11,752 results on '"Extortion"'
Search Results
2. Evolving Trends in Ransomware: Inherent Advanced Persistent Threat
- Author
-
Addetla, Sandhya, Pachamuthu, Rajalakshmi, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, M. Thampi, Sabu, editor, Siarry, Patrick, editor, Atiquzzaman, Mohammed, editor, Trajkovic, Ljiljana, editor, and Lloret Mauri, Jaime, editor
- Published
- 2025
- Full Text
- View/download PDF
3. The impact of the kingpin strategy on extortion and kidnapping.
- Author
-
Estévez-Soto, Patricio and Lecona Esteban, Reynaldo
- Subjects
- *
ORGANIZED crime , *VIOLENT crimes , *CAUSAL inference , *EXTORTION , *VIOLENCE , *KIDNAPPING - Abstract
The 'kingpin' strategy focuses on dismantling criminal groups by apprehending their leaders. However, existing evidence indicates that removing a criminal leader may lead to a surge in organised crime-related homicides, and to spatial displacement of organised crime violence. This study explores the strategy's impact on other organised crimes, specifically extortion and kidnapping. Analysing Mexican data from 2011 to 2015, we employ a novel matching method for cross-sectional time-series data to assess how leadership removals affect the incidence of extortion and kidnapping, and whether there are any displacement effects. Our results reveal a significant rise in extortions within 6 months of a leadership removal in a municipality, while kidnappings show no significant change. Notably, no spatial displacement effects were observed in neighbouring municipalities post-removal. These findings underscore the unintended consequences of the kingpin strategy, emphasising the need for alternative policies to address organised crime-related violence. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
4. Anatomy of a route: Script analysis of irregular migration, smuggling and harms on the Central Mediterranean route to Europe.
- Author
-
Bish, Alexandre, Borrion, Hervé, Cockbain, Ella, and Toubaline, Sonia
- Subjects
- *
UNDOCUMENTED immigrants , *FORCED labor , *HUMAN trafficking , *SMUGGLING , *HUMAN smuggling , *EXTORTION - Abstract
Since the so-called 'migrant crisis' in 2015, there has been intense policy interest around irregular migration along the Central Mediterranean Route to Europe. Despite increased research focus on this route, the details and geographical intricacies of these migration journeys have scarcely been examined. In this study, we investigate the what, where and how of the journeys of 71 people who travelled from Libya across the Mediterranean Sea to Malta. To do so, we break down their journeys into scripts (i.e. sequences of activities) and represent them as a composite script graph. We find that journeys were long – 18 months on average – and circuitous, involving diverse and complex geographical paths. Smuggling, brokerage and working during transit were key aspects of most journeys. Worryingly, two-thirds of participants experienced detention and/or forced labour before reaching Malta. By pinpointing where and how harm occurs, the composite script graph can support policy makers in reducing harm, including by accounting for the possible harm that interventions may cause, directly or as a result of displacement. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
5. "دور الأنظمة في الحد من جريمة الابت ا زز الإلكتروني في النظام السعودي")دراسة مقارنة في الأنظمة المنظمة للابتزاز الإلكتروني النظام السعودي والقانون الإماراتي ()BLLM- ضمن مقرر البحث) 698
- Author
-
ماجد سعد مرشد العتيبي
- Subjects
COMPUTER crimes ,INTERNATIONAL crimes ,INFORMATION networks ,TRANSNATIONAL crime ,THEFT ,EXTORTION - Abstract
Copyright of Arab Journal for Scientific Publishing is the property of Research & Development of Human Recourses Center (REMAH) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2025
- Full Text
- View/download PDF
6. City on fire: The role of extortion in urban fires.
- Author
-
García‐Tejeda, Enrique and Fondevila, Gustavo
- Subjects
- *
ORGANIZED crime , *CITIES & towns , *WILDFIRES , *SHOPPING malls , *REAL property , *ARSON , *EXTORTION - Abstract
Most of the literature on fires focuses on the wild or rural environment. Nevertheless, urban fires, and in particular those related to criminal activity, have recently begun to receive greater attention. This study focuses on the analysis of fires in shopping malls, public markets and businesses in Mexico City to study the criminal intention of arson in cities. Using spatial analysis and count models, we study emergency calls (911) from January 2019 to February 2021 to explore the occurrence of fires and extortion in order to predict these events. Our main finding indicates a spatial concentration of fires in the city, with extortion as a significant predictor that increases the occurrence of fires by an average of 16.63%, controlling for non‐intentional factors. In commercial nodes, extortionists may burn down premises that resist extortion in reprisal and as an indirect threat to future victims. The results contribute to the understanding of a new line of research on arson, real estate fraud and financially profitable activities for organised crime. It is possible that 'professional torches' are also linked to another, previously unconsidered crime: that of extortion. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Dating Applications: A Honeypot for Sextortion Victims.
- Author
-
Tavakoli, Harmony, Tzani, Calli, Ioannou, Maria, Williams, Thomas James Vaughan, Drouin, Michelle, and Fletcher, Rachel
- Subjects
- *
SOCIAL media , *ONLINE dating , *SUICIDAL ideation , *INTERNET surveys , *EXTORTION , *CYBERBULLYING - Abstract
Perpetrators often have easy access to victims via widely used social media networks, such as Snapchat, Instagram, and Facebook. Nowadays, dating applications have provided one more platform where sextortionists identify potential victims and lure them into extortion and victimization. Limited research and media coverage has revealed that sextortion can cause significant harm, with victims reporting negative psychological consequences, such as depression, anxiety, and suicidal ideation. Many empirical findings arise from explorations of webcam sextortion, with limited literature examining sextortion in social media platforms, and particularly online dating sites. In the current, exploratory study, we examine these modern trends directly via an online survey of 102 participants. Overall, 62.7% had been sextorted by another dating application user, and 25.5% experienced failed attempts of sextortion by another dating application user. Results uniquely showed that Tinder, as well as Snapchat, are often used as fishing platforms for identifying sextortion victims. Furthermore, sextortion could be successfully predicted if individuals perceived that the perpetrator "seemed genuinely interested," demonstrating how online dating platforms which specifically target those seeking romantic connections provide an ideal mechanism for perpetrators to fish for victims. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. The New Legislative Trends to Combat Bullying Crimes in Jordanian Legislation.
- Author
-
Al-Arasi, Sarah Mahmoud, Al-Jabra, Ali Awad, and Al-emady, Hanadi Asaad
- Subjects
LEGAL documents ,CRIMINAL law ,CAPITAL punishment ,CRIMINAL codes ,CRIME - Abstract
The Jordanian legislator introduced a new legal provision addressing the phenomenon of bullying and the issue of extortion. This was done by adding Article 415 bis to the Amended Jordanian Penal Code No. 10 of 2022, after it became apparent that traditional legal provisions were insufficient to achieve general deterrence and prevention. This study concluded with several findings, the most significant being that the Jordanian legislator adhered to the principle of proportionality between the act and the punishment, beginning with imprisonment for not less than two years, then three years, and reaching up to temporary labor for not less than 10 years, and even the death penalty. The key recommendation was the necessity for the Jordanian legislator to not deviate from general criminal law principles concerning incitement and participation in the crime of bullying, in line with the principle of gradualness in criminalization and punishment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. مشروعية المسؤولية الجزائية في جرائم الابتزاز الإلكتروني للأحداث.
- Author
-
منى سالم الوسمى
- Subjects
COMPUTER crimes ,LEGAL documents ,CRIMINAL liability ,CYBERCRIMINALS ,JUVENILE delinquency ,EXTORTION - Abstract
Copyright of University of Sharjah Journal of Law Sciences (JLS) is the property of University of Sharjah - Scientific Publishing Unit and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
10. Ask Pollex: Legal column: Common law extortion is rife in South Africa.
- Author
-
Lambrechts, Dirk
- Subjects
- *
COMPUTER fraud , *ORGANIZED crime , *CRIMINAL investigation , *CRIMINAL procedure , *CRIME prevention , *EXTORTION - Abstract
The article discusses the prevalence of common law extortion in South Africa, providing definitions and legal implications of the offense. It explains that common law extortion involves unlawfully obtaining an advantage from another through pressure, with a focus on patrimonial nature. The article also highlights the differences between common law extortion and cyber extortion, emphasizing the statutory nature of the latter. Various statutes and legal provisions related to extortion are referenced, offering insights into the legal framework surrounding these offenses in South Africa. [Extracted from the article]
- Published
- 2025
11. Rebel Taxation as Extortion or a Technology of Governance? Telling the Difference in India's Northeast.
- Author
-
Mampilly, Zachariah and Thakur, Shalaka
- Subjects
- *
LEGITIMACY of governments , *NAZIS , *EXTORTION , *TAXATION , *SOCIAL context - Abstract
Payments made to non-state armed groups are often treated as predation. But rebel organizations deploy multiple logics when constructing their taxation systems, many of which cannot be reduced to extortion. Rebels also use taxation as a "technology of governance" to resolve a number of social and political challenges related to constructing a wartime order. Drawing on extensive subnational research in four distinct areas of control by a single organization, the National Socialist Council of Nagaland-Isak Muivah, we argue that two factors, political legitimacy and military control, determine whether taxes are extortive or deployed as a technology of governance. Our controlled comparison shows that rebels frequently implement a wider variety of taxes than commonly presumed and that these different categories of taxation are shaped by the larger social and political context in which the group operates. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
12. Extortion experiences of recent adult immigrants from Latin America: self-reported prevalence, associated costs, and current mental health
- Author
-
Laura Vargas, C. Neill Epperson, Therese S. Richmond, Shadi Sharif, Lily Berkowitz, Zachary Giano, Stephen Hargarten, Mark Ungar, Eugenio Weigend-Vargas, and Joseph Sakai
- Subjects
Extortion ,Violence ,Traumatic exposure ,Latinx immigrants ,Mental health ,PTSD ,Medical emergencies. Critical care. Intensive care. First aid ,RC86-88.9 ,Public aspects of medicine ,RA1-1270 - Abstract
Abstract Violence across Latin America is an increasingly important factor influencing migration to the US. A particular form of violence that is experienced by many Latinx migrants is extortion. This research analyzes the extortion experiences of Latinx immigrant adults arriving at the US southern border and the impact these experiences have on mental health. We find that on average, participants paid $804 in extortion during their migration. The most common perpetrators of extortion in our study were police followed by immigration officials throughout Latin America. Pregnant participants were less likely to experience extortion and adults traveling with children were more likely to be extorted. Participants who were extorted for money reported significantly greater severity of post-traumatic stress disorder (PTSD) symptoms compared to those who were not extorted. This research is the first of its kind to analyze extortion experiences among Latinx immigrants to the US, quantifying the prevalence, amounts paid, countries where extortion occurs, and perpetrators of extortion. In addition, extortion experiences are associated with negative effects on the mental health of newly arrived Latinx immigrants to the US. Based upon these findings, we recommend that extortion should be considered a significant stressor in the migrant experience, particularly for those adults traveling with children.
- Published
- 2024
- Full Text
- View/download PDF
13. Corruption, language and popular agency: Review of Daniel E. Agbiboa, They Eat Our Sweat. Transport Labor, Corruption, and Everyday Survival in Urban Nigeria. Oxford, Oxford University Press, 2022, 266 pp., £75.00 (hardback), ISBN: 9780198861546.
- Author
-
Bellentani, Federico
- Subjects
- *
SOCIAL status , *CITY dwellers , *HIGHWAY law , *UNEMPLOYED youth , *LINGUISTIC complexity , *URBAN renewal , *EXTORTION - Abstract
The book review in Social Semiotics discusses Daniel E. Agbiboa's work, "They Eat Our Sweat," which delves into corruption, language, and everyday survival in urban Nigeria. Agbiboa challenges the simplistic view of corruption as the misuse of public power for private gain, instead exploring it as a multi-faceted phenomenon deeply embedded in everyday life and sociocultural relations. The book offers insights into corruption in Africa through a linguistic anthropological perspective, focusing on the popular semiology of corruption in Lagos and the informal transport sector. Agbiboa's research sheds light on the complex interactions between formal and informal actors and processes, providing valuable insights for researchers interested in corruption, informal governance, urban theory, and semiotics. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
14. The Persistence of Latin America's Violent Democracies: Reviewing the Research Agenda on Policing, Militarization, and Security Across the Region.
- Author
-
Sandoval, Javier Pérez and Barker Flores, Daniel
- Subjects
- *
NON-state actors (International relations) , *INTERVENTION (Federal government) , *POLICE brutality , *MILITARISM , *EXTORTION - Abstract
This review examines Votes, Drugs, and Violence, Authoritarian Police in Democracy, Resisting Extortion, as well as Democracy and Security in Latin America to outline the latest scholarly developments on how the region has dealt with the challenges posed by violent, militarized state and non-state actors. Leveraging distinct cases and methods, these four recently published books discuss the political rationale behind the military and institutional responses that have shaped public security in Latin America over the last three decades. Beyond unpacking their contributions, common themes, tensions, and shortcomings, we argue that by focusing on the political dynamics behind state interventions, these volumes highlight the persistence of a democratic paradox : rather than curtailing militarism and violence, or facilitating their containment via reforms, electoral dynamics and partisan incentives—part and parcel of democratic politics—have enabled the endurance of state and non-state militarization and violence. Relatedly, as Eduardo Moncada's new title underscores, ordinary Latin American citizens have had to adopt civilian militarization as a bottom-up resistance strategy to navigate the uncertainty this worrying paradox presents. By examining work by scholars including Guillermo Trejo, Sandra Ley, Brian Fonseca, and Yanilda María González this review helps to delineate future research as well as policy interventions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Algorithmic governance or extortion? Everyday experiences of fintech for loans in Nigeria.
- Author
-
Jalal-Eddeen, Shuaib
- Subjects
- *
FINANCIAL inclusion , *FINANCIAL technology , *EXTORTION , *PRECARITY ,DEVELOPING countries - Abstract
This paper aims to understand the everyday experiences of financialised inclusion amongst fintech users in Nigeria. Concerns about the use of fintech to drive financial inclusion in the global south have led social scientific scholars to argue that it extends processes of financialisation by employing opaque algorithms to extract the behavioural data of users in order to inundate them with unsecured credit and monetise their data through resale. The consequences of these practices are not fully understood across various contexts. Using a variety of ethnographic methods, this paper examines patterns of fintech adoption and usage in Jimeta, Nigeria. It demonstrates that while fintech allows people to sort out their personal issues amidst precarity, it is also entangled in algorithmic governance issues that facilitate algorithmic extortion to the detriment of user populations. Ultimately, the paper argues that fintech, contrary to claims about its potential to unlock prosperity, is one that opens up novel possibilities for profit making and accumulation, albeit with severe consequences on user populations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Beyond exit: how populist governments disengage from international institutions.
- Author
-
Pacciardi, Agnese, Spandler, Kilian, and Söderbaum, Fredrik
- Subjects
- *
INTERNATIONAL organization , *INTERNATIONAL agencies , *REGIONALISM (International organization) , *IDENTITY politics , *EXTORTION - Abstract
There is a widespread belief among scholars and policy-makers that populism has fuelled a unilateralist backlash because of its emphasis on nationalism, popular sovereignty and identity politics. Although a few populist governments have indeed withdrawn from some international institutions, this 'disengagement hypothesis' needs to be scrutinized and unpacked. In this article, we develop a framework that distinguishes between four types of institutional disengagement—criticism, obstruction, extortion and exit—and show that populist governments use them in a fluid and tactical way to navigate between the radical and pragmatic imperatives of populist politics. Our comparative case-study of the Hungarian executive under Viktor Orbán (since 2010) and the Trump administration in the US (2017–2021) demonstrates that both governments have frequently used criticism, obstruction and extortion to disengage from international institutions but have only rarely exited from them. The article thus deepens our understanding of the impact of populism on both individual institutions and the multilateral order more broadly, and helps policy-makers develop strategies to counter the adverse effects of populism. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Extortion experiences of recent adult immigrants from Latin America: self-reported prevalence, associated costs, and current mental health.
- Author
-
Vargas, Laura, Epperson, C. Neill, Richmond, Therese S., Sharif, Shadi, Berkowitz, Lily, Giano, Zachary, Hargarten, Stephen, Ungar, Mark, Weigend-Vargas, Eugenio, and Sakai, Joseph
- Subjects
IMMIGRANTS ,SELF-evaluation ,CROSS-sectional method ,POST-traumatic stress disorder ,SCALE analysis (Psychology) ,RISK assessment ,VIOLENCE ,CONTROL (Psychology) ,MENTAL health ,HEALTH status indicators ,RESEARCH funding ,T-test (Statistics) ,COST analysis ,TRAVEL ,INTERVIEWING ,QUESTIONNAIRES ,DISEASE prevalence ,SEVERITY of illness index ,ANXIETY ,DESCRIPTIVE statistics ,CHI-squared test ,MANN Whitney U Test ,AGE distribution ,TRANSPORTATION ,SOCIAL attitudes ,QUALITY of life ,RESEARCH methodology ,PSYCHOLOGICAL tests ,COMPARATIVE studies ,ADVERSE childhood experiences ,MENTAL depression - Abstract
Violence across Latin America is an increasingly important factor influencing migration to the US. A particular form of violence that is experienced by many Latinx migrants is extortion. This research analyzes the extortion experiences of Latinx immigrant adults arriving at the US southern border and the impact these experiences have on mental health. We find that on average, participants paid $804 in extortion during their migration. The most common perpetrators of extortion in our study were police followed by immigration officials throughout Latin America. Pregnant participants were less likely to experience extortion and adults traveling with children were more likely to be extorted. Participants who were extorted for money reported significantly greater severity of post-traumatic stress disorder (PTSD) symptoms compared to those who were not extorted. This research is the first of its kind to analyze extortion experiences among Latinx immigrants to the US, quantifying the prevalence, amounts paid, countries where extortion occurs, and perpetrators of extortion. In addition, extortion experiences are associated with negative effects on the mental health of newly arrived Latinx immigrants to the US. Based upon these findings, we recommend that extortion should be considered a significant stressor in the migrant experience, particularly for those adults traveling with children. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. السلم المجتمعي وحيازة السلاح دراسة ميدانية في مدينة بغداد.
- Author
-
أمير علي اسماعيل and سحر كاظم نجم
- Subjects
PEACEBUILDING ,TRUST ,EXTORTION ,ACQUISITION of data ,CRIME - Abstract
Copyright of Al-Adab / Al-ādāb is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
19. موظفو الأجهزة الامنية والابتزاز الالكتروني (دراسة في وزارة الداخلية).
- Author
-
أحمد سليم غازي and فراس يوسف قنبر
- Subjects
ONLINE social networks ,POLICE ,SCIENTIFIC community ,QUESTIONNAIRES ,CRIME ,EXTORTION - Abstract
Copyright of Al-Adab / Al-ādāb is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
20. Hybrid video steganography and cryptography techniques: Review paper.
- Author
-
Majeed, Noor Dheyaa, Al-Askery, Ali, and Hasan, Fadhil Sahib
- Subjects
- *
DATA protection , *TECHNOLOGY transfer , *PERSONALLY identifiable information , *EXTORTION , *VIDEOS - Abstract
The development of technology in the era of data transfer technologies over the internet has increased interest in data preservation. This data can contain sensitive and personal data such as medical data, personal photos, and bank information. However, the data is always at risk, it can be used to steal, blackmail, or even threaten safety. Video steganography is the most interesting hiding method to conserve data by hiding secret information in video frames. The video has a complex structure and can have a large amount of confidential data, making it better than other hiding techniques such as text and images. Moreover, data protection will double if this data is encrypted before the merge with video steganography. This paper focuses on comparing various video steganography and cryptography techniques. Also, an analysis of the evaluation parameters for cryptography and steganography techniques. Overall, this paper gives a comprehensive understanding of data protection techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. The diversification of drug trafficking organizations: Testing Spatial–Temporal association between extortion and homicide in Mexico
- Author
-
Fondevila, Gustavo, García-Tejeda, Enrique, and Massa, Ricardo
- Published
- 2025
- Full Text
- View/download PDF
22. Ratio Legis of Article 12 Letter F : The Extortion in Corruption
- Author
-
Izzati Rahmatina Putri and Kautsar Ismail
- Subjects
corruption ,extortion ,ratio legis ,Law - Abstract
Corruption crimes encompass a variety of offences, one of which is the Extortion Offence. Extortion offences involve offenders proven to demand, receive, or withhold payments through force or threats on material matters while performing their duties as certain officeholders. In Indonesia, regulations for corrupt acts involving extortion offences are outlined in Article 12 letter f of Law Number 20 of 2001, amending Law Number 31 of 1999 on the Eradication of Criminal Acts of Corruption, as well as Article 425 paragraph (1) of the Indonesian Criminal Code. The extent to which a person is considered to have committed a corrupt act involving extortion is a crucial aspect of corruption offences. This study employs the Normative Research Method utilizing statutory and conceptual approaches, with legal material analysis conducted through descriptive means. The findings show that significance of Article 12 letter f in the Corruption Eradication Act as an extension and lex specialist in Article 425 paragraph (1) of the Criminal Code. Officials can take measures to prevent such misconduct to avoid improper cash handling or extortion by those in positions of authority over them. This study offers an in-depth study of illegal levies in corruption, emphasizing Article 12 letter f of Law Number 20 of 2001, aiming to bridge the gap of previous studies and provide practical insights for law enforcement in anti-corruption efforts in Indonesia through normative legal research.
- Published
- 2024
- Full Text
- View/download PDF
23. Terrorism and the Media-The Right to Know and the Challenges of Extortion
- Author
-
Mohamed Kirat
- Subjects
right to know ,ethical considerations ,extortion ,sensationalism ,scoops ,nationalism ,bias ,bilgi edinme hakkı ,etik kaygılar ,şantaj ,sansasyonellik ,özel haberler ,milliyetçilik ,taraflılık ,Communication. Mass media ,P87-96 ,Religions. Mythology. Rationalism ,BL1-2790 ,Philosophy of religion. Psychology of religion. Religion in relation to other subjects ,BL51-65 - Abstract
This paper explores the relationship between media, government, and terrorism. It investigates what terrorists want from the media, what governments seek from the media when covering terrorism, and what the media aims to achieve in its coverage of terrorism. The paper discusses coverage versus boycott, extortion and exploitation, ethical considerations, the war on terrorism and public diplomacy, current trends in terrorist operations, and attacks on journalists and media institutions, the Media in the West, and the Middle East dealings with terrorism. The purpose of the study is to investigate the complex relationship of three parties (terrorists, media, and government) with different objectives and agendas. The problem of media and terrorism lies in the conflicting interests and goals of these three different entities. The author used several case studies related to the problem of this study to highlight the conflictual approach to terrorism and how each entity looks at it, making the equation of terrorism, government, and media complex, challenging, and extremely sensitive that must be managed with caution. Both media and political institutions must consider several factors such as national security, public interest, economic, political, and ethical considerations. The relationship between terrorism, media and governments are characterized by a set of challenges, such as the public right to know and the potential for extortion and exploitation by terrorist groups, and the attempts from the governments to set the agendas. How can the media serve the truth without falling into the trap of extortion, exploitation, without succumbing to the pursuit of journalistic scoops, and sensationalism and without falling into the pressure of control and pressures from the governments?
- Published
- 2024
- Full Text
- View/download PDF
24. Korruption an der Warteschlange im Flughafenterminal.
- Author
-
Ebert, Frank
- Subjects
- *
PRIVATE security services , *AIRPORT terminals , *DISTRICT courts , *ACQUITTALS , *EXTORTION - Abstract
The article is about a case of alleged extortion at the airport terminal. A 20-year-old employee of a private security company was accused of extorting a passenger by demanding 50 € to lead him past the queue. The district court acquitted the defendant and the prosecutor's appeal was unsuccessful. The Higher Regional Court of Cologne ruled that the defendant was not guilty of attempted extortion. It was also determined that the defendant did not have a public administrative task and therefore is not criminally liable for accepting benefits or bribery. [Extracted from the article]
- Published
- 2024
25. I SAID NOTHING.
- Author
-
INSANA, JOLANDA
- Subjects
- *
ITALIAN language , *CAPS (Headgear) , *REPUTATION , *EXTORTION , *SHEEP , *CRYING - Abstract
The article titled "I SAID NOTHING" by Jolanda Insana, translated from Italian by Catherine Theis, explores themes of self-identity and the challenges faced by the narrator. The narrator reflects on their own sense of self and the impact it has on others. They discuss the struggles they face as a poet and the way they are treated by others. The article also touches on themes of power dynamics and the narrator's resilience in the face of adversity. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
26. Responses to Killing in State-Sanctioned and Unsanctioned Killers: Pathways of Construing.
- Author
-
Winter, David A.
- Subjects
- *
MILITARY personnel , *VIOLENT criminals , *GUILT (Psychology) , *DEHUMANIZATION , *EXTORTION , *GENOCIDE , *SHAME - Abstract
AbstractExamples of responses to killing are provided from three groups of state-sanctioned killers: executioners, perpetrators of genocide, and members of the armed forces; as well as violent offenders. The extent to which such individuals experience guilt and shame is related, from a personal construct theory perspective, to the degree to which their actions are consistent with their core roles as construed by themselves and others. Drawing upon examples from situations of warfare, it is argued that one mechanism for the avoidance of guilt and shame may be hostile extortion of evidence that the individual’s actions are ultimately the responsibility of another, and that cycles of hostility may foment and perpetuate the conflicts concerned. Other such mechanisms that are discussed are reduction of permeability of moral constructs, depersonalization of killing, and dehumanization of victims. By contrast, guilt and shame are likely to be more fully experienced, and possibly to lead to reconstruction, when the individual’s encounter with their victim is one that engenders both commonality and sociality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma.
- Author
-
Knight, Vincent, Harper, Marc, Glynatsi, Nikoleta E., and Gillard, Jonathan
- Subjects
- *
EXTORTION , *DILEMMA , *RECIPROCITY (Psychology) , *COOPERATION , *PROBABILITY theory - Abstract
Establishing and maintaining mutual cooperation in agent-to-agent interactions can be viewed as a question of direct reciprocity and readily applied to the Iterated Prisoner's Dilemma. Agents cooperate, at a small cost to themselves, in the hope of obtaining a future benefit. Zero-determinant strategies, introduced in 2012, have a subclass of strategies that are provably extortionate. In the established literature, most of the studies of the effectiveness or lack thereof, of zero-determinant strategies is done by placing some zero-determinant strategy in a specific scenario (collection of agents) and evaluating its performance either numerically or theoretically. Extortionate strategies are algebraically rigid and memory-one by definition, and requires complete knowledge of a strategy (the memory-one cooperation probabilities). The contribution of this work is a method to detect extortionate behaviour from the history of play of an arbitrary strategy. This inverts the paradigm of most studies: instead of observing the effectiveness of some theoretically extortionate strategies, the largest known collection of strategies will be observed and their intensity of extortion quantified empirically. Moreover, we show that the lack of adaptability of extortionate strategies extends via this broader definition. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Protection or predation? Examining COVID-19 policing and the nuances of police corruption in Nigeria.
- Author
-
Shodunke, Aliu Oladimeji
- Subjects
- *
POLICE corruption , *POLICE intervention , *POLICE , *COVID-19 , *LAW enforcement , *EXTORTION , *BRIBERY - Abstract
The bulk of scholarship on police intervention in enforcing COVID-19 pandemic-imposed restrictions focuses on police misconduct, securitisation, human rights, police preparedness, and legitimacy, but empirical research on police corruption during the restriction in Nigeria is sparse despite reports of pervasive police extortion and bribery. Thus, this study fills the academic gap by examining the dynamics of police predation and corruption during the enforcement in Nigeria. With interview data, I uniquely examined the intervention from the purview of predatory policing – an aspect of policing that is understudied in the context of COVID-19 policing despite its relevance in contemporary discourse on social control. Evidence indicates that, as COVID-19 policing characterised predation in Nigeria, the embedded problems of police corruption revolve around unresolved police institutional challenges and police-public connivance that results from moral decadence, thereby portending gloomy implications for law enforcement and society. Therefore, advancing and implementing police reforms, addressing moral corruption, and resolving widespread socioeconomic problems are very critical in the effective policing and containment of future public health crises. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Electronic Extortion is a Crime, According to Jordan's Electronic Crimes Law No. 17 of 2023.
- Author
-
Alfattah Elfawair, Odai Turki Abed
- Subjects
CRIME ,CRIMINAL codes ,COMPUTER crimes ,EXTORTION - Abstract
In recent years, cyber extortion has emerged as one of Jordan's most concerning and prevalent cybercrimes. This has necessitated a multi-pronged approach to tackle the issue, including legal measures. The previous cybercrime law of 2015 lacked provisions to address cyber extortion and establish appropriate penalties for perpetrators. Article 415 of the Jordanian Penal Code served as its sole source of traditional legislation. Recognising this gap, the new 2022 cybercrime law introduced a specific provision, Article 18, to explicitly address cyber extortion. This study reveals that the Jordanian legislature has adopted a punitive approach towards cyber extortion. Article 18 prescribes a combination of imprisonment and a fine, aiming to eliminate ambiguity during legal proceedings. This ensures judges do not have the discretion to choose just one penalty based on personal judgement. Furthermore, the study offers recommendations for combating cyberextortion and curtailing its spread within Jordanian society. However, the provided excerpt does not include these recommendations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Emotional Blackmail in Breaking Bad Series: A Pragma-Stylistic Study.
- Author
-
Najem, Afrah S. and Abbas, Nawal F.
- Subjects
OFFENSIVE behavior ,LANGUAGE research ,COURTESY ,RESEARCH personnel ,SUFFERING ,EXTORTION - Abstract
Although language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles' speech acts (1979), Grice's maxims (1975), Brown and Levinson's politeness (1987), Culpeper's impoliteness (1996), and Simpson's stylistic levels (2004) will be used. The study examines how emotional blackmailers reflect themselves through language and how different pragmatic theories contribute to detecting emotional blackmail. The pragma-stylistic analysis reveals that emotional blackmailers use different pragmatic and stylistic elements. Pragmatically, the analysis demonstrates that punishers more frequently utilize commissive speech acts, whereas sufferers more frequently use representative and expressive speech acts. Besides, the punishers' speech is realized by breaching the quantity and manner maxims whereas the sufferer's speech is manifested by breaching the quantity and quality maxims. Concerning (im)politeness, the punishing behavior is accomplished by positive politeness, negative impoliteness, bold on-record impoliteness, and positive impoliteness while the suffering behavior is accomplished through positive politeness. Stylistically, the language used to talk about suffering is associated with discomfort and unhappiness. Concerning grammar, the punishing discourse emphasizes threats through fronting strategies. With suffering, negative auxiliaries are used. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Clarification, Prioritization, and Examination of the Role of Financial Corruption Dimensions in Financial Statement Manipulation.
- Author
-
Zalaghi, Hasan, Ghaderi, Kaveh, and Aflatooni, Abbas
- Subjects
MISLEADING financial statements ,POLITICAL corruption ,FINANCIAL statements ,ACCOUNTANTS ,STRUCTURAL equation modeling ,BRIBERY ,EXTORTION ,CONCEPTUAL models - Abstract
Copyright of Accounting & Auditing Review is the property of University of Tehran, Faculty of Management and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
32. جريمة الابتزاز الإلكتروني (دراسة مقارنة).
- Author
-
وفاء محمد صقر
- Subjects
ONLINE social networks ,INTERNATIONAL crimes ,DIGITAL transformation ,DIGITAL media ,DIGITAL technology ,EXTORTION - Abstract
Copyright of Journal of Legal & Economic Research / Mağallaẗ Al-Buḥūṯ Al-Qānūniyyaẗ wa Al-Iqtiṣādiyyaẗ is the property of Beni Suef University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
33. EL PROBLEMÁTICO TRATAMIENTO PENAL DE LA COMPRA DE VOTOS EN LA LEY ORGÁNICA DEL RÉGIMEN ELECTORAL GENERAL.
- Author
-
Cerina, Giorgio D. M.
- Subjects
CRIMINAL law ,POLITICAL crimes & offenses ,ELECTION law ,POLITICAL corruption ,BRIBERY - Abstract
Copyright of Revista de Derecho Penal y Criminologia is the property of Editorial UNED and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
34. Azerbaijan's power plays: analyzing Baku's policy towards Armenia and Nagorno-Karabakh after 2020.
- Author
-
Ghahriyan, Mushegh, Torosyan, Veronika, and Harutyunyan, Anush
- Subjects
WAR ,EXTORTION - Abstract
The article examines Azerbaijan's policy towards Armenia and Nagorno-Karabakh after the 44-day war of 2020. This research answers the questions: What is Azerbaijan's strategy and policy following the 2020 war, and why has Azerbaijan been conducting them? The article's argument is that Azerbaijan has been employing military coercion. It includes threats, territorial seizures, ultimatums, full-scale use of force, blackmailing, and other means to secure concessions and maintain a dominant position over its adversary. Applying the concept of coercion the article seeks to explain the article discusses several examples of how Azerbaijan employed these tactics against Armenia and Nagorno-Karabakh. Applying the concept of coercion, the research tries to comprehensively explain Azerbaijan's policy and reveal conducive factors that encourage the implementation of such a policy. In some senses, the post-2020 period can be seen as a continuation of the 44-day war, characterised by lower intensity. The analysis contributes to further understanding of militarized coercion. Although the history of the conflict has been thoroughly examined by scholars, there are still a handful of studies on the post-2020 situation, which makes this article's contribution important. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Terrorism and the Media-The Right to Know and the Challenges of Extortion.
- Author
-
Kirat, Mohamed
- Subjects
PUBLIC diplomacy ,WAR on Terrorism, 2001-2009 ,PRESSURE control ,FREEDOM of information ,PUBLIC interest ,EXTORTION - Abstract
Copyright of Journal of Media & Religion Studies is the property of Journal of Media & Religion Studies and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
36. Blackmail, Unproductive Exchanges, Fraud, and the Libertarian Theory of Voluntariness.
- Author
-
Wysocki, Igor
- Subjects
FRAUD ,LIBERTARIANS ,LIBERTARIANISM ,MEDICAL prescriptions ,EXTORTION ,TALLIES ,SUPINE position - Abstract
The main purpose of this paper is to rationally reconstruct Nozick's account of unproductivity, especially vis-à-vis his characteristically libertarian, and hence uncompromising, ban on fraud. We posit that, when Nozick's theory is interpreted charitably, it does not yield to contradictory prescriptions concerning permissibility. That is, there does not have to be any inconsistency in the Nozickian ban on certain exchanges, with the ban tracking two properties of the said exchanges; that is, either (1) their unproductivity or (2) their fraudulence. When analyzing economic exchanges, our interest is focused on both productive and unproductive blackmail exchanges. However, we suggest that Nozick's banning exchanges along the lines of their unproductivity tallies poorly with his avowed libertarianism since his position predicts prohibiting unproductive and yet non-fraudulent exchanges. Hence, and we suggest resolving the said tension in a principled libertarian (deontological) manner; that is, by banning fraudulent exchanges and allowing non-fraudulent ones, ceteris paribus, while submitting that the properties of exchanges such that being productive or being unproductive are morally inert. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users.
- Author
-
Al Habsi, Abdullah, Butler, Michelle, and Percy, Andrew
- Subjects
SOCIAL media ,EXTORTION ,SELF-disclosure ,CRIME victims ,INTEGRATED reporting (Corporation reports) ,VICTIMS ,RECIDIVISTS ,NONDISCLOSURE - Abstract
Increasing numbers of social media users report being blackmailed on social media following their sharing of sensitive and personal information. However, little is known about this emerging crime and its victims. Using a survey of adult WhatsApp users in Oman (n = 1452) and interviews (n = 18) with victims and Omani criminal justice professionals, this study addresses this gap by examining the prevalence of blackmail among adult WhatsApp users arising from their voluntary self-disclosures, as well as the characteristics and vulnerabilities of those who fall victim to this activity. New insights are also offered into the factors influencing victim's decisions to report their experiences to criminal justice professionals, as well as the challenges associated with investigating and prosecuting this activity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Violence on Naga Women in the Context of Illegal Liquor Trade: A Study in Kohima, Nagaland
- Author
-
Awungshi, Wungreithan, Anurag, Pinki Mathur, editor, and Dwivedy, Santwana, editor
- Published
- 2024
- Full Text
- View/download PDF
39. All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset
- Author
-
Qachfar, Fatima Zahra, Verma, Rakesh M., Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ferrara, Anna Lisa, editor, and Krishnan, Ram, editor
- Published
- 2024
- Full Text
- View/download PDF
40. CLIMA EXTREMO Y DELINCUENCIA: UN ANALISIS DE LA RELACION ENTRE OLAS DE CALOR EXTREMO Y LA EXTORSION EN COLOMBIA/EXTREME WEATHER AND CRIME: AN ANALYSIS OF THE RELATIONSHIP BETWEEN EXTREME HEAT WAVES AND EXTORTION IN COLOMBIA/CLIMA EXTREMO E CRIMINALIDADE: UMA ANALISE DA RELACAO ENTRE ONDAS DE CALOR EXTREMAS E EXTORSAO NA COLOMBIA
- Author
-
Diaz-Perez, Anderson
- Published
- 2024
41. Retreating from Legitimacy: Hamas's Engagement In and Disengagement From Governance.
- Author
-
Margolin, Devorah
- Subjects
FEMINISM ,PALESTINIAN children ,ISLAMISTS ,MUSLIM women ,SOCIAL services ,DRESS codes ,BUREAUCRACY ,EXTORTION - Abstract
This article explores how Hamas, a jihadist group, has navigated the contradictions between governance and terrorist operations. Hamas, which initially entered governance through elections, instead entrenched itself in a system of control while maintaining its goal of destroying Israel. The group's Muslim Brotherhood roots have played a significant role in garnering support and framing its governance efforts as a choice driven by the Palestinian population. However, Hamas has resorted to violence and pressure to achieve its goals and has faced resistance from within Gaza. Despite attempts to present itself as a moderate governing actor, Hamas's recent attack on October 7 has shattered any illusions of its legitimacy. [Extracted from the article]
- Published
- 2024
42. Procurement mafias: Affecting all sectors.
- Subjects
- *
MAFIA , *EXTORTION , *BUILDING sites , *INFRASTRUCTURE (Economics) - Abstract
Procurement mafias pose a significant threat to both development projects and business operations, potentially causing economic harm and putting lives at risk. These groups are currently using extortion methods to target various sectors including infrastructure development, businesses, construction sites and mines. Almost no sector is left untouched by the procurement mafias. [ABSTRACT FROM AUTHOR]
- Published
- 2024
43. Hackers are exploiting Microsoft 365 to send extortion emails
- Subjects
Microsoft Corp. ,Electronic mail systems ,Computer software industry ,Extortion ,Email filtering software ,Computer hackers ,E-mail ,Hacker ,Computers - Abstract
Over the past week, many users around the world have received extortion emails sent via the Microsoft 365 Message Center. These emails are demanding users to pay $2,000 worth of [...]
- Published
- 2024
44. Karnataka High Court asks police why extortion case was filed against former MLC Ramesh Gowda
- Subjects
Extortion ,Law - Abstract
Byline: Ayesha Arvind Gowda moved the High Court following allegations made by realtor Vijay Tata that he and HD Kumaraswamy threatened him and demanded 50 crore from him. The Karnataka [...]
- Published
- 2024
45. New York mag's Olivia Nuzzi accuses her ex-fianc >> of blackmail amid the RFK Jr. scandal
- Subjects
Extortion ,Scandals ,Periodicals - Abstract
Olivia Nuzzi accused her ex-fianc Ryan Lizza of blackmail and career threats in court documents. Lizza denied the allegations in a statement. New York magazine put Nuzzi on leave amid [...]
- Published
- 2024
46. ALLEGIANCE BLINDNESS, EXTRA-TERRITORIAL EXUBERANCE, AND SECURITY AMBIVALENCE: A CRITICAL ANALYSIS OF THE RULING OF THE EUROPEAN COURT OF JUSTICE ON PRODUCTS ORIGINATING FROM WESTERN SAHARA.
- Author
-
El Hadi El Maknouzi, Mohammed and Ismaili, Mamoun Alaoui
- Subjects
LEGAL judgments ,TARIFF preferences ,EUROPEAN law ,CRITICAL analysis ,INTERNATIONAL law ,EXTORTION ,TERRORIST organizations - Abstract
Background: The European Court of Justice recently annulled Council Decision (EU) No. 2019/217, which had authorised the conclusion of an agreement—in the form of an exchange of letters—between the European Union and the Kingdom of Morocco. This agreement initially extended coverage of preferential trade treatment between the two parties to products originating in Western Sahara and subject to the control of Moroccan customs authorities. The ECJ’s ruling has removed those trade preferences and imposed a de facto EU embargo on the region. This article critically discusses the ECJ’s ruling on both legal and policy grounds. From a legal standpoint, the ECJ’s decision foregoes consideration of notions of sovereignty applicable to Western Sahara in virtue of Islamic law, which would have led to recognition of its enduring ‘allegiance’ to Morocco. Moreover, the same decision amounts to an instance of extra-territorial application of EU law and infringes the principle of indivisibility of agreements. From a policy standpoint, by acknowledging standing in virtue of mere non-State armed military presence, the ECJ’s ruling has offered to terrorist groups and rebel militias—in a context of profound instability in the Sahel region—a blackmail strategy vis-à-vis regional governments. Methods: This critical review uses the descriptive approach to outline, analyse, interpret, and criticise the 2021 ECJ ruling, which denies preferential trade treatment to products from the Western Sahara region, even when under the control of Moroccan customs authorities, while Moroccan products continue to receive such treatment. Results and conclusions: The European Court of Justice partially used the concepts of international law as it paid no regard to the concept of sovereignty in the Islamic world, which is connected to tribe, allegiance and loyalty. Further, extending the application of the European Law to a third state, which has several agreements with the European Union, must be devoid of any political dimension affected by regional conflicts and international balances. The enforcement of the referred ruling is tantamount to the economic embargo on the Western Sahara Region, which will inevitably affect the security situation thereof and thus bring it closer to the influence of terrorist groups. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Análisis de la tendencia del crimen violento en la Zona Metropolitana del Valle de México.
- Author
-
PEÑA GONZÁLEZ, RODRIGO
- Subjects
DRUG control ,INTERNATIONAL airports ,HOMICIDE ,METROPOLITAN areas ,EXTORTION ,VIOLENT crimes ,HOMICIDE rates - Abstract
Copyright of Estudios Demográficos y Urbanos is the property of El Colegio de Mexico AC and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
48. Against the Odds: Small Business Strategies for Managing Extortion in San Salvador.
- Author
-
Bergmann, Adrian, Bull, Benedicte, and Gude, Rafael
- Subjects
BUSINESS planning ,EXTORTION ,SMALL business ,SOCIAL impact ,METROPOLITAN areas ,GANG violence - Abstract
Since the mid-2000s, extortion has impacted social and economic development in El Salvador significantly. Against the grain of the extant literature, which predominantly takes for granted that extorted businesses are passive victims, we leverage business surveys and 103 interviews, primarily with 54 micro and small enterprises (MSEs) in the San Salvador metropolitan area, El Salvador, to explore (a) the impact of extortion and (b) how businesses operate in the face of extortion. We conducted some interviews before and others during the state of exception in force since March 2022, garnering unique insight into both impacts and business strategies. By way of statistical analyses, we elucidate the differential impact of extortion on Salvadoran MSEs, showing that the very smallest businesses suffer a disproportionately heavy burden. Drawing upon extensive fieldwork, we find that MSEs (a) act strategically in the face of extortion, (b) adopt a diversity of strategies to manage extortion on a continuum from avoidance to adaptation, negotiation, and resistance, and (c) have different ranges of strategies available to them, largely varying according to the businesses' mix of tangible and intangible resources, which MSEs leverage to manage extortion and ameliorate its impact. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. وعي طلبة الجامعة ناهزة الابتزاز الالكتروني وسبل مواجهتهامن مغغلور خريقة خدمة الجماعة
- Author
-
الشورعلي بن سعبل نبوه and الدكفووسد سدسوني قديى
- Subjects
SOCIAL group work ,SOCIAL media ,STUDENT volunteers ,CONSCIOUSNESS raising ,CYBERBULLYING ,DECORATIVE arts ,EXTORTION - Abstract
Copyright of Journal of Social Work Studies is the property of Helwan University, Faculty of Social Work and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
50. Moving Through Conflict: Transit Migration and Rebel Capacity in Mali.
- Author
-
Nydal, Ole Sevrin
- Subjects
- *
SOCIAL contract , *ROBBERY , *EXTORTION - Abstract
How do rebel organizations capitalize on transit migration? While numerous studies have examined the role of refugees, this article explores a broader yet significant category of mobile populations in civil conflict. Focusing on Mali, I argue that transit migration increases rebel capacity based on three causal mechanisms: Obstacles in transit, camping banditry, and dynamic recruitment. Obstacles are an enabling mechanism by facilitating the intersection between rebels and migrants. As camping bandits, rebels move between violent extortion and systematic exploitation depending on levels of competition. Finally, I argue that rebels recruit transit migrants using dynamic strategies, including coercive incentives and short-term contracts in which social and ideological requirements are relaxed. Combining quantitative analysis with original interview data, I find significant support for the causal argument and preliminary evidence for my conceptual framework. The findings improve our understanding of rebel organizations and the role of mobile populations in civil conflict. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.