2015
DOI: 10.4018/ijrcm.2015010101
|View full text |Cite
|
Sign up to set email alerts
|

What and Where are the Risks of International Terrorist Attacks

Abstract: There seems to be a great deal of attention in the media given to global terrorism but the authors do not know what and where the actual risks are. Western countries such as Australia, UK, and USA have invested a great amount of financial resources to combat global terrorism yet there is a concern the investments outweigh the risk. Furthermore, there are some people who question the reality of global terrorism. To explore these issues, this study analyzes the global terrorism empirical evidence from 1970 to 20… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…No older than six years. A current relevant literature review is important to establish research credibility because the worldwide business macroenvironment is changing rapidly owing to key megatrends such as the continuing economic instability after the 2008 global fiscal collapse (Mataira et al, 2014, Read, 2012, Strang, 2012c, longitudinal global terrorism-data security threats, (Strang, 2014c, Strang andAlamieyeseigha, 2015) and increased cross-cultural sharing of knowledge through the Internet (Goodwin andStrang, 2012, Strang andVajjhala, 2015).…”
Section: Contemporary Not-for-profit Critical Success Factorsmentioning
confidence: 99%
“…No older than six years. A current relevant literature review is important to establish research credibility because the worldwide business macroenvironment is changing rapidly owing to key megatrends such as the continuing economic instability after the 2008 global fiscal collapse (Mataira et al, 2014, Read, 2012, Strang, 2012c, longitudinal global terrorism-data security threats, (Strang, 2014c, Strang andAlamieyeseigha, 2015) and increased cross-cultural sharing of knowledge through the Internet (Goodwin andStrang, 2012, Strang andVajjhala, 2015).…”
Section: Contemporary Not-for-profit Critical Success Factorsmentioning
confidence: 99%
“…On the other hand, constant deprivation can render violence a more appealing way of earning a living (Kivel, ), while peaceful options offer few prospects. However, there is very little empirical evidence on socioeconomic profiles of conflict‐affected populations (Strang & Alamieyeseigha, ). An expanding body of literature has acknowledged many features connected with the likelihood of a person or family being or becoming poor (Nelson, ), including very few financial assets such as land, salary, livestock, housing and lack of education and illiteracy, poor nutrition and, usually, bad health and lack of established sources of social capital, networks and political voice.…”
Section: Major Self‐reinforcing Mechanisms Of the Yendi Conflict On Tmentioning
confidence: 99%
“…Another constraint associated with MAC addresses is that they are useful to investigate criminal activity as well as domestic and global terrorism [26,49]. More research into this problem and these proposed solutions will be needed.…”
Section: Proposed Solution For Unintended Healthcare Big Data Accessmentioning
confidence: 99%