traditional money. If this happens, the central bank’s

  4. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  5. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  6. Money Demand Features in CEE Countries

    Directory of Open Access Journals (Sweden)

    Valentina-Ioana MERA

    2016-01-01

    Full Text Available The existence of a stable relationship between money demand and its determinants is important for the efficiency of monetary policy. In this paper we carried a preliminary analysis on the variables that can influence money demand in five Central and Eastern European countries (Bulgaria, Czech Republic, Hungary, Poland and Romania in order to determine which characteristics define the evolution of money demand and its determinants, and how volatile they are. The results indicate a number of similarities in terms of monetary development and also suggest that some additional variables that may influence money demand in this specific sample.

  7. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  8. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  9. 31 CFR 537.323 - U.S. registered money transmitter.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false U.S. registered money transmitter. 537.323 Section 537.323 Money and Finance: Treasury Regulations Relating to Money and Finance... General Definitions § 537.323 U.S. registered money transmitter. The term U.S. registered money...

  10. 31 CFR 538.319 - U.S. registered money transmitter.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false U.S. registered money transmitter. 538.319 Section 538.319 Money and Finance: Treasury Regulations Relating to Money and Finance... General Definitions § 538.319 U.S. registered money transmitter. The term U.S. registered money...

  11. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  12. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  13. Money creation and circulation in a credit economy

    Science.gov (United States)

    Xiong, Wanting; Fu, Han; Wang, Yougui

    2017-01-01

    This paper presents a multi-agent model describing the main mechanisms of money creation and money circulation in a credit economy. Our special attention is paid to the role of debt in the two processes. With the agent-based modeling approach, macro phenomena are well founded in micro-based causalities. A hypothetical economy composed of a banking system and multiple traders is proposed. Instead of being a pure financial intermediary, the banking system is viewed as the center of money creation and an accelerator of money circulation. Agents finance their expenditures not only by their own savings but also through bank loans. Through mathematical calculations and numerical simulation, we identify the determinants of money multiplier and those of velocity of money. In contrast to the traditional money creation model, the money multiplier is determined not only by the behavior of borrowing but also by the behavior of repayment as well. The velocity of money is found to be influenced by both money-related factors such as the expenditure habits of agents with respect to their income and wealth and debt-related factors such as borrowing and repayment behaviors of debtors and the reserve requirements faced by banks.

  14. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  15. Sex Differences in Money Pathology in the General Population.

    Science.gov (United States)

    Furnham, Adrian; von Stumm, Sophie; Fenton-O'Creevy, Mark

    This study examined sex differences in money beliefs and behaviours. Over 100,000 British participants completed two measures online, one of which assessed "money pathology" (Forman in Mind over money, Doubleday, Toronto, 1987), and the other four "money types", based on the emotional associations of money (Furnham et al. in Personal Individ Differ, 52:707-711, 2012). Nearly all measures showed significant sex differences with medium to large effect sizes, and with females exhibiting more "money pathology" than males. The biggest difference on the money types was on money being associated with generosity (money representing love) where men scored much lower than females, and autonomy (money representing freedom) where men scored higher than women. For men, more than women, money represented Power and Security. Men were more likely to be Hoarders while women did more emotional regulatory purchasing. Implications and limitations of this study are discussed.

  16. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  17. Money creation process in a random redistribution model

    Science.gov (United States)

    Chen, Siyan; Wang, Yougui; Li, Keqiang; Wu, Jinshan

    2014-01-01

    In this paper, the dynamical process of money creation in a random exchange model with debt is investigated. The money creation kinetics are analyzed by both the money-transfer matrix method and the diffusion method. From both approaches, we attain the same conclusion: the source of money creation in the case of random exchange is the agents with neither money nor debt. These analytical results are demonstrated by computer simulations.

  18. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  19. Energetic Issues Concerning the Content of Money

    OpenAIRE

    Negoescu Gheorghe; Radu Riana Iren

    2012-01-01

    In full times of crisis, money has become increasingly more important. We put the issue to analyze whether money can be considered a form of energy. The article is taking into consideration the conservation of energy and for money is due to kinetic energy during the boom and to potential energy during the crisis. In the article is also made an illustration of the energetic content of money at a company’s level.

  20. Anti-Money Laundering Requirements – Perceived Effectiveness

    OpenAIRE

    C. C. Huang; M. S. Amirrudin; N. A. Ahamad Noruddin; R. Othman

    2013-01-01

    Anti-money laundering is commonly recognized as a set of procedures, laws or regulations designed to reduce the practice of generating income through illegal actions. In Malaysia, the government and law enforcement agencies have stepped up their capacities and efforts to curb money laundering since 2001. One of these measures was the enactment of the Anti-Money Laundering Act (AMLA) in 2001. The implementation costs on anti-money laundering requirements (AMLR) can be burd...

  1. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  2. The Governance of Money Laundering

    DEFF Research Database (Denmark)

    Tsingou, Eleni

    2014-01-01

    What are the drivers behind the anti-money laundering (AML) governance framework? Who are the actors and institutions, and what is the policy content? This chapter provides an overview of the processes and mechanisms of AML policy-making. AML is often presented as a financial problem, and something......, moreover, that is key to debates about international political economy (IPE) since it goes to the heart of the integrity of the financial system and also, at least in principle, aims to impose controls on the movement of money. Yet, as a policy concern, thinking about money laundering was developed away...... from traditional settings for the regulation of global finance. Instead, AML policies were driven by and linked to the public policy objectives of law and order. As a result, the governance of money laundering encompasses a broad set of goals, techniques and professional knowledge. It brings together...

  3. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  4. Techniques for implementing anti-money laundering procedures

    OpenAIRE

    BEREZANSKY V.V.; CHALDAEVA L.A.; KILYACHKOV A.A.

    2016-01-01

    Manipulating the banking system for purposes of money laundering is a relatively new phenomenon. This problem was first identified in 1986 in the United States, when it was classified as a criminal offense. In Russia, anti-money laundering measures are regulated with Federal Law No. 115-FZ On Counteracting Money Laundering and the Financing of Terrorism (7 August 2001, as amended). Given the high-speed, digitized nature of banking transactions, the technology for countering money laundering s...

  5. European Regulatory Framework for Money Market Funds

    OpenAIRE

    Portuese, Aurelien; MacNeil, Iain

    2014-01-01

    Money market funds are widely used by all types of investors, including households, corporate treasurers, pension funds, or insurance companies, who regard money market funds as a ‘safe’ short-term liquid asset class for investing cash. In this case they are proxies to cash deposits. Money market funds are themselves key lenders to issuers of short dated high quality money market instruments. They provide an important source of funding for a variety of institutions such as sovereigns, banks, ...

  6. Money circulation and debt circulation: A restatement of quantity theory of money

    OpenAIRE

    Xing, Xiaoyun; Xiong, Wanting; Chen, Liujun; Chen, Jiawei; Wang, Yougui; Stanley, H. Eugene

    2018-01-01

    Both money and debt are products of credit creation of banks. Money is always circulating among traders by facilitating commodity transactions. In contrast, debt is created by borrowing and annihilated by repayment as it is matured. However, when this creation- annihilation process is mediated by banks which are constrained by a credit capacity, there exists continuous transfer of debt among debtors, which can be defined as debt circulation. This paper presents a multi-agent model in which in...

  7. Explaining money creation by commercial banks

    DEFF Research Database (Denmark)

    Ravn, Ib

    2015-01-01

    Educators and economists concerned with monetary reform face the extraordinary challenge of explaining to the public and its elected representatives not only what a reformed system would look like, but also how the current system works. Centrally, the point that in a modern economy money is largely...... created by commercial banks, as explained by the Bank of England recently (McLeay, Radia & Thomas, 2014b), is often met with incredulity: “What do you mean, created?” This paper introduces five easy-to-grasp analogies that educators and reformers may use to convey key money-creation concepts to a lay...... audience. The analogies offered include (1) money as patches in an expandable patchwork quilt that covers a nation’s real assets, (2) the money supply as water in a bathtub with a faucet and a drain, (3) money understood as debt in a model economy run by schoolchildren, (4) the misleading concept of a bank...

  8. Time and Money - Are they Substitutes?

    DEFF Research Database (Denmark)

    Bonke, Jens; Deding, Mette; Lausten, Mette

    In this paper, we analyse the distribution of time and money for Danish wage earner couples, where time is defined as leisure time and money as extended income, i.e. the sum of disposable income and the value of housework. The hypothesis is that individuals being rich in one dimension are more...... likely to be poor in the other dimension, such that individuals can be classified as either money-poor/time-rich or money-rich/time-poor. We analyse two different distributions of income, where the first assumes no sharing and the second complete sharing of income between spouses. The data are from...... the Danish Time-Use Survey 2001, merged with register data. Results show that the substitution of money for time is more prominent for women than for men, because they have a larger income share of time-intensive value of housework, while men have the larger share of disposable income. Furthermore, when...

  9. The Vulnerability of Correspondent Banking on Money Laundering

    OpenAIRE

    Handoyo, Sigit

    2017-01-01

    Bank has important role in process of converting illicit money to be legal proceeds. Once opportunity appears, money launderer will take advantage of that situation. Generally, banks which have poor anti-money laundering control become the main priority for offenders to process laundering their illicit money. These typical banks are usually high risk engaged in criminal behaviour, because they do not know whether or not their clients are engaged in money laundering activities. Offenders in ot...

  10. Gravity Models of Trade-based Money Laundering

    NARCIS (Netherlands)

    Ferwerda, J.|info:eu-repo/dai/nl/314405526; Kattenberg, M.A.C.|info:eu-repo/dai/nl/357208986; Chang, H.-S.; Unger, B.|info:eu-repo/dai/nl/290994926; Groot, L.F.M.|info:eu-repo/dai/nl/073642398; Bikker, J.A.|info:eu-repo/dai/nl/06912261X

    2011-01-01

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade

  11. Compliance and corporate anti-money laundering regulation

    Directory of Open Access Journals (Sweden)

    Pietro Pavone

    2018-04-01

    Full Text Available This paper, having traced the evolution of anti-money laundering legislation, defines and frames money laundering and terrorism financing risk inside corporate dynamics. Principles that must inspire corporate actions on the construction of an adequate managing structure to contain risks are set out, considering the fact that there is no risk that this does not have an economical content. This is even truer in the presented case, given that the Italian legislation to counter money laundering is focused on the innovative and modern risk-based approach, which has to guide the organization and functioning of corporations. Possible configuration of corporate anti-money laundering supervisions is therefore analyzed, with the aim of underlining the present connection between anti-money laundering legislation and rules referring to the government and to the internal control system. The present study originates from the interpretation of the new Italian anti-money laundering law. In particular, the first consideration that derives is that the new law does not impose precise obligations in terms of corporate anti-money laundering structure, but a large area of autonomy is left to the will of each company.

  12. The endogeneity of money and the eurosystem

    OpenAIRE

    Steiger, Otto

    2004-01-01

    The endogenous theory of money, developed by Basil Moore, argues that the supply of central bank money in modern economies is not under the control of the central bank. According to this view, a central bank typically supplies cash reserves automatically on demand at its minimum lending rate, resulting in a clearly horizontal money supply function. While the paper agrees with Moore that the supply of central bank money cannot be determined exogenously by the central bank, it wonders whether t...

  13. Endogenous money: the evolutionary versus revolutionary views

    OpenAIRE

    Louis-Philippe Rochon; Sergio Rossi

    2013-01-01

    The purpose of this paper is to shed light on the endogenous nature of money. Contrary to the established post-Keynesian, or evolutionary, view, this paper argues that money has always been endogenous, irrespective of the historical period. Instead of the evolutionary theory of money and banking that can be traced back to Chick (1986), this paper puts forward a revolutionary definition of endogenous money consistent with many aspects of post-Keynesian economics as well as with the monetary ci...

  14. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  15. Gravity Models of Trade-Based Money Laundering

    NARCIS (Netherlands)

    Ferwerda, Joras|info:eu-repo/dai/nl/314405526; Kattenberg, Marc|info:eu-repo/dai/nl/357208986; Chang, Han-Hsin|info:eu-repo/dai/nl/357209370; Unger, Brigitte|info:eu-repo/dai/nl/290994926; Groot, Loek|info:eu-repo/dai/nl/073642398; Bikker, Jaap|info:eu-repo/dai/nl/06912261X

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is trade-based money laundering (TBML), a special form of trade

  16. 75 FR 10059 - Money Market Fund Reform

    Science.gov (United States)

    2010-03-04

    ... contain adverse effects on the capital markets and other money market funds. In addition, throughout the... acquisition of second tier securities by money market funds might have a negative effect on those issuers of...; Treasury Strategies Comment Letter. Commenters asserted that eliminating money market funds' ability to...

  17. 78 FR 43000 - Financial Crimes Enforcement Network; Proposed Renewal Without Change; Comment Request...

    Science.gov (United States)

    2013-07-18

    ... Institution of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network, Department of... primary money laundering concern. This request for comments is being made pursuant to the Paperwork... Institution of Primary Money Laundering Concern. Office of Management and Budget Control Number: 1506-0036...

  18. The Determinants of Money Arguments between Spouses

    Directory of Open Access Journals (Sweden)

    Dorothy B. Durband

    2010-10-01

    Full Text Available A commonly held view is that arguments about money are associated with marital problems, but relatively little is known about the nature of arguing about money within marriage. Using data from the National Longitudinal Survey of Youth 1979 (NLSY79, this study uses a collective bargaining approach to examine the role of money arguments in marriage. The sample (N = 1,371 consists of married women. A collective bargaining framework provides a context for understanding money arguments within the marital relationship. Results indicate that costly communication is the dominant predictor of money arguments, followed by level and proportion of wife’s income, and household net worth. Because results suggest that both communication and financial resources are important components to understanding money arguments within marriage, a combination of professionals trained in marital therapy and/or financial planning is required for couples interested in seeking assistance to increase their satisfaction and/or avoid divorce.

  19. Stability of Money Demand Function in Pakistan

    Directory of Open Access Journals (Sweden)

    Haroon Sarwar

    2013-09-01

    Full Text Available The role, which money demand function plays in monetary policy formulation has attracted a lot of research studies to analyze this macroeconomic phenomenon. In the wake of current global and local economic and political upheavals, it is imperative to revisit the stability of money demand function. The study used the time series data and applied latest econometric techniques to find out the long run and short run money demand relationship. Moreover, all the three official monetary aggregates were used for finding out the most stable monetary demand relationship, which could provide correct signals for monetary policy formulation. The study found that broader monetary aggregate (M2 was the proper aggregate, which provided stable money demand function for Pakistan. The real GDP was positively related to the demand for real balances, while opportunity cost of money was negatively related. The study found that the role of financial innovation, in explaining the demand for money warrants attention in formulating monetary policy.

  20. The psychological science of money

    NARCIS (Netherlands)

    Bijleveld, E.H.; Aarts, H.A.G.

    2014-01-01

    The Psychological Science of Money brings together classic and current findings on the myriad ways money affects brain, mind, and behavior to satisfy not only our needs for material gain, but also for autonomy and self-worth. Leading experts trace the links between early concepts of value and modern

  1. A psychological perspective on money

    NARCIS (Netherlands)

    Bijleveld, E.H.; Aarts, H.A.G.; Bijleveld, E.H.; Aarts, H.A.G.

    2014-01-01

    A thriving field of inquiry, the psychological science of money has recently witnessed an upsurge in research attention. In the present volume, we bring together and integrate a number of theoretical perspectives on the question of ‘how does money affect people’s mind, brain, and behavior?’

  2. 42 CFR 493.1834 - Civil money penalty.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Civil money penalty. 493.1834 Section 493.1834... (CONTINUED) STANDARDS AND CERTIFICATION LABORATORY REQUIREMENTS Enforcement Procedures § 493.1834 Civil money... Secretary to impose civil money penalties on laboratories. Section 1846(b)(3) of the Act specifically...

  3. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  4. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  5. Is money laundering a true problem in China?

    Science.gov (United States)

    Ping, He

    2006-02-01

    Money laundering was stipulated as an offense by Chinese criminal law more than 10 years ago. However, the judicial situation is such that no one has yet been prosecuted for it. This article describes the phenomena that are closely related to money laundering, namely the current situation of the predicate offences and other factors conducive to money laundering such as corruption, underground bank shops, and shell companies. Based on these facts, the article infers that money laundering is a real problem in China. Then it explores the reasons why case examples of money laundering are not available. Finally, this article presents some of the factors necessary in the investigation of money laundering.

  6. "Introduction to an Alternative History of Money"

    OpenAIRE

    L. Randall Wray

    2012-01-01

    This paper integrates the various strands of an alternative, heterodox view on the origins of money and the development of the modern financial system in a manner that is consistent with the findings of historians and anthropologists. As is well known, the orthodox story of money's origins and evolution begins with the creation of a medium of exchange to reduce the costs of barter. To be sure, the history of money is "lost in the mists of time," as money's invention probably predates writing....

  7. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  8. Comparative characteristics of electronic, cash and cashless money

    Directory of Open Access Journals (Sweden)

    Ксенія Романівна Петрофанова

    2017-12-01

    The study of the peculiarities of electronic money is accompanied by the discovery of a large number of theoretical and practical problems and separate discussion issues of important application significance. As the number of e-money users increases with the development of e-commerce, protecting their interests requires proper civil and financial regulation. Comparing electronic money with cash and non-cash money, we found that they, by combining the benefits of the other two forms of money, actually became the third specific monetary form

  9. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  10. 42 CFR 460.46 - Civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Civil money penalties. 460.46 Section 460.46 Public...) Sanctions, Enforcement Actions, and Termination § 460.46 Civil money penalties. (a) CMS may impose civil money penalties up to the following maximum amounts: (1) For each violation regarding enrollment or...

  11. Understanding the mobile money ecosystem

    DEFF Research Database (Denmark)

    Tobbin, P.

    2011-01-01

    This paper discusses the structure of the new mobile money ecosystem and the roles of its key players. Mobile money is an evolving sector both in volume and in economic impact especially in the developing world. The paper is an exploratory study that investigates the structure of the ecosystem, p...

  12. Marital Satisfaction as it Related to Agreement on Money Matters and Money Management Competence Among Utah State University Married Students

    OpenAIRE

    Young, Carol S.

    1982-01-01

    The primary purpose of this study was to investigate the relationship between marital satisfaction, agreement on money matters, and money management competence among married couples at Utah State University . A sample of 43 student couples responded to a written questionnaire designed to measure the three variables. On all three variables measured, high scores indicated that both spouses rated themselves high on marital satisfaction, agreement on money matters, and money management competence...

  13. Money Laundering – an Economic Offence

    OpenAIRE

    Camelia ŞERBAN MORĂREANU

    2011-01-01

    Preventing and combating money laundering, the product of the transnational organized crime, in general, is one of the most efficient means of stopping this activity, which is a threat for the national or international economic operations. The penal incrimination and sanction of money laundering is a useful instrument for the accountability of all categories of offenders, but also with the purpose of imposing more severe sanctions for those who commit offences generating dirty money, behind s...

  14. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  15. 12 CFR 509.103 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Civil money penalties. 509.103 Section 509.103... PROCEDURE IN ADJUDICATORY PROCEEDINGS Local Rules § 509.103 Civil money penalties. (a) Assessment. In the... may serve an order of assessment of civil money penalty upon the party concerned. The assessment order...

  16. 42 CFR 73.21 - Civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Civil money penalties. 73.21 Section 73.21 Public... SELECT AGENTS AND TOXINS § 73.21 Civil money penalties. (a) The Inspector General of the Department of Health and Human Services is delegated authority to conduct investigations and to impose civil money...

  17. 48 CFR 31.205-10 - Cost of money.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Cost of money. 31.205-10....205-10 Cost of money. (a) General. Cost of money— (1) Is an imputed cost that is not a form of...) Refers to— (i) Facilities capital cost of money (48 CFR 9904.414); and (ii) Cost of money as an element...

  18. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  19. Acoustic monitoring of terrorist intrusion in a drinking water network

    NARCIS (Netherlands)

    Quesson, B.A.J.; Sheldon-Robert, M.K.; Vloerbergh, I.N.; Vreeburg, J.H.G.

    2009-01-01

    In collaboration with Kiwa Water Research, TNO (Netherlands Organisation for Applied Scientific Research) has investigated the possibilities to detect and classify aberrant sounds in water networks, using acoustic sensors. Amongst the sources of such sounds are pumps, drills, mechanical impacts,

  20. De witwasmeldplicht : omvang en handhaving van de witwasmeldplicht voor juridische en fiscale dienstverleners

    NARCIS (Netherlands)

    Stouten, M.

    2012-01-01

    The main question of this PhD thesis is whether for legal and fiscal service providers, the Dutch anti-money laundering reporting duty that is based on the Money Laundering and Terrorist Financing Prevention Act[1] (hereafter: Wwft) and its enforcement meet the principles of legal certainty, legal

  1. Chinas Response to Terrorism

    Science.gov (United States)

    2016-06-01

    regulations regarding terrorism and related activities (e.g., the 2006 Anti- Money iv Laundering Law), most notably the 2015 Counterterrorism... Money Laundering ASEAN Association for Southeast Asian Nations CASS Chinese Academy of Social Sciences CCP Chinese Communist Party CICIR China...the Financing of Terrorism” in 2006, and passed a new law governing money laundering in an effort to restrict access to funds available to terrorists

  2. A meme for money

    OpenAIRE

    Wray, L. Randall

    2012-01-01

    This paper argues that the usual framing of discussions of money, monetary policy, and fiscal policy plays into the hands of conservatives. That framing is also largely consistent with the conventional view of the economy and of society more generally. To put it the way that economists usually do, money "lubricates" the market mechanism-a good thing, because the conventional view of the market itself is overwhelmingly positive. Acknowledging the work of George Lakoff, this paper takes the pos...

  3. 12 CFR 1250.3 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Civil money penalties. 1250.3 Section 1250.3 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES FLOOD INSURANCE § 1250.3 Civil money... to § 1250.2, the Director of FHFA, or his or her designee, may assess civil money penalties against...

  4. The Influence of Money on Goal Pursuit and Decision-Making: Understanding Money's Unique Impact on Goal Pursuit

    OpenAIRE

    Moran, Nora

    2015-01-01

    Previous research suggests that activating concepts of money and wealth can increase motivation to achieve personal goals. In this dissertation, I investigate how money affects pursuit of important personal goals, and how this motivation may be affected by goal attainability. In eight studies, I show that priming concepts of money and wealth leads individuals to pursue important personal goals to a greater degree than control groups, but only when a goal is more attainable. In contrast, when...

  5. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  6. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  7. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  8. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  9. The love of money results in objectification.

    Science.gov (United States)

    Wang, Xijing; Krumhuber, Eva G

    2017-06-01

    Objectification, which refers to the treatment of others as objectlike things, has long been observed in capitalism. While the negative impact of money on interpersonal harmony has been well documented, the social cognitive processes that underlie them are relatively unknown. Across four studies, we explored whether the love of money leads to objectification, while controlling for social power and status. In Study 1, the love and importance attached to money positively predicted the tendency to construe social relationships based on instrumentality. In Study 2, the likelihood to favour a target of instrumental use was increased by momentarily activating an affective state of being rich. Temporarily heightening the motivation for money further resulted in deprivation of mental capacities of irrelevant others, including humans (Study 3) and animals (Study 4). This lack of perceived mental states partially mediated the effects of money on subsequent immoral behaviour (Study 4). The findings are the first to reveal the role of objectification as a potential social cognitive mechanism for explaining why money often harms interpersonal harmony. © 2016 The British Psychological Society.

  10. Measuring Money Demand Function in Pakistan

    OpenAIRE

    Hassan, Shahid; Ali, Umbreen; Dawood, Mamoon

    2016-01-01

    This study investigates the factors such as interest rate, GDP per capita, exchange rate, fiscal deficit, urban and rural population to determine money demand function for Pakistan over the period from 1972-2013. We use ARDL Bound Testing approach in order to test long run relation between money demand and its factors whereas both long and short run coefficients will be found using similar approach. The results show that real interest rate exerts significant and negative effect upon money dem...

  11. A Theory of Money and Banking

    OpenAIRE

    David Andolfatto; Ed Nosal

    2003-01-01

    We construct a simple environment that combines a limited communication friction and a limited information friction in order to generate a role for money and intermediation. We ask whether there is any reason to expect the emergence of a banking sector (i.e., institutions that combine the business of money creation with the business of intermediation). In our model the unique equilibrium is characterized, in part, by the existence of an agent that: (1) creates money (a debt instrument that ci...

  12. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  13. Austria announces new money for research infrastructure and social sciences

    CERN Multimedia

    2008-01-01

    Austria's Minister for Science and Research, Johannes Hahn, has announced funding for research infrastructures and the social sciences, amounting to EUR 6.9 million in total. The largest chunk of the money will go to a new data processing centre for the analysis of data from the European Organisation for Nuclear Research (CERN). The idea is that the new centre will provide Austria with access to the key technology for solving highly complex scientific and technological problems, while strengthening Austria's domestic research infrastructure in the field of 'advanced communication networks'.

  14. The Basics of the Money Flow Management of Enterprise

    Directory of Open Access Journals (Sweden)

    Tanklevska Nataliya S.

    2017-06-01

    Full Text Available Essence of the definition of «money flow» of enterprise has been researched. The theoretical basis for the formation of money flows of enterprise, including the developments by mercantilists, marxists, monetarists, and contemporaries has been systematized. Cycles of the money flow and its relationship to the circulation of economic means have been characterized. The money flow discounting factors have been determined, which include inflation, risk, and alternativeness of investment process. The economic, political, social, and techno-economic risks that impact the management of money flows of enterprise have been allocated. The classification of money flows of enterprises by various attributes has been provided. The main sources of formation and modalities of the optimal money flow structure of enterprise have been determined. The advantages and disadvantages of using financial resources to generate money flows of enterprise have been characterized.

  15. Fertility and money in an OLG model

    OpenAIRE

    Luciano Fanti

    2012-01-01

    We extend the two-period-lived-agent overlapping generations model with endogenous fertility and demand for money to understand whether and how the introduction of a money sector modifies what we have so far learned about fertility behaviours. It is shown that the existence of money may tend to exacerbate existing problems of either under-population or over-population.

  16. 12 CFR 908.6 - Civil money penalties.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Civil money penalties. 908.6 Section 908.6... Proceedings § 908.6 Civil money penalties. (a) Notice of assessment—(1) Grounds. The Finance Board may issue and serve a notice of assessment of a civil money penalty on any Bank or any executive officer or...

  17. The role of compensation in money market and new money market instruments Open

    OpenAIRE

    Duduiala-Popescu, Lorena

    2009-01-01

    Creation and proper functioning of the money market in Romania is subject to a preponderant constancy of private property, to support competition as a factor increasing the efficiency of the economy. Appearance money market in Romania is related to the transformations that have manifested in our country since 1989. As a mechanism of market economy, can not talk about them in existence before 1989. In a centralized economy, instruments, financial categories have ceased to reflect the actual si...

  18. The Design of a Large Scale Airline Network

    NARCIS (Netherlands)

    Carmona Benitez, R.B.

    2012-01-01

    Airlines invest a lot of money before opening new pax transportation services, for this reason, airlines have to analyze if their profits will overcome the amount of money they have to invest to open new services. The design and analysis of the feasibility of airlines networks can be done by using

  19. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  20. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  1. Money giveth, money taketh away: the dual effect of wealth on happiness.

    Science.gov (United States)

    Quoidbach, Jordi; Dunn, Elizabeth W; Petrides, K V; Mikolajczak, Moïra

    2010-06-01

    This study provides the first evidence that money impairs people's ability to savor everyday positive emotions and experiences. In a sample of working adults, wealthier individuals reported lower savoring ability (the ability to enhance and prolong positive emotional experience). Moreover, the negative impact of wealth on individuals' ability to savor undermined the positive effects of money on their happiness. We experimentally exposed participants to a reminder of wealth and produced the same deleterious effect on their ability to savor as that produced by actual individual differences in wealth, a result supporting the theory that money has a causal effect on savoring. Moving beyond self-reports, we found that participants exposed to a reminder of wealth spent less time savoring a piece of chocolate and exhibited reduced enjoyment of it compared with participants not exposed to wealth. This article presents evidence supporting the widely held but previously untested belief that having access to the best things in life may actually undercut people's ability to reap enjoyment from life's small pleasures.

  2. An elementary model of money circulation

    Science.gov (United States)

    Pokrovskii, Vladimir N.; Schinckus, Christophe

    2016-12-01

    This paper investigates money circulation for a system, consisting of a production system, the government, a central bank, commercial banks and many customers of the commercial banks. A set of equations for the system is written; the theory determines the main features of interaction between production and money circulation. Investigation of the equations in a steady-state situation reveals some relationship among output of the production system and monetary variables. The relation of quantity theory of money is confirmed, whereas a new concept of the efficiency of the system is introduced.

  3. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  4. Beyond the static money multiplier: in search of a dynamic theory of money

    OpenAIRE

    Berardi, Michele

    2007-01-01

    In this paper, we analyze the process of money creation in a credit economy. We start from the consideration that the traditional money multiplier is a poor description of this process and present an alternative and dynamic approach that takes into account the heterogeneity of agents in the economy and their interactions. We show that this heterogeneity can account for the instability of the multiplier and that it can make the system path-dependent. By using concepts and techniques borrowed f...

  5. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  6. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  7. Dynamic Analysis of Money Demand Function: Case of Turkey*

    OpenAIRE

    doğru, bülent

    2013-01-01

    In this paper, the dynamic determinants of money demand function and the long-run and short-run relationships between money demand, income and nominal interest rates are examined in Turkey for the time period 1980-2012. In particular we estimate a dynamic specification of a log money demand function based on Keynesian liquidity preference theory to ascertain the relevant elasticity of money demand. The empirical results of the study show that in Turkey inflation, exchange rate and money deman...

  8. An Industrial-Organization Approach to Money and Banking

    OpenAIRE

    Gunji, Hiroshi; Miyazaki, Kenji

    2016-01-01

    In this paper, we study the effect of conventional interest rate policy, quantitative easing and the reserve accounts’ interest rate on the money stock in an industrial-organization model of the banking industry with money creation. Our main findings are as follows. First, under a plausible setting of the parameters, the model with money creation supports the liquidity puzzle, in which tight monetary policy increases the money stock. Second, quantitative monetary easing has a similar effect. ...

  9. Less Is More: North American Case Studies on the Amalgamation of Policing

    Science.gov (United States)

    2017-09-01

    26 U.S. Department of State, Bureau for International Narcotics and Law Enforcement Affairs, “ Money Laundering and Terrorist Financing—A Global Threat...in International Narcotics Control Strategy Report, Volume II: Money Laundering and Financial Crimes (Washington, DC: U.S. Department of State...services. The contracting municipality sought to keep the cost at the lowest possible price point to save money , and the sheriff’s department sought to

  10. MONEY AS A GLOBAL PUBLIC GOOD

    OpenAIRE

    Popescu Alexandra-Codruta

    2009-01-01

    The main objective of this paper is to discuss a complex and yet not taken in consideration global public good: money. Money is a social convention created and accepted by people in order to facilitate economic transactions, being a symbol, without an int

  11. MONEY LAUNDERING AS A TYPE OF ORGANIZED CRIME

    Directory of Open Access Journals (Sweden)

    Stevan Aleksoski

    2015-07-01

    Full Text Available Laundry wash is a new form of crime that endangers stability, transparency and efficiency of financial systems, the developed countries and developing countries. One of the most widespread and simplest understanding, and according to some authors and simplest definition of the term money laundering is the conversion of "black money in green." The most comprehensive definition of the term money laundering would be the definition accepted by the G-7 and the FATF, as supplemented by the element of avoiding legal consequences. According to this definition the process of money laundering is: - "The process by which the gains for which it is believed to originate from criminal activity are transported, transferred, converted or incorporated into legal funds in order to conceal their origin, source, movement or ownership. The purpose of the process of money laundering through illegal activities to enable these funds to appear as legitimate, and persons involved in criminal activity to escape the legal consequences of such action. " Given that money laundering is an international problem, the national regulations of almost all countries contain provisions that prohibit and penalize any kind of organized crime aimed at acquiring illegal material benefit. The money acquired illegally, criminals need to legalize or black money to resort to legal financial flows in order to conceal their origin, source, movement or ownership.

  12. INTER-BANK CALL MONEY MARKET TRANSACTION IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Aries Haryadi

    2013-10-01

    Full Text Available AbstractThis study analyzes the effect of Indonesian Bank loan, the amount of demand deposits, and the Indonesia economic crisis in 1997 on the interbank call money market transactions in Indonesia using a multiple linear regression method. This study finds that the variables influencing the interbank call money market transactions are the interest rate of interbank call money market and the check money. Both variables have positive effect on the interbank money market transactions in Indonesia.Keywords: Loans, Interest Rate, Check Money, Monetary Crisis, Interbank Money Market TransactionsJEL Classification Numbers: G21, G28AbstrakPenelitian ini menganalisis pengaruh pinjaman Bank Indonesia terhadap tingkat bunga pasar uang antar bank, jumlah uang giral, dan krisis ekonomi Indonesia tahun 1997 terhadap transaksi pasar uang antar bank di Indonesia menggunakan metode regresi linier berganda. Penelitian ini menemukan bahwa variabel yang berpengaruh terhadap transaksi pasar uang antar bank tersebut adalah tingkat bunga pasar uang antar bank dan jumlah uang giral. Dua variabel tersebut berpengaruh positif terhadap transaksi pasar uang antar bank di Indonesia.Keywords: Pinjaman, Tingkat Bunga, Uang Giral, Krisis Moneter, Transaksi Pasar Uang antar BankJEL Classification Numbers: G21, G28

  13. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  14. 29 CFR 530.302 - Amounts of civil money penalties.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Amounts of civil money penalties. 530.302 Section 530.302... EMPLOYMENT OF HOMEWORKERS IN CERTAIN INDUSTRIES Civil Money Penalties § 530.302 Amounts of civil money penalties. (a) A civil money penalty, not to exceed $500 per affected homeworker for any one violation, may...

  15. MONEY ATTITUDES VS ECONOMIC SOCIALIZATION IN POLAND

    Directory of Open Access Journals (Sweden)

    Aneta KOWALCZYK

    2015-03-01

    Full Text Available This article concerns the attitudes people have towards money, analysed from an economic and psychological point of view. The article presents an overview of current knowledge on the issues of money attitudes, as well as derived own research derived. This research was designed in order to identify different types of money attitudes as well as their determinants. The study identified five dominant profiles and showed that the most popular is a rational approach, and second – it’s opposite - improvidence. The results have been faced with the most important economic socialization determinants identified during the literature review. The comparison proved to be important, e.g. in the form of receiving pocket money.

  16. Methods of Analysis of Electronic Money in Banks

    Directory of Open Access Journals (Sweden)

    Melnychenko Oleksandr V.

    2014-03-01

    Full Text Available The article identifies methods of analysis of electronic money, formalises its instruments and offers an integral indicator, which should be calculated by issuing banks and those banks, which carry out operations with electronic money, issued by other banks. Calculation of the integral indicator would allow complex assessment of activity of the studied bank with electronic money and would allow comparison of parameters of different banks by the aggregate of indicators for the study of the electronic money market, its level of development, etc. The article presents methods which envisage economic analysis of electronic money in banks by the following directions: solvency and liquidity, efficiency of electronic money issue, business activity of the bank and social responsibility. Moreover, the proposed indicators by each of the directions are offered to be taken into account when building integral indicators, with the help of which banks are studied: business activity, profitability, solvency, liquidity and so on.

  17. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  18. The impact of arbitrarily applicable relational responding on evaluative learning about hypothetical money and shock outcomes.

    Science.gov (United States)

    Dymond, Simon; Molet, Mikael; Davies, Lynette

    2017-08-01

    Evaluative learning comprises changes in preferences after co-occurrences between conditioned stimuli (CSs) and an unconditioned stimulus (US) of affective value. Co-occurrences may involve relational responding. Two experiments examined the impact of arbitrary relational responding on evaluative preferences for hypothetical money and shock outcomes. In Experiment 1, participants were trained to make arbitrary relational responses by placing CSs of the same size but different colours into boxes and were then instructed that these CSs represented different intensities of hypothetical USs (money or shock). Liking ratings of the CSs were altered in accordance with the underlying bigger/smaller than relations. A reversal of preference was also observed: the CS associated with the smallest hypothetical shock was rated more positively than the CS associated with the smallest amount of hypothetical money. In Experiment 2, procedures from Relational Frame Theory (RFT) established a relational network of more than/less than relations consisting of five CSs (A-B-C-D-E). Overall, evaluative preferences were altered, but not reversed, depending on (a) how stimuli had been related to one another during the learning phase and (b) whether those stimuli referred to money or shocks. The contribution of RFT to evaluative learning research is discussed.

  19. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  20. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  1. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  2. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  3. 29 CFR 502.19 - Civil money penalty assessment.

    Science.gov (United States)

    2010-07-01

    ... IMMIGRATION AND NATIONALITY ACT (SUSPENDED 6-29-2009) Enforcement of Work Contracts § 502.19 Civil money... money penalty for violation of the work contract will not exceed $1,000 for each violation committed... of the work contract, or for willful discrimination, the civil money penalty shall not exceed $5,000...

  4. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  5. 7 CFR 3560.462 - Money laundering.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Money laundering. 3560.462 Section 3560.462 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF... Other Actions § 3560.462 Money laundering. The Agency will act in accordance with U.S. Code Title 18...

  6. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  7. 29 CFR 500.143 - Civil money penalty assessment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Civil money penalty assessment. 500.143 Section 500.143... MIGRANT AND SEASONAL AGRICULTURAL WORKER PROTECTION Enforcement § 500.143 Civil money penalty assessment. (a) A civil money penalty may be assessed for each violation of the Act or these regulations. (b) In...

  8. 48 CFR 1631.205-10 - Cost of money.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Cost of money. 1631.205-10... AND PROCEDURES Contracts With Commercial Organizations 1631.205-10 Cost of money. For the purposes of FAR 31.205-10(b)(3), the estimated facilities capital cost of money is specifically identified if it...

  9. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  10. Gravity Models of Trade-Based Money Laundering

    OpenAIRE

    Ferwerda, Joras; Kattenberg, Marc; Chang, Han-Hsin; Unger, Brigitte; Groot, Loek; Bikker, Jaap

    2011-01-01

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade abuse that has been discovered only recently. TBML refers to criminal proceeds that are transferred around the world using fake invoices that under- or overvalue imports and exports. This article is a...

  11. Mobile Money and Local Development | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    New forms of mobile-based financial applications - known as mobile money ... and shared with teams presently implementing socially-motivated mobile money ... IWRA/IDRC webinar on climate change and adaptive water management.

  12. 29 CFR 801.42 - Civil money penalties-assessment.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Civil money penalties-assessment. 801.42 Section 801.42... APPLICATION OF THE EMPLOYEE POLYGRAPH PROTECTION ACT OF 1988 Enforcement § 801.42 Civil money penalties—assessment. (a) A civil money penalty in an amount not to exceed $10,000 for any violation may be assessed...

  13. The theory of money supply: a case study

    OpenAIRE

    Taylor, Leon

    2014-01-01

    The theory of money supply is less developed than that of money demand, largely because 19th-century economists believed that money was unimportant and because they viewed the central bank as either an appendage to the economy or as a welfare-maximizing black box. The paper reviews each of these beliefs in turn.

  14. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  15. Minding money: how understanding of value is culturally promoted.

    Science.gov (United States)

    Sato, Tatsuya

    2011-03-01

    Adding to the issues of cognitive economics (Cortes and Londoño IPBS: Integrative Psychological & Behavioral Science 43(2):178-184, 2009) and the social psychology of "shadow economics" (Salvatore et al. IPBS: Integrative Psychological & Behavioral Science 43(2), 2009), the carrier of economic exchanges, money, plays a key role in children's socialization in different societies. Money given to children, 'pocket money,' is a negotiated settlement between children's social demands and those of their parents. I analyze such negotiations here on the basis of a concrete case of a Korean family in which the provision of pocket money given the child was inconsistent over time. The results indicate the social ecology of money use, in both children and their parents, sets the stage for value construction of the meaning of money.

  16. 29 CFR 501.19 - Civil money penalty assessment.

    Science.gov (United States)

    2010-07-01

    ... workers. (c) A civil money penalty for each violation of the work contract or a requirement of 8 U.S.C..., with the following exceptions: (1) A civil money penalty for each willful violation of the work... 29 Labor 3 2010-07-01 2010-07-01 false Civil money penalty assessment. 501.19 Section 501.19 Labor...

  17. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  18. Some observations about the endogenous money theory

    OpenAIRE

    Bertocco Giancarlo

    2006-01-01

    The endogenous money theory constitutes the core element of the post-keynesian monetary theory. The first formulation of this theory can be found in the works of Kaldor published in the 1970s. Taking these studies as a starting point, the post-keynesians elaborated two versions of the endogenous money theory which differ in their assumptions about the behaviour of the monetary authorities and the banking system, and hence offer different conclusions about the slope of the money supply curve. ...

  19. Silvio Gesell's Theory and Accelerated Money Experiments

    OpenAIRE

    Jérôme Blanc

    1998-01-01

    A former version of this paper was published as “Free Money for Social Progress : Theory and practice of Gesell's accelerated money”, American Journal of Economics and Sociology, 57(8), October, 1998, pp. 469-483.; Silvio Gesell (1862-1930) proposed a system of stamped money in order to accelerate monetary circulation and to free money from interest. This was part of a global socialist system intended to free economy from rent and interest. In the 1930s, Irving Fisher, who proposed the system...

  20. Modelling the Demand for Money in Pakistan

    OpenAIRE

    Qayyum, Abdul

    2005-01-01

    The study estimates the dynamic demand for money (M2) function in Pakistan by employing cointegration analysis and error correction mechanism. The parameters of preferred model are found to be super-exogenous for the relevant class of interventions. It is found that the rate of inflation is an important determinant of money demand in Pakistan. The analysis reveals that the rates of interest, market rate, and bond yield are important for the long-run money demand behaviour. Since the preferred...

  1. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  2. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  3. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  4. The Cost of Collateralized Borrowing in the Colombian Money Market: Does Connectedness Matter?

    OpenAIRE

    Constanza Martínez; Carlos León

    2014-01-01

    Under the view that the market is a weighted and directed network (Barabási, 2003), this document is a first attempt to model the Colombian money market within a spatial econometrics framework. By estimating two standard spatial econometric models, we study the cost of collateralized borrowing (i.e. sell/buy backs) among Colombian financial institutions, and its relationship with the effects induced by traditional variables (leverage, size and borrowing levels), and by spatial variables resul...

  5. 76 FR 9268 - Financial Crimes Enforcement Network; Imposition of Special Measure Against the Lebanese Canadian...

    Science.gov (United States)

    2011-02-17

    ... Money Laundering Concern AGENCY: Financial Crimes Enforcement Network, Treasury (``FinCEN''), Treasury... financial institution of primary money laundering concern pursuant to 31 U.S.C. 5318A. FinCEN is issuing... Law 107-56. Title III of the USA PATRIOT Act amended the anti- money laundering provisions of the Bank...

  6. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  7. Illicit networks targeting the nexus between terrorists, proliferators, and narcotraffickers

    OpenAIRE

    Dietz, Rebekah K.

    2010-01-01

    Approved for public release; distribution is unlimited Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing ...

  8. Is spending money on others good for your heart?

    Science.gov (United States)

    Whillans, Ashley V; Dunn, Elizabeth W; Sandstrom, Gillian M; Dickerson, Sally S; Madden, Kenneth M

    2016-06-01

    Does spending money on others (prosocial spending) improve the cardiovascular health of community-dwelling older adults diagnosed with high blood pressure? In Study 1, 186 older adults diagnosed with high blood pressure participating in the Midlife in the U.S. Study (MIDUS) were examined. In Study 2, 73 older adults diagnosed with high blood pressure were assigned to spend money on others or to spend money on themselves. In Study 1, the more money people spent on others, the lower their blood pressure was 2 years later. In Study 2, participants who were assigned to spend money on others for 3 consecutive weeks subsequently exhibited lower systolic and diastolic blood pressure compared to participants assigned to spend money on themselves. The magnitude of these effects was comparable to the effects of interventions such as antihypertensive medication or exercise. Together, these findings suggest that spending money on others shapes cardiovascular health, thereby providing a pathway by which prosocial behavior improves physical health among at-risk older adults. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  9. 31 CFR 103.137 - Anti-money laundering programs for insurance companies.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Anti-money laundering programs for... Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Anti-Money Laundering Programs Anti-Money Laundering Programs § 103.137 Anti-money laundering programs for insurance companies...

  10. Endogenous money supply and the business cycle

    OpenAIRE

    William T. Gavin; Finn E. Kydland

    1996-01-01

    This paper documents changes in the cyclical behavior of nominal data series that appear after 1979:Q3 when the Federal Reserve implemented a policy to lower the inflation rate. Such changes were not apparent in real variables. A business cycle model with impulses to technology and a role for money is used to show how alternative money supply rules are expected to affect observed business cycle facts. In this model, changes in the money supply rules have almost no effect on the cyclical behav...

  11. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  12. 48 CFR 1830.7002-4 - Determining imputed cost of money.

    Science.gov (United States)

    2010-10-01

    ... money. 1830.7002-4 Section 1830.7002-4 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND... Determining imputed cost of money. (a) Determine the imputed cost of money for an asset under construction, fabrication, or development by applying a cost of money rate (see 1830.7002-2) to the representative...

  13. 31 CFR 103.130 - Anti-money laundering programs for mutual funds.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Anti-money laundering programs for... Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Anti-Money Laundering Programs Anti-Money Laundering Programs § 103.130 Anti-money laundering programs for mutual funds. (a) For...

  14. Free Money!

    Science.gov (United States)

    Anderson, Cynthia

    2011-01-01

    School library budgets are about as miserably low or nonexistent as many librarians have ever seen. The population of school librarians who have not just one, but "many" school libraries to manage is growing. Time and funds are short, and needs for books, programming, and technology are high. Grant money is out there for librarians, and the author…

  15. 48 CFR 52.215-16 - Facilities Capital Cost of Money.

    Science.gov (United States)

    2010-10-01

    ... Money. 52.215-16 Section 52.215-16 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION....215-16 Facilities Capital Cost of Money. As prescribed in 15.408(h), insert the following provision: Facilities Capital Cost of Money (JUN 2003) (a) Facilities capital cost of money will be an allowable cost...

  16. 45 CFR 160.404 - Amount of a civil money penalty.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Amount of a civil money penalty. 160.404 Section... RELATED REQUIREMENTS GENERAL ADMINISTRATIVE REQUIREMENTS Imposition of Civil Money Penalties § 160.404 Amount of a civil money penalty. (a) The amount of a civil money penalty will be determined in accordance...

  17. Value and money in Marx

    Directory of Open Access Journals (Sweden)

    Fahd Boundi Chraki

    2018-04-01

    Full Text Available The aim of this paper is to examine the link between Marx's monetary theory and its explanation of value, production and circulation. For this, it presents the basic theoretical elements that allow a critique of the quantitative theory, the Chartalist conception of the genesis of money and the post-Keynesian theory of endogenous money. Then, from a Marxist perspective, it analyzes the controversial relationship between the monetization of public debt and the increase in the general level of prices.

  18. Endogenous money, circuits and financialization

    OpenAIRE

    Malcolm Sawyer

    2013-01-01

    This paper locates the endogenous money approach in a circuitist framework. It argues for the significance of the credit creation process for the evolution of the economy and the absence of any notion of ‘neutrality of money’. Clearing banks are distinguished from other financial institutions as the providers of initial finance in a circuit whereas other financial institutions operate in a final finance circuit. Financialization is here viewed in terms of the growth of financial assets an...

  19. Bitcoin: Informational Money en het Einde van Gewoon Geld

    NARCIS (Netherlands)

    Bergstra, J.A.

    2014-01-01

    Deze paper bevat een verkorte beschrijving van de Nakamoto architectuur voor informational money, een positionering van Bitcoin, een "money-like informational commodity", als een verschijningsvorm van iGoud, en een bespiegeling over de vraag hoe hoe informational money het einde van Gewoon Geld in

  20. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  1. 76 FR 72878 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Imposition of...

    Science.gov (United States)

    2011-11-28

    ... Iran as a Jurisdiction of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network... Republic of Iran (``Iran'') is a jurisdiction of primary money laundering concern pursuant to 31 U.S.C... Act amends the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S...

  2. Mean field approximation for biased diffusion on Japanese inter-firm trading network.

    Science.gov (United States)

    Watanabe, Hayafumi

    2014-01-01

    By analysing the financial data of firms across Japan, a nonlinear power law with an exponent of 1.3 was observed between the number of business partners (i.e. the degree of the inter-firm trading network) and sales. In a previous study using numerical simulations, we found that this scaling can be explained by both the money-transport model, where a firm (i.e. customer) distributes money to its out-edges (suppliers) in proportion to the in-degree of destinations, and by the correlations among the Japanese inter-firm trading network. However, in this previous study, we could not specifically identify what types of structure properties (or correlations) of the network determine the 1.3 exponent. In the present study, we more clearly elucidate the relationship between this nonlinear scaling and the network structure by applying mean-field approximation of the diffusion in a complex network to this money-transport model. Using theoretical analysis, we obtained the mean-field solution of the model and found that, in the case of the Japanese firms, the scaling exponent of 1.3 can be determined from the power law of the average degree of the nearest neighbours of the network with an exponent of -0.7.

  3. 42 CFR 3.404 - Amount of a civil money penalty.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Amount of a civil money penalty. 3.404 Section 3... money penalty. (a) The amount of a civil money penalty will be determined in accordance with paragraph (b) of this section and § 3.408 of this subpart. (b) The Secretary may impose a civil money penalty...

  4. Money Demand and Inflation in Dollarized Economies; The Case of Russia

    OpenAIRE

    Franziska L Ohnsorge; Nienke Oomes

    2005-01-01

    Money demand in dollarized economies often appears to be highly unstable, making it difficult to forecast and control inflation. In this paper, we show that a stable money demand function for Russia can be found for "effective broad money," which includes an estimate of foreign cash holdings. Moreover, we find that an excess supply of effective broad money is inflationary, while other excess money measures are not, and that effective broad money growth has the strongest and most persistent ef...

  5. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  6. Some Clarity on Banks as Financial Intermediaries and Money 'Creators'

    OpenAIRE

    Robert W Vivian and Nicholas Spearman

    2015-01-01

    Although the phrase ‘banks create money’ forms part of popular discourse, it has precipitated a factually incorrect understanding of a bank’s role in the money creation process. Bank money creation is the result of an underlying value-for-value exchange transaction; the bank facilitates the transaction, takes over responsibility for obligations created and records the money created—the bank is not the source of money creation. This has long been understood, even if it is not immediate...

  7. Do Danish children and young people receive pocket money?

    OpenAIRE

    Jens Bonke

    2013-01-01

    The aim of this study is to determine the extent to which Danish parents give their children pocket money, including an examination of whether there is a correlation between the amount of pocket money given and children’s income from paid work. We also examine the significance of parents’ income for the amount of pocket money they give to their children, and we consider how children use their income in relation to the amount of their pocket money and earnings. Finally, we examine the relation...

  8. Money, prices and liquidity effects: Separating demand from supply

    OpenAIRE

    Chadha, Jagjit S.; Corrado, Luisa; Sun, Qi

    2008-01-01

    In the canonical monetary policy model, money is endogenous to the optimal path for interest rates and output. But when liquidity provision by banks dominates the demand for transactions money from the real economy, money is likely to contain information for future output and inflation because of its impact on financial spreads. And so we decompose broad money into primitive demand and supply shocks. We find that supply shocks have dominated the time series in both the UK and the US in the sh...

  9. NEW TRENDS AND PERSPECTIVES IN THE MONEY LAUNDERING PROCESS

    OpenAIRE

    ANA ALINA DUMITRACHE; GEORGETA MODIGA

    2011-01-01

    Due to its complexity, the crime of money laundering can be committed through a variety of methods which are in a constantly evolving. It seems that money launderers are always one step ahead of authorities. They find new and various ways to launder the proceeds of crime despite the efforts of the law enforcement authorities to develop the best tools to stop or at least to make difficult the criminal activity of money laundering. This study aims to analyze the latest money laundering typologi...

  10. Resilience of natural gas networks during conflicts, crises and disruptions.

    Directory of Open Access Journals (Sweden)

    Rui Carvalho

    Full Text Available Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied.

  11. Examining ISIS Support and Opposition Networks on Twitter

    Science.gov (United States)

    2016-01-01

    Examining ISIS Support and Opposition Networks on Twitter Elizabeth Bodine-Baron, Todd C. Helmus, Madeline Magnuson, Zev Winkelman C O R P O R A T...Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers...and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to cas- tigate the ISIS message. This report draws on

  12. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  13. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  14. Money Supply as the Target of the Central Bank

    Directory of Open Access Journals (Sweden)

    Jędruchniewicz Andrzej

    2014-06-01

    Full Text Available The main purpose of the article is a critical analysis of the monetary policy strategy that is based on the adoption of money supply as an intermediate target. The analysis is conducted from the perspective of the theory of the Austrian school. The first part of the article presents an influence of the supply of money on changes of categories in economy according to mainstream theories of economics. The second part discusses the essence of the strategy of monetary policy using money supply as an intermediate target from the point of view of the main trend in economics. It is demonstrated that in order to use it, two elementary conditions must be met: the function of demand for money must be at least relatively stable and the central bank must practically shape changes in the money supply at the planned level. The third part is of key importance for the purpose of this article. It involves the criticism of Friedman’s principle, i.e. a constant increase in money supply as a monetary strategy. According to the Austrian theory, an increase in the quantity of money which is not financed by voluntary savings separates the time structure of production and consumption. Thus, after the period of prosperity there a collapse in production must take place. It is also pointed out that the crisis can be postponed only when the quantity of money increases at an ever faster rate.

  15. Pennies from heaven? Conceptions and earmarking of lottery prize money.

    Science.gov (United States)

    Hedenus, Anna

    2014-06-01

    The source of money has been shown to be important for how money is spent. In addition, sudden wealth is often associated with social and psychological risks. This article investigates if conceptions of lottery prize money--as a special kind of money--imply restrictions on how it can be spent. Analysis of interviews with lottery winners shows that interviewees use earmarking of the prize money as a strategy for avoiding the pitfalls associated with a lottery win. Conceptions of lottery prize money as 'a lot' or as 'a little', as shared or personal, and as an opportunity or a risk, influences the ends for which it is earmarked: for self-serving spending, a 'normal' living standard, paying off loans, saving for designated purposes, or for economic security and independence. Clearly defining and earmarking lottery prize money thus helps lottery winners construe their sudden wealth, not as a risk, but as 'pennies from heaven.' © London School of Economics and Political Science 2014.

  16. Capitalism, money and banking: a critique of recent historical sociology.

    Science.gov (United States)

    Ingham, G

    1999-03-01

    A conception of money as a 'neutral veil' masking a 'real' economy was adopted by orthodox economic theory after the Methodenstreit, and is also to be found, in a different form, in Marxian political economy. Both derive from an erroneous functionalist and anachronistic 'commodity' theory of money which, as Post-Keynesian economists argue, cannot explain the distinctive form of capitalist credit-money. Orthodox economic theory and classic Marxism have tacitly informed and flawed historical sociology's understanding of money's role in capitalist development. Mann and Runciman, for example, consider the 'economy' exclusively in terms of the social relations of production and imply that money is epiphenomenal and is to be explained as a response to the needs of the 'real' economy. They do not recognize the structural specificity of capitalist money and banking nor its importance. An alternative account of the autonomous historical conditions of existence of the specifically capitalist form of bank and state credit-money and its role in capitalist development is outlined.

  17. 12 CFR 622.60 - Payment of civil money penalty.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Payment of civil money penalty. 622.60 Section... Rules and Procedures for Assessment and Collection of Civil Money Penalties § 622.60 Payment of civil money penalty. (a) Payment date. Generally, the date designated in the notice of assessment for payment...

  18. 42 CFR 438.704 - Amounts of civil money penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Amounts of civil money penalties. 438.704 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE Sanctions § 438.704 Amounts of civil money penalties. (a) General rule. The limit on, or the maximum civil money penalty the State may impose varies...

  19. Empowering Volunteer Money Sense Advisors at a Military Installation.

    Science.gov (United States)

    Wright, Joan; Varcoe, Karen

    Because money management is often a problem for lower-level military personnel, a resource management educational program called Money Sense was started by the University of California Cooperative Extension at Edwards Air Force Base in 1985. Volunteers for Money Sense were recruited at the base; they attended eight sessions on teaching techniques…

  20. Corporate responsibility and prevention of money laundering

    Directory of Open Access Journals (Sweden)

    Đurđević Dragan Ž.

    2015-01-01

    Full Text Available This paper analyzes corporate responsibility and prevention of money laundering from the point of view of the new emerging business enviroinment, while taking into account the aspects of risk and legal responsibility. Furthermore, it analyzes the legal foundation, international standards, as well as the national Serbian regulatory system approach to anti-money laundering battle. The paper points to the key elements of anti-money laundering activities aimed at protection and safeguarding business interests, using the principles like 'knowing your client well', protecting your employees etc. By doing so, we also protect national interests, increase security and maintain the rule of law and of the stability of democratic society and institutions. Special focus is placed on the activities, roles and responsibilities of management in recognizing money laundering indicators and typologies, as well as the education of corporate staff in this area so as to be able to detect the aforementioned illegal activities in a timely manner.

  1. The Development of Anti-Money Laundering Regime: Challenging issues to sovereignty, jurisdiction, law enforcement, and their implications on the effectiveness in countering money laundering

    NARCIS (Netherlands)

    H. Amrani (Hanafi)

    2012-01-01

    textabstractThere is a relationship between money laundering and anti-money laundering regime (hereinafter referred to as ‘AML-regime’). On the one hand, money laundering has significantly increased following the development of technology that offers complicated, sophisticated, and professional

  2. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  3. Money Supply, Interest Rate, and Economic Growth in Cameroon: A ...

    African Journals Online (AJOL)

    Money Supply, Interest Rate, and Economic Growth in Cameroon: A Time Series ... the impacts of money and interest rate on economic growth and development. ... Money Supply, Interest Rates, Economic growth, Co-integration and Inflation.

  4. Cross-country Evidence on the Demand for Money

    OpenAIRE

    Serletis , Apostolos; Vaccaro , Jason

    2006-01-01

    In this article we examine money demand issues using cross-country data, for 48 countries over the 1980-1995 period. In particular, we investigate conventional money demand functions, for both narrow and broad aggregates, and the role that institutions, financial structure and financial development may have in the demand for money. On the basis of possible heterogeneity within the cross-country data set, we exploit Bayesian classification and finite mixture models to partition the data based ...

  5. A General Outlook to the Endogenous Money Theory

    OpenAIRE

    ÖZGÜR, Gökçer

    2008-01-01

    The purpose of this study is to shed light on theorigins of the endogenous money theory and analyze the currentdebates on this topic. Endogenous money approach depends on a fundamental postulate: As banks meet the credit needs ofnon-financial businesses, new deposits emerge in the banking sector. Similarly,as the necessary reserves found for these new deposits the broad money expandsas well. Even though the central bank can intervene into this process it cannotfully control it. There...

  6. Money laundering in Dubai: strategies and future directions

    OpenAIRE

    Belaisha, Belaisha; Brooks, Graham

    2014-01-01

    Purpose\\ud – This paper aims to highlight present strategies to prevent money laundering in Dubai.\\ud \\ud Design/methodology/approach\\ud – Thirty semi-structured interviews were conducted with Anti Money Laundering Suspicion Cases Unit (AMLSCU), Anti Organized Crime Department (AOCD) and Central Bank employees.\\ud \\ud Findings\\ud – This paper shows that AMLSCU, AOCD and Central Bank employees are aware that future strategies to prevent money laundering are needed.\\ud \\ud Research limitations/...

  7. Money and Output: A Test of Reverse Causation.

    OpenAIRE

    Coleman, Wilbur John, II

    1996-01-01

    This paper attempts to explain the correlation between money and output at various leads and lags with a model in which money is largely neutral and endogenously responds to output. Money is endogenous because both monetary policy and deposit creation are endogenous. Parameters are selected according to the simulated moments estimation technique. While the estimated model succeeds along some dimensions in matching properties of postwar U.S. data, its failure to match key patterns of lead-lag ...

  8. EXOGENOUS OR ENDOGENOUS MONEY SUPPLY: EVIDENCE FROM AUSTRALIA

    OpenAIRE

    ZATUL E. BADARUDIN; AHMED M. KHALID; MOHAMED ARIFF

    2012-01-01

    This paper investigates the nature of money supply in Australia over two separate monetary policy regimes: monetary and inflation targeting. The post-Keynesian theory on endogenous money was tested with the aim of investigating whether endogenous money supply, if it did exist, followed the accomodationist, structuralist or liquidity preference viewpoints. Data used are quarterly series from 1977 to 2007 and we used vector error-correction model for long-run and short-run causality tests. We f...

  9. Horizontalists, verticalists, and structuralists: The theory of endogenous money reassessed

    OpenAIRE

    Palley, Thomas I.

    2013-01-01

    This paper uses the occasion of the twenty-fifth anniversary of Basil Moore’s book, Horizontalists and Verticalists, to reassess the theory of endogenous money. The paper distinguishes between horizontalists, verticalists, and structuralists. It argues Moore’s horizontalist representation of endogenous money was an over-simplification that discarded important enduring insights from monetary theory. The structuralist approach to endogenous money retains the basic insight that the money supply ...

  10. 31 CFR 103.20 - Reports by money services businesses of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... immediate attention, such as ongoing money laundering schemes, the money services business shall immediately... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by money services businesses of suspicious transactions. 103.20 Section 103.20 Money and Finance: Treasury Regulations Relating to...

  11. A historical analysis of the theories of money

    Directory of Open Access Journals (Sweden)

    Farah Durani

    2016-03-01

    Full Text Available Money, the most complex idea to understand is labelled a subject of disagreement and a thorough confusion among economists. “Money” has been fortunate enough a topic to receive ample attention from the philosophers. Economic literature is replete with theories concerning the understanding and behavior of money from different historic eras. The present day knowledge of money is very limited when it comes to understanding what actually it can be. Most of the common strata of people believe that the money is something that is determined by the governments. People generally hold the view that citizens have a legitimate duty incumbent upon them to honor the payment systems stipulated by the authorities. This Research Paper aims at bringing together most of the prominent contributions of greatest philosophers of money and clearly demarcates various schools of monetary thought be it the Classical, Neo-Classical or the Heterodox. The aims of this chapter are to review the relevant theories concerning the understanding of money, to present the monetary dogmas of historical times in a proper chronological order, to establish a link between the predecessor and the successor, to elaborate on the most obscure confusions and their causes in an easy to understand parlance and to deviate from the mainstream to discuss the Heterodox yet appealing school of thought.

  12. 39 CFR 762.43 - Issuance of substitute disbursement postal money order.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Issuance of substitute disbursement postal money...; DISBURSEMENT POSTAL MONEY ORDERS DISBURSEMENT POSTAL MONEY ORDERS Issuance of Substitutes for Lost, Destroyed, Mutilated, and Defaced Disbursement Postal Money Orders § 762.43 Issuance of substitute disbursement postal...

  13. Follow The Money

    DEFF Research Database (Denmark)

    Batikas, Michail; Claussen, Jörg; Peukert, Christian

    Online copyright enforcement, in the form of either direct action against the supply- side (via website shutdowns) or the demand-side (via individual lawsuits against users), has not been very effective in reducing piracy. Regulators have therefore put forward the so called “follow the money...

  14. Money Talks Series: Hunger Attack! (Teen Guide)

    OpenAIRE

    2007-01-01

    Investigate how the food you choose affects the amount of money you spend and your health. Calculate how much money you spend on food, explore motives for your food choices, examine the nutritional quality of the food you buy, and identify easy ways to make healthier, lower cost food choices.

  15. A Goldsmith Exercise for Learning Money Creation

    Science.gov (United States)

    Pearlman, Sarah; Rebelein, Robert P.

    2013-01-01

    In this article, the authors outline a classroom exercise involving goldsmiths designed to improve undergraduate students' understanding of how banks create money. This concept is important to macroeconomics and money and banking courses, yet students frequently struggle with it, largely due to the nonphysical nature of deposits and reserves.…

  16. Organizational-methodical provisions for the audit of operations with electronic money

    Directory of Open Access Journals (Sweden)

    Semenetz A.P.

    2017-06-01

    Full Text Available To obtain objective and unbiased information about the accuracy and completeness of electronic money transactions at the enterprise, it is necessary to conduct an audit. The results of the external audit of electronic money transactions help the company’s management personnel to assess the efficiency and rationality of using such a modern means of payment, such as electronic money, as well as verify the proper functioning of the internal control service. The work substantiates organizational and methodical provisions of the process of conducting an external audit of transactions with electronic money in terms of clarifying the organizational provisions for conducting an audit of transactions with electronic money, namely the definition of the purpose, task, subjects and objects of audit and sources of information. Accordingly, the purpose of the audit of operations with electronic money is to provide the auditor’s unbiased opinion on the reliability of the financial statements of the enterprise in terms of operations with electronic money. Within the scope of this dissertation, the object of external audit is operations with electronic money, since electronic money is a new and contemporary object of accounting, and therefore the development of scientifically grounded order of conducting external audit of the investigated object is necessary. The subject of an external audit of electronic money transactions is a set of business transactions in electronic money settlements, that is, transactions with their acquisition and repayment and the accuracy of displaying information about them in the financial statements. In the course of the study, the procedure for the implementation of external audit procedures during the stages of the process of electronic money audit at the enterprise was determined, which allowed to confirm the correctness of the accounting of a new and modern means of payment such as electronic money. These proposals are aimed

  17. NEW TRENDS AND PERSPECTIVES IN THE MONEY LAUNDERING PROCESS

    Directory of Open Access Journals (Sweden)

    ANA ALINA DUMITRACHE

    2011-04-01

    Full Text Available Due to its complexity, the crime of money laundering can be committed through a variety of methods which are in a constantly evolving. It seems that money launderers are always one step ahead of authorities. They find new and various ways to launder the proceeds of crime despite the efforts of the law enforcement authorities to develop the best tools to stop or at least to make difficult the criminal activity of money laundering. This study aims to analyze the latest money laundering typologies approaching online payment systems, virtual casinos, electronic auctions and Internet gambling.

  18. The role of money in modern macro models

    OpenAIRE

    Seitz, Franz; Schmidt, Markus A.

    2013-01-01

    This paper is the starting point of a series of analyses aiming at re-discovering the role of money for monetary policy purposes. It provides an overview of the role of money in modern macro models. In particular, we are focussing on New Keynesian and New Monetarist models to investigate their main findings and most significant shortcomings in considering money properly. As a further step, we ask about the role of financial intermediaries in this respect. In dealing with these issues, we dist...

  19. An absolute scale for measuring the utility of money

    Science.gov (United States)

    Thomas, P. J.

    2010-07-01

    Measurement of the utility of money is essential in the insurance industry, for prioritising public spending schemes and for the evaluation of decisions on protection systems in high-hazard industries. Up to this time, however, there has been no universally agreed measure for the utility of money, with many utility functions being in common use. In this paper, we shall derive a single family of utility functions, which have risk-aversion as the only free parameter. The fact that they return a utility of zero at their low, reference datum, either the utility of no money or of one unit of money, irrespective of the value of risk-aversion used, qualifies them to be regarded as absolute scales for the utility of money. Evidence of validation for the concept will be offered based on inferential measurements of risk-aversion, using diverse measurement data.

  20. 39 CFR 762.28 - Release of original disbursement postal money orders.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Release of original disbursement postal money... and Processing of Disbursement Postal Money Orders § 762.28 Release of original disbursement postal money orders. An original Disbursement Postal Money Order may be released to a responsible endorser only...