Monday, September 30, 2019

Comparer shopping Saudi Arabia

The United States and Saudi Arabia both have their own unique way of shopping. It is not common that we in AKA are spending an hour or more in front of the computer screen looking for clothes, shoes and other personal items like furniture, cars, and audio systems.However, in the United States I think that many people like to shop online from Amazon or others companies online. First of all, based on this simple fact, I believe hat there is a difference between Saudi Arabia and the United States about how people like to shop. For instance, in Saudi Arabia there are more than ten malls in each city that has more than 10,000 people. Rather than in America, Saudi Arabia has many more place for you to buy these items like many more clothing stores, stores for shoes etc.On the other hand, I have lived in three states which include Kentucky, Texas and New York. Each city has more than 10. 000 people, but all of the cities have no more than two malls. So to me, Saudi people like to go out for shopping rather than shopping online like Americans. Secondly, there is a lot of web sites that many people in America use to find vehicles. For Instance, Internet browser sites like ‘cars. Amend scraggliest can help people shop around and search for certain cars, such as Honda, Toyota and Ionians, but In Saudi Arabia there are no web sites like that at all. So In conclusion, to me America spends much more time doing online shopping than our country where people would spend time In the malls with our family and friends. Finally, I think that everyone has their own way of shopping and which way they would Like to shop. Aimed Littoral, September, 25 14

Sunday, September 29, 2019

Ibsen A Dolls House

The play â€Å"A Doll’s House† by Henrik Isben brings to light the realities of middle class society and its values. A woman’s place in 1800’s society was very different than it is today. Women did not have the same freedoms that they have today, in spite of the fact that they were strong and intelligent. Nora used this strength and intelligence in play and was punished for it.The play opens up with Nora arriving home and being greeted by her husband in a condescending manner. Torvald says to his wife, â€Å"Has my little spendthrift been wasting money again?† He also calls her a lark and a squirrel. However, Torvald is unaware that most of the money he gives his wife is going towards a loan that she secretly took out to help him. In the 1800’s, it was illegal for women to take out loans without their husband’s signature. Torvald was ill and the family needed money to help him. Nora secretly takes out a loan by forging her fatherâ€⠄¢s signature. This is illegal, of course, and later leads to Krogstad blackmailing Nora. When Torvald finds out he threatens her.The way Nora handles her situation is inspirational. She had been treated like a doll by both her father and her husband, but she has the strength to stand up to her husband. She decides to leave and start a new life for herself. The human spirit will not be trampled on. Nora has done something that is not wrong, and she has done it for a very good reason. She begins to question everything she has always blindly accepted, including being a wife and mother, and her religious training. Even though Nora was held down her whole life, she realizes that she has â€Å"duties to myself.† She knows that most people would think that what she was doing was wrong, but she stays true to herself. In the end, Nora does what she has to do to survive.â€Å"A Doll’s House† starts as a play about a typical middle class family. Nora goes through challeng es and realizes that they cannot do what society expects out of her. She goes outside the boundaries of what she is allowed to do as a woman for a reason that she feels is noble. But she is punished  for that action and cannot accept the fact that she is reprimanded for it. In the end, when Nora decides to leave her husband and family, her decision opens up a possibility of a new life and personal growth for her. I was left wondering how that life will be, and wishing her success and happiness.

Saturday, September 28, 2019

Special education (special needs students in regular classes) Essay

Special education (special needs students in regular classes) - Essay Example However, I feel Timmy really wants to succeed, and as teachers we will be able to help him do this. This website offers a nice look into the different signs of ADD/ADHD, which is good for any teacher, as they should be able to pick up and monitor these signs. It also lists a bunch of creative strategies in dealing with children with ADD/ADHD. This site offers many different links, which all offer tons of information about the different teaching methods that have been used. All off these methods have been found to be highly effective, and are of great use to us as teachers. Another great and helpful site that was written from a parent's perspective. It offers ten key points to remember when teaching children with ADHD, and I think they are all important to Timmy's success. I feel that working with Timmy will be an joyous experience for us all, however trying it may be on our patience. I think that is the first important thing to remember. Next, I often find that if Timmy feel he needs to be the center of attention, I make him that, and ask him a question or have him help me with an activity. This really seems to help. I also feel that incorporating the different elements of my research, we can continue to build an effective plan for Timmy. I feel that it is also important to make sure Timmy keeps a notebook, so he can keep track of everything he is supposed to do.

Friday, September 27, 2019

Assignment Example | Topics and Well Written Essays - 500 words - 115

Assignment Example The maximum values however shown that while North Utsire does not high wind speeds most of the time, there are a few instances where it experiences the highest wind speeds. Like is the case with other measures, Rockall experiences a marginally higher lower quartile as compared to North Utsire showing reduced prevalence of low speed winds for Rockall. It further exhibits a higher upper quartile showing high prevalence of high speed winds. This finding is reflected in the box and whisker plot whereby for the case of Rockall, the whisker plot shows closeness of the highest value and the upper quartile. However, for North Utsire, the plot shows a big difference between the upper quartile and the maximum value. The graph further shows that wind speeds in North Utsire are mainly concentrated at the lower speeds with spontaneous occurrence of high speed winds. The calculations and graphical presentations reveal that measures of central tendency are not in themselves, sufficient enough to draw conclusions with reference to a particular weather condition. While the means of the two stations fall closely, it is evident that the areas exhibit marginally different weather conditions. In essence, it highlights the importance of looking at all the measures before drawing conclusion about the weather of a particular

Thursday, September 26, 2019

QDB SME Toolkit GAP Analysis Report Assignment Example | Topics and Well Written Essays - 3750 words

QDB SME Toolkit GAP Analysis Report - Assignment Example However, the document does not deal with the solution of the gaps that are identified in the document. Today, each and every decision from starting a new business to deciding future or improving an existing business is based on availability, accuracy and quality of information. Keeping in view an importance of information the Qatar Development Bank (QDB) developed a toolkit to facilitate the entrepreneurs for starting a new business or to improve an existing business. QDB is a Government entity having responsibility of supporting and developing local Small and Medium Enterprises (SME’s) in Qatar. QDB designed and developed SMEs toolkit that is an online counseling service to serve the desires and requirements of Qatari private sector. It is particularly intended to assist an entrepreneur for establishing a new successful small or medium enterprise. It provides an entrepreneur online guidance and information regarding step-by-step business planning, requirements for opening a particular business and checklists. Currently, the QDB toolkit provides information of ten (10) busines s categories that includes Accounting and Finance, Business Planning, Human Resources, International Business, Legal and Insurance, Marketing and Sales, Operations, Technologies, Woman-Owned Businesses and Market Overview. Particularly, the purpose of producing this document is to provide information regarding the existing services currently provided by QDB for the SMEs through the toolkit, The objectives of Supreme Council of Information and Communication Technology (ictQATAT) for development of the toolkit, the facilities that are being provided to the entrepreneurs, suggestions for improvement through a thorough GAP analysis along with prevailing best practices for such toolkits. The document compares the performance and usage of the currently designed and developed QDB toolkit and desired future state of the QDB toolkit provided

Wednesday, September 25, 2019

Freedom of Goods of the European Union Article Example | Topics and Well Written Essays - 2000 words

Freedom of Goods of the European Union - Article Example Included in the main goals of the said organization are foreign trade interaction, democratization, human rights, pluralism and the rule of law.1 The focal point of the objectives is the establishment of a Common Market which can enable a coherent activities related to the economy towards development and expansion. This will enable the free movement of goods in the member countries by preventing different forms of national restrictions in terms of processes such as importation, exportation and other forms of product movement. The main issue that is the focus of the study is the governing law on the basis of the movement of the goods and products across borders. The implementation of the EC Treaty and Law can be considered important due to the question of its maximum applicability until the present era. Due to the fact that the European Union can be perceived as a single unit in the economic society, the process of trade of products and goods can be predicted to be relatively more complicated. The governing law then can be considered as the key concept that can be studied. Although the European Community (EC) has different specified objectives, the participation and control of the international trade can be considered as the main goal. ... It the view of the system can be considered confusing, this is due to the fact that although the member nations of the EC has independent governing laws, the incorporation of the EC Law can be considered as a necessity and requirement. But due to the fact that the organization requires full-pledged cooperation and dedication, the EC Law is applied by the national courts. This is important to be able to determine the applicability of the rules in the member nations. The EC Justice is the law governing unit that cooperates and transcends the member nations.2 In the trade and freedom of goods there are dynamics that are needed to be given attention. These are the provisions of the EC Law in terms of the importation process, exportation process, and other issues. The EC Law that governs the importation of goods from member countries is under the Article 30. One of the important captions is in relation to the quantitative restrictions in the importation process between Member nations. This also includes related processes within the member nations and the governing body.3 The governing law is under the duties, charges and taxes. Article 23 is a related part of the EC Law that pertains to the "prohibition of the tariffs and other related measures." One of the related cases is that of the Social Foonds and SA CH. BRACHFELD that involved the importation of Belgium of diamonds. The product was charged with 0.33% duties which are prohibited by the EC Treaty. The charges that are involved upon crossing a frontier can be considered as one of the hindrance for the proliferation of the movement of goods. Under the EC Law the member states are not allowed to charge such fees and taxes.4 Upon consideration of the effect of

Tuesday, September 24, 2019

The rights to language as a civil right Essay Example | Topics and Well Written Essays - 500 words

The rights to language as a civil right - Essay Example One of the rights provided under civil rights is the right to language. Human communication would be limited and impaired if language did not exist. Different languages are widely spoken because of the different racial, cultural, and national backgrounds of the different groups of people in the country. The rights to language, also known as linguistic human rights, allow a person to decide on their own accord what language or languages they prefer to use as a means of communication, whether publicly or privately. (Moraes 43) Language rights were first recognized as an international human right when they were included in the Universal Declaration of Human Rights in 1948. There is a distinction made between language rights and linguistic human rights. Language rights cover a wider range, and one can argue that all linguistic human rights are language rights, but not all language rights are linguistic human rights. Language rights are necessary basic human rights to ensure a dignified life, For example, the right of access to an official language. Linguistic human rights are not strictly essential human rights; they exist to improve on the basic human and civil basic right to language. They are above basic needs making them accessory rights under language rights (Moraes 47) The right to learn foreign languages is an example of linguistic human rights is. Individual linguistic rights are provided for in the Universal Declaration of Human Rights. These are the Individual linguistic rights are applicable privately or publicly. According to Article 26 contained in the Universal Declaration of Human Rights, â€Å"all people have the right to education with relevance to the language of medium of instruction, for example in the U.S., the Bilingual Education Act (BEA) of 1968 catered to students of Limited English Speaking Ability (LESA). The Bilingual Act, Title VI of the civil rights Act of 1964, was passed following the Civil Rights movement that peaked

Monday, September 23, 2019

Safe Schools and Emergency Actions Assignment Example | Topics and Well Written Essays - 500 words

Safe Schools and Emergency Actions - Assignment Example 6. Classrooms need to be kept tidy. Walking areas need to be clear and there needs to be an area for the students to keep his or her belongings. Shop and lab classroom settings require students and teacher to wear well-fitted clothing to avoid knocking things over or getting caught. 7. Students must use proper eyewear and have eyewear available when needed. 8. Flammable materials and alcohol burners need to be used with care and under close supervision. Candles and other hot items need to be used with extreme caution. 9. Teachers are required to have a fully equipped first aid kit and the kit is to be purchased by the teacher with the teachers own funds. 10. Examples of emergency situations need to be posted where everyone can see. Students and teachers need to be knowledgeable of what to do in an accident situation. 11. An ABC type fire extinguisher needs to be up to date and accessible in each classroom in case of an emergency. 12. Waste that cannot be thrown in a regular trash bag must be disposed of properly and abide by the school's code of conduct for disposing of the substance. 13. All cupboards, drawers, and cabinets in the classroom need to be labeled with proper labels to ensure the ease of use. 14. Never is it acceptable for students to taste any substance created or used unless the substance has first been approved. 15. Dangerous substances such as animals, plants, chemicals or items that can be sued as a weapon are allowed to be accessed by the students. These items should be prohibited. 16. Dead animals are not allowed in the classroom or allowed to be handled by the students unless instructed. 17. Animals and other live creatures need to be handled by students with extreme caution. Students must wash after handling any animals to prevent the spreading of diseases that some animals may carry. 18. Student need to be seated in an area where large items will not be over the students heads. This prevents injury from a heavy falling object. 19. Climbing is prohibited to avoid the chance of a student falling and obtaining an injury.

Sunday, September 22, 2019

Uses of Computer in Schools Essay Example for Free

Uses of Computer in Schools Essay Computers are-machines that accept incoming data process them and produce outputs-depending on the users applications. Present time, we are so much associated with these devices that without them we would not be able to live the way we do. They play a crucial role in everybodys life. They bring a major socio-economic revolution not only in India but also in the whole world itself. From pocket calculators to personal computers (PC), food processors and microchips entering through VCRS at home, their uses are manifolds. The computers are employed to assist men in business organizations, in space and other researches and in many other walks of life. The personal computer (PC) is marching into the office where it is improving productivity by replacing paper works, customer services and job satisfactions for some. Why Computers are used widely? The computers process informations that come in all shapes and sizes from any fields so accurately that, some people may call these Informatics— The Science of Informal ion Processing, i.e. the methods of recording, manipulating and retrieving informations. It may be from a mathematical equation to a companys work-force necessary to produce a payroll or from meteorological department to forecast tomorrows weather or from space research to project a new space craft. Whatever may be the case, why computers are used widely? The following characteristics that make the computers very popular for its multifarious uses may give the befitting reply. (i) Speed First, the computers are regarded as high speed calculators. They can process voluminous data within a fraction of second which no human being could do earlier. If we want tomorrows forecast today, meteorologists can use the computers for necessary calculations and analyses. The units of speed of a computer are the microsecond, the nano (10)-9 second and even the picot second. (ii) Storage As human brain can store the knowledge in memory and can able to recall it, the Central Processing Unit (CPU) of a computer can do the same job without any failure. But the internal memory of CPU is only large enough to retain a certain amount of information. So, to store each and every information inside the computer, an Auxiliary or Secondary Storage Device is being attached outside the memory of the CPU. (iii) Accuracy The computers are much popular due to their high speed along with consistently very high accuracy. Sometimes, the machinery may give errors, but due to increase in efficiently error-detecting techniques, these seldom lead to false results. Most of the errors in computers are due to human himself. (iv) Automation Once a programme is in the computers memory, it will start processing the input informations; thus leading to automation. (v) Versatility The computers are versatile in nature. They can perform any task given to them provided they are well programmed, (vi) Diligence Being a machine, a computer is very diligent in its duties. It never suffers from human fatigue and tiredness or lack of concentration. It can perform thousands after thousands calculations with exactly same accuracy and speed as the first one without any rest.

Saturday, September 21, 2019

English Personal Recount Essay Example for Free

English Personal Recount Essay One of my most recent memories is the authentic experience at the mall with three of my friends, Eunice, Wing Kit and Cheng Ye. We went there to buy a gift for Cheng Yes cousin, Claire, from abroad, whom he has not met in a long time. She is aged 14 years old, her favourite foods are ice- cream and sushi, and her hobbies are sleeping, swimming, cycling, running, and listening to music. She is also more of a sporty and hardworking person. She likes playing on her phone, the colour PINK, using social media such as whatsapp, facebook to socialize. She dislikes computer games and the colour blue. Cheng Ye has not seen Claire in quite a while, and Claire has not visited Singapore in ages, we have decided to get Claire a gift to welcome her. Thus we decided to go to Tampines Mall as there is a wide variety of shops there. Our budget is $50. When we reached Tampines mall, it was very packed with shoppers, were lugging huge shopping bags. The mall was filled with the noisy sound of people chattering and laughing. It was so noisy that I had to shout and strain my voice to talk to Eunice, who was just right beside me. Salespersons were announcing the various offers they were having. The smell of curry chicken entered my nostrils as I while gazed at the patrons savouring the mouth-watering curry chicken, causing my mouth to drool as we walked past the restaurant. Finally, after browsing through many electronic stores, we decided upon an pink shiny earpiece from Courts that costs $20. We chose the product based on her preferences as she liked pink and shiny objects and also because it had a reasonable price and was within our budget. After buying the earpiece, we were left with $30. Thus we decided to get her another gift based on her hobby of sports. We wanted it to be within our  budget of $30, the colour pink and it to be useful and long-lasting. Eventually, we headed down to the Royal Sporting House and chose a pair of pink as it would be useful to her as swimming was her favourite hobby which she did pretty often. Thus, she would be able to use it often as well. In conclusion, this experience of going to Tampines Mall on 29 March 2014, was a wonderful experience.We had a lot of considerations at first, such as her personality,likes dislikes, the budget for the gift and what gift would she really wanted. However, all of us worked together, communicated effectively and overcame the challenges. So, eventually we decided on the gift. I also think that this experience was an educational and enriching one, as we learnt how to decide on things in a group without having any conflicts and how to take things into considerations before making a final decision. In conclusion to this, this experience was a fun, educational and enriching experience.

Friday, September 20, 2019

The various types of Dividend policies used by companies

The various types of Dividend policies used by companies Dividend policy has drawn due attention from various researchers. One of the most famous studies in this respect is Miller and Modigliani hypothesis (1961), which asserted that the cash dividend policy is not important because it has no effect on the companys value, and as such it does not affect the company owners wealth. This is due to the fact that companies follow a Residual Dividend Policy which is based on reinvestment of corporate profits in the available investment opportunities (Van Horne 1983; Arnold 2008) with positive net present value and distribution the surplus cash as a cash dividend to shareholders. The above hypothesis aroused a lot of controversy on the part of researchers. However, the most important study that opposed it is that of Partington (1985) which claims that the companies do not follow in practice the residual dividend approach as the dividend decisions taken independently from the investment policy. Right now, controversies continue among researchers based on the subject without arriving at any decisive results This chapter will study the public dividend policy to shareholders, which is considered to be one of the most important financial decisions, in view of its direct relationship to shareholders and financing decisions and investment in the company. The chapter will also cover the alternatives to be addressed consisting of general dividend policy and theories that linked the cash dividend policy with the company market value, and therefore the company owners wealth in addition to the share dividend policy and buying back policy, besides the cash dividend policy and its relationship with the investment policy 2-2 General Dividend Policy The Company Board suggests distribute dividend to shareholders in an annual meeting (Watson and Head 2004). The main interest is to suggest acceptance and secure fair dividend for shareholders consistent with the rate of dividend decided by the company management. Therefore, in preparing dividend distribution, the mangers do not look only for current year profit, but they, instead, will look for the future earnings expected, and hence for the ability of the company to maintain a stable rate of dividend taking into consideration the systematic growth of this ratio. On their part, the investors are aware of this truth, and they look for a profit increase in a positive vision expecting throughout a stability of the future dividend. When the company achieves high profits for a particular year and do not expect the same level of profit for next years, they will make normal dividend and give additional dividend so as not to disappoint the investors hopes in the future. The profits are then divided into two dividends, a normal and an incremental dividend, to make notification to investors that this type of dividend is unexpected and would not continue in the future (Levy and Sarnat 1994). There are several alternatives for the profits dividend. The company may either distribute the profits in the form of regular cash dividends, or it may distribute profits in the form of shares dividends to shareholders. However, the above two types may be distributed at the same time. Besides that, shareholders can also obtain profits when the company tends to repurchase its shares, and considers the regular cash dividend as something quite common (Broyles 2003). The percentage of the profits distributed by the company is typically governed by several considerations. In addition to the law which prohibits the distribution of profits unless the company achieves a profit after deducting reserves, the contracts of the bonds, in case the company issues these bonds, often prevents companies from increasing the proportion of cash dividend on a certain level to secure the rights of bondholders (Watson and Head 2004). Thus, the general dividend policy may well looked upon on the basis of differentiating between the cash dividends and the shares dividend through capitalization of profits, or through buying back the companys shares. This is due to the fact that the investment policy is fixed. The company will thus detain profits to finance capital spending on growth and expansion or debt repayment, or extinguish the bonds if any, and distribute the remaining cash as a cash dividend, and also to finance any deficit in capital spending by issuing new shares or through outside borrowing. The company could detain the necessary funds to finance capital expenditure and re-buy part of the shares issued and distribute the remaining as a cash dividend. These alternatives will not affect the companys value, and therefore the wealth of shareholders, if the company is operating in market characterized by ideal, efficiency and depth (Merton and Modigliani 1961; Black and Scholes 1974; Peter 1996). In case such characteristics are absent of the market, one can expect arguments about the impact of dividend policy, particularly cash, on the value of the company, and therefore the wealth of shareholders. The second group (Gordon 1959; Blume 1980; Dyl and Weigand 1998; Koch and Shenoy 1999) believes that increasing the percentage of cash dividends would increase the companys value, thus increasing the shareholders wealth, while the third group (Litzenberger and Ramaswamy 1979; Blume 1980; Litzenberger and Ramaswamy 1982; Ang and Peterson 1985) believes that increasing the percentage of cash dividend will lead to a decline in the value of the company, thereby reducing the wealth of shareholders. These groups together with their theories will be discussed when dealing with the policy of cash dividend. The profits will be transferred to return earnings account, which is used for purposes determined by the board and the approval of the General Assembly of the company. This account is usually used to maintain a stable dividend amount of cash dividends (a systematically dividend policy). During the years where the company cannot meet the amount of normal dividend, they will tend to the return earnings account to insure any deficit. The General Assembly of the company has full authority to use this account for normal or abnormal cash dividend in whole or in part. It could also be used for company repurchase share, or for capitalization this account and distribution of share dividends to shareholders. On their part, shareholders can obtain their profits through a set of policies that can be combined in a single year, but it often takes one of the following alternatives(Watson and Head 2004): A cash dividend policy Shares dividend policy Buying back shares policy 2-3 Cash Dividend Policy The impact of cash dividend policy on current prices of the company shares is considered to be very important, not only for policy makers, but also for investors, portfolio managers, and economists interested in the performance of capital markets (Watson and Head 2004). The questions to be raised here are: Can managers maximize the wealth of the owners of the company through a particular dividend policy? (Lumby and Jones 1999) Are the companies with high dividend sold with premium? Should the shares of companies that retain their profits or distribute a percentage of its profits, be sold as well in a lesser price? The fact is that these questions were, and still are, the subjects of many applied studies. Until now, there seems no consensus on the answers to these questions. The reason is the presence of other relevant factors that affect the market value of the shares that enable us to measure the impact of dividend policy on profits alone. This means that researchers did not so far prepare both proper and adequate tests and studies to distinguish between different hypotheses. The arguments among researchers about the dividend policy focus on that part of the cash dividend to be distributed to shareholders and its impact on the companys value and therefore the wealth of the owners of the company. Miller and Modigliani (1961) see that the cash dividend does not affect the value of the company, as the companys value will not be affected by how earned profits are divided; but rather affected by the ability to achieve profits. Thus, there is no point in thinking of how to divide profits between dividends and return earnings, while thinking must be directed towards maximizing these profits through the optimal investment policy as the way by which the cookie is divided will not lead to increase its size. In the opinion of others (see, Olson and McCann 1994; Lipson, Maquieira et al. 1998), the manner in which profits are divided between dividends and return earnings affects the companys value through an increase or decrease in the demand for the company shares, as the investors with high incomes usually prefer companies without cash dividend if the value of taxes on cash dividend exceeds the taxes on capital gains, while investors typically prefer companies that cash high dividends if they do not pay taxes or who were in low category of taxes. Also, investors in growing companies may not ask the company to distribute high cash dividends and accept, instead, low cash dividends. This is because the internal return rate in these companies is usually greater than the costs of obtaining funds from sources other than return earnings, and thus maximize the wealth of shareholders through the detention of all or most of the profits and use them to finance projects which have positive present v alue. Investors in non-growing companies, on their part, look for high dividends (see, Walter 1963). From the foregoing discussion, it is viewed by many scholars that the harmony between cash dividend policy with investor wishes will affect the market value, due to any increase or decrease for the company shares emanating from this harmony or compatibility, which will be reflected on the price of its shares. The decision of cash dividend policy, particularly its cash portion, is one of the challenges facing company managers, because the distribution decision defines the funds to be given companys shareholders, and therefore the funds to remain for managers in the company to reinvest (Lumby and Jones 1999). The cash dividend policy can be considered as an action plan for the company to be followed when the company needs to make a decision regarding cash dividends, so that this plan could provide several options from which the company can choose to reach the desired goal. Such a plan is laid taking into account the following two main goals: Maximizing the wealth of shareholders and meeting the company needs to finance its investments. There are several factors affecting the decision to choose the most appropriate alternative among the alternatives available in the action plan. These factors are: legal, contractual, internal shareholders and market considerations. These factors reduce the available alternatives for the company in order to achieve its aims through a cash dividend policy practice. The available alternatives include the companys range of cash dividend policies the company could follow (Gitman 1997; Brigham and Houston 2004) . These include: Fixed dividend policy rate Regularly dividend policy Regularly low fixed dividend with special or added dividend Remaining cash dividend policy. These policies will be discussed in detail as follows: Fixed Dividend Policy Rate This percentage is determined by apportionment of dividends on profits earned. The percentage distribution of 80% of the net profits derived mean that the company will distribute 80% of its profits and reserves 20% of retained earnings. Since corporate annual profits are not fixed, adopting this policy will lead to a fluctuation in the amount of dividends because the stability of the dividends rate from non fixed profit leads to a difference in the amount of the annual dividends, which is the main criticisms of this policy. Since the fluctuation of the quantity of dividends is one of the benchmarks that measure the risks of the company and because the non fluctuation of the profits is usually seen as something positive for current and future performance of the company, the prices of company shares that follow such a policy may be adversely affected by this policy. Regular Dividend Policy The company, according to this policy, pays fixed rates as a dividend each year. For example, they may pay $0.2 per share each year, which will be fixed next years. This policy gives a positive indicator about the company because of the stability of the quantity of dividends, leading to reduce the risks of uncertainty. The companies that follow such a policy tend to increase the dividends rate whenever they feel that the increase in profits is steady and continuing in the future. Low regular fixed policy with special or added dividend Some companies follow a policy of systematic low dividend with additional dividends when the companys profits are unstable and highly volatile so that the companys profits are high in a given year but low in another, which makes it difficult for it to follow a regularly high-level profits distribution policy be able to maintain it. The company, therefore, seeks to pay low dividends characterized by being consistent and continuous and then pay other additional and unusual dividends in the years where it can secure high profits. The company thus has been able to achieve consistency and continuity in the level of profitability, which are indicators of great importance on the part of investors, who consider this as something necessary for building confidence with the company. Remaining cash dividend policy The optimal cash dividend rate for any company is best determined by the differentiation between a numbers of factors (Brigham, L. et al. 1999) Shareholders preference for cash dividend or capital gains. Investment opportunities available for the company. Optimal structure mix for the companys capital (money sources). External financing costs The last three factors combined affect the remaining dividend policy which is based on distributing cash dividends which exceeds the companys to finance all company investment opportunities that have positive present value. The company should make the following three steps when applying the remaining cash dividends policy (Brigham and Houston 2004) Identifying all the available investment opportunities which have positive present value and in which the company wishes to invest. Determining the optimal structure mix of capital that achieves the lowest cost. Using the profits to finance new projects with positive present value because of their low cost in comparison with new share issues in case they represent the best combination of capital. Based on this concept, and as long as the money needed by the company to reach the optimal mix of the capital structure is the equity funds , and not money borrowed, and as long as the need for funds exceeds the companys achieved profits and return earnings, the company will not make any dividends distribution for shareholders (Van Horne 1983). But in case the funds needed are less than the return earnings, the company will take its cash needs and distribute the exceeded money as a cash dividend for shareholders. Besides that, if the optimal capital structure mix does not make it incumbent upon the company for financing or allowing to borrow without leading to the level of damage risks of the company, the company then may distribute profits to shareholders because of lack of need and also because these profits are considered as surplus (Arnold 2008). 2-3-1 Factors affecting cash dividend policy A combination of factors affect the cash dividend policy and put pressure on the management when a dividends proposal is submitted to the General Assembly to be taken as a justification of reference for the Assembly when ratifying or adjusting this proposed. These most important of these factors are arguably (see, Damodaran 1997; Gitman 1997; Brigham, L. et al. 1999; Brigham and Houston 2004) the following: legal, contractual, internal, growth and the expected expansion, shareholders preferences for cash dividend or capital gains and capital market considerations. These factors are explained here in some details: Legal restrictions Cash dividends should not exceed the total of retained earnings plus net profits for the current year. This is known as the Impairment of Capital Rule. If the companys net profits equal to $500 thousand and it the retained earnings of $ 2 millions, then it should not distribute profits more than $ 2.5 million; but if there is retained loss within equity amounting to $200 thousands, then it should not distribute more than $300 thousands. Contractual restrictions Usually borrowing contracts restrict the amount of profits allowing the company to distribute to shareholders to ensure the rights of the lenders. When the company issues borrowing bonds, the contracts usually include both permissions and restrictions from the date of bonds issuance till bonds date off. The bonds contract often will not allow the company to distribute cash dividends only if they exceed the amount earned in a certain amount. The contract might also prevent the company from increasing the percentage distribution of normal profits or may determine the profits that could be distributed by the companys net profits for distribution. The company accepts such conditions on themselves to reduce the risks of borrowing from the viewpoint of the lender, thus reducing borrowing costs. There are also restrictions on cash dividends imposed upon issuance of the preferable shares of the company. In this respect, it is natural to restrict the distribution of any dividends to ordinary shareholders unless they pay all preferable share profits. Internal constraints The companys ability to pay cash dividends is affected by the quantity of liquid funds available, not by profits and return earnings only. Although the company could resort to borrowing for financing the cash dividend or issuing new shares to finance the dividend process, the companies often do not do that because of high costs for this decision. The company can use it in urgent cases to stabilize the amount of dividends, since the fluctuation of the value of dividends may convey a cost that could be higher than the distribution finance costs. Thus, the companys ability for cash dividends or desire to distribution is often constrained by liquid funds available. Company expected growth and expansion The volume of capital expenditure required for financing expansion and growth significantly affects cash dividend policy adopted by the company. If the company is in continuous expansion and development, using modern technology, they will need all the funds available to finance operations. On the other hand, the companies that have reached the stage of maturity are more able to distribute cash dividends than companies in growth. Shareholders preference for cash dividends or capital gains One of the management functions is to maximize the company owners wealth therefore we should take into account the owners interests when preparing the cash dividend policy. The companys ability to distribute cash profits and desire to do so are often constrained by several important factors affecting the interests of company owners (Brigham, L. et al. 1999): Tax status of the companys owners: If most of the companys owners are affluent are in high tax brackets, the company will resort to a dividends policy whereby it can reduce the impact of taxes on the shareholders profits. Investment opportunities available for company owners If shareholders can obtain returns for re-investing their profits exceeding the companys returns, the company must distribute a greater proportion of profits to enable shareholders to maximize their wealth by reinvesting these profits. But if the companys returns are more than shareholders returns, then the company must transfer the maximum part of their profit to return earnings for reinvestment in order to maximize the shareholders wealth. The steady control of former shareholders If the company tends to distribute all, or most, of profits achieved over the years, it will find itself forced to issue new shares to finance the expansion and development projects. This would first lead to mitigate and minimize the control of the companys former owners of the company; and then the profits to be gained would be reduced because of the increasing number of company owners due to the issuance of new shares. This situation could be remedied through the allocation of shares, by allowing old shareholders to subscribe for new shares, each according to his/her contribution and giving them priority in this respect. The company could also resort to another alternative, i.e. to reduce the proportion of cash dividends if they want to retain full control over old shareholders and show no inclination towards increasing the number of shareholders. Stable and clear dividend policy Investors give special importance to the stable and clear dividends policy. Also, they give special importance for the continuity of these dividends because they believe that the stability, increase, and continuity of dividends would surely lead to reduce risks from the standpoint of investors. Therefore, investors tend to discount returns of companies whose policies of distribution are characterized by stability, increase and continuity at a discount rate less than other companies. This means that they highly evaluate these companies; in other words, they ask for a less rate of returns, thereby reducing the companys capital cost. Profit information content Investors are interested in the informational content of the profits. Through these profits, they can read the management forecasts for company future profits. As the mangers have more precise information about the company investors, on their part, will give special attention to the informational content of the profits. 2-3-2 Theoretical Framework for Dividend policy and its impact on market value We can clarify the theoretical framework for the relationship between the dividend policies (cash, shares and repurchase) and market value of the company through the Irrelevant Theory was brought by M M in 1961. They suggested that there was no relationship between the dividend policy and market value. Many researchers have supported this theory, but also others have suspicion about it. The advocates researchers believe that companies should follow residuals dividend policy while the opponents researchers divided into two divisions, the first believes that there is a positive relationship between the dividend policy and the company market value, others said that this relationship is negative. The relationship between the dividend policy and the company market value is also affected by other dimensions which create a number of other theories, where we find that the uncertainty created a bird in the hand theory , the presence of taxes helped to find a Tax Effect Theory, either shareholders loyalty has created a Clientele Effect Theory, Management try to send some information through the dividend policy covered by Signaling Effect Theory, while the separation of management and owners (shareholders) has created Agency cost Theory. Therefore, we can draw the theoretical framework for the study through the following form: Theoretical Framework (figure 2-1) Share Dividend Positive Relationship Negative Relationship Irrelevant Market Value Relationship Dividend Policy Irrelevant Theory Relevant Residual Dividend Policy Bird in the Hand Theory Tax Effect Theory Clientele Effect Theory Signaling Effect Theory Agency Cost Theory Cash Dividend Share Repurchasing 2-3-2-1 Irrelevance Proposition There is a belief among many finance and economics specialists that cash dividends policy is not important because it is not relevant and does not affect the owners wealth. The source of this belief is a study conducted by Miller and Modigliani (1961). This study concluded that the dividends policy has no effect on the companys value, so the managers will not be able to maximize the owners wealth through a dividends policy. The irrelevance proposition concept for dividends policy on the owners wealth stems from the fundamental idea that companies which distribute continuous high cash dividends to shareholders and secure a little bit higher share prices (Archer, Choate et al. 1983; Lumby and Jones 1999). As a result, the investors capital gains are very limited in this company as he would receive the same returns received by other investors holding another companys shares with low dividends while its prices become high because of the return earnings, and so he obtains high capital gains which compensates the limited cash dividends. In both cases, the shareholders wealth is the profits obtained by cash dividend plus capital gains realized from rising share prices. In case there are no taxes or whether taxes on capital gains are equal, the investor will not be affected, whether the company has established cash dividends or kept the profit in return earnings and the investor has obtain capital gains when se lling his shares as a result of the rise of the companys shares by cash undistributed profits with no change in the other effective factors. This theory is based on the following assumptions (Merton and Modigliani 1961): There are no taxes, or the taxes rate on cash dividends and taxes rate on capital gains are equal. There is no transactions cost for the process of selling or buying shares so that, if the investor needs cash, he will be able to sell his shares without losing any commissions and fees instead of cash dividends. The investor is absolutely rational in his decisions. There are no agency costs. This means that the company managers that distribute low cash dividends do not use the company profits to achieve personal goals that may harm the company (Jensen 1986). The company operates under a full and efficient market, which means that the information is available and accessible to all at the same time without any costs, and the stock prices reflect information and absolutely influenced by it at the moment provided. There is no information gap, including that the company operates under a full and efficient market. The future outlook on the performance of the company is homogeneous among all investors, as so do information and expectations among managers and investors. According to irrelevance proposition, the dividend policy affects only the level of external financing required to finance future projects with positive net present value. This means that each dollar distributed to shareholders represents a capital loss of a dollar. According to this hypothesis, the only constraint to the companys market value is the companys investment policy, not the companys dividends policy followed. This is because the investment policy is responsible for future profits (Miller and Modigliani 1961). Accordingly, the companys decision on the distribution of cash or non-profit distribution would not affect the market value of the company and therefore would not affect the owners wealth. This hypothesis recommends that managers should give greater importance to the investment policy and let the dividends policy follow the investment policy, which is known the Residual Dividend Approach. The advocates of the irrelevance proposition hypothesis (Black and Scholes 1974; Miller and Scholes 1978; Merton and Myron 1982; Merton 1986; Peter 1996) adopt the idea that the investor can build his own cash dividends policy regardless of the companys dividends policy. This is known as Homemade Dividend(Merton and Modigliani 1961) where the investors can obtain income through selling part of his shares equal to the value of cash profits that could have been distributed by the company, if the company does not have cash dividends and the investor himself wishes to receive cash dividends to meet his consumer needs. He may wish also to reinvest cash dividends distributed by the company in case the investor shows no desire for cash dividends. By following this method, the investor will not be affected by the companys dividends policy, and therefore would not be compelled to abandon the stocks of companies followed by a dividends policy which is not consistent with his wishes. One of the criticisms against the irrelevance proposition hypothesis is that it cannot be practically acceptable. The theory of building a dividends policy for each investor based on efficient market, with no transaction costs for buying and selling (Dempsey and Laber 1992), is not practical. In addition, the investor will pay taxes on cash dividends or capital gains, making the adoption of a specific dividends policy for each investor something costly. Besides, the investment in companies whose cash dividends policy is consistent with the investors needs is less expensive than building a special dividends policy. The hypothesis has been built on the basis that the investor is quite rational when taking his decisions. The psychological tests have proved, however, that human beings are not rational one hundred percent with regard to decision-making. Shefrin and Statman (1984) in their study said that investors have an unreasonable preference regarding the profit dividends; this is not consistent with the irrelevance proposition hypothesis. The irrelevance proposition hypothesis is also criticised for assuming equality between the cash dividends and capital gains, while cash dividend is a cash in hand without any uncertainty risk, and the capital gains is cash in the future with a lot of risks. So, how can they be equal? The irrelevance proposition hypothesis has been built on a set of assumptions and data that have already been indicated. It is understood here that any change in these assumptions and data would naturally lead to a change in the basic hypothesis and therefore to a change in the results. Accordingly, and in practical terms, the financial markets in general do not agree with these assumptions.

Thursday, September 19, 2019

Leaving the Past Behind in Everyday Use Essay -- Everyday Use essays

Leaving the Past Behind in Everyday Use      Ã‚  Ã‚   Everyday Use by Alice Walker is a short story about how people get caught up in the superficial value of material things, and the jealousy this desire causes.   In this short story Dee, the eldest daughter, was always ashamed by the way she lived during her childhood years.   As she was educated more and more, her feelings of hatred for poverty and ignorance grew intensely.   After she finished college her abhorrent feelings grew immensely, and she tried to take advantage of those less educated than her.      Ã‚  Ã‚  Ã‚  Ã‚   Dee always hated the way she lived when she was being raised by her mother.   Dee was obviously overjoyed when the house that she hated so much, was finally destroyed.   "A look of concentration on her face as she watched the last dingy gray board of the house fall in toward the red-hot brick chimney.   Why don't you do a dance around the ashes?   I'd wanted to ask her.   She hated the house that much."   The destruction of this symbol of poverty gave her a spark of hope that she and her family would move up in the world, that eventually snowballed into a much larger hatred.   She was always ashamed of her past and did everything in her power to improve her status.   Even when she was sixteen years old, her mother recalls the urge Dee had to improve everything she could.   Her mother said, "Dee wanted nice things.   A yellow organdy dress to wear to her graduation from high school; black pumps to match a green suit she'd made form an old suit somebody gave me."   Even though she knew her family couldn't afford "nice things" she had a burning desire for them.   This desire made her take the time and effort to alter a suit her mother was given, into a nicer ... ...and her chin.   She was making a last ditch effort to try to make a distinction between her financial class and her mother's.   The fact that she hid her entire face behind a pair of dark shades, is symbolic of her trying to put a barrier between herself and her poor past.    Works Cited Cowart, David.   "Heritage and Deracination in Walker's 'Everyday Use.'" Studies in Short Fiction 33 (1996): 171-84. Hoel, Helga.   "Personal Names and Heritage:   Alice Walker's 'Everyday Use'." 2000. Trondheim Cathedral School, Trondheim, Norway.   30 Jan. 2000. Showalter, Elaine.   "Piecing and Writing."   The Poetics of Gender.   Nancy K. Miller, Ed. New York: Columbia UP, 1986.   222-47. Walker, Alice.   "Everyday Use."   Literature:   Reading Fiction, Poetry, Drama, and the Essay. 4th ed. Robert DiYanni, Ed.   New York:   McGraw Hill, 1998.   408-413.   

Wednesday, September 18, 2019

The Beer Game :: GCSE Business Marketing Coursework

The Beer Game To see how decisions at one part of a supply chain effect the overall performance of a system, we ran a simulation called the beer game. The supply chain consists of a retailer who orders from a distributor who orders from a wholesaler who orders from a factory. At the beginning of each period, each stage of the chain orders upstream and receives the order shipped out to them two periods ago (the order they placed 4 periods ago) unless the next stage upstream is backlogged. All orders are eventually filled when inventory becomes available. The holding cost specified for each location are (in $/keg.period): factory: 0.25, distribution center: 0.50, warehouse: 0.75, and factory: 1.00. Additionally, the penalty cost for a shortage is zero for all stages except the retail stores where the penalty cost is estimated to be $10.00 per keg/period. After trying many different strategies, the best policy I was able to come up with had a total cost of $122.00. This was achieved using choice 4, the base-stock policy. This policy re-orders a specified amount, less inventory on hand and pipeline inventory. The player specifies the base stock quantity for the retailer, warehouse, distributor, and factory. When this policy was used at each point in the supply chain, the lowest cost strategy was achieved. Location Base Stock Amount Cost Retail 300 101.55 Warehouse 210 10.21 Distributor 210 7.70 Factory 150 3.41 Total 122.87 Because the retail store encounters such a high penalty for shortages, it is best to keep them well stocked. They also have the highest holding â€Å"overage†cost, but at $1.00 it is only 1/10 of the shortage â€Å"underage†cost. If the â€Å"overage† and â€Å"underage† costs were equal it would make sense to always order enough to anticipate having the mean (50) on hand. This policy is not optimal however, when it costs the retailer more for a shortage than for excess.

Tuesday, September 17, 2019

Ethical Practices of Citigroup

The purpose of this memorandum is to discuss the ethical, financial and legal issues presented by Citigroup Inc. (â€Å"Citigroup†) receiving $45 billion dollars in government rescue funds and then shortly after paying $13 million dollars in bonus compensation to employees for cancelled trips to resorts. We propose a number of solutions to the Department of Treasury in dealing with the dilemma. The Ethical Dilemma Both Primerica Financial Services Inc. (â€Å"Primerica†) and Smith Barney are part of Citi Holdings, a new unit of Citigroup. Citigroup paid 1,900 agents of its Primerica Financial Services Inc. unit $5,000 each for missing a three-day stay at a Bahamas resort. In addition, around 2,000 Smith Barney brokerage advisers got debit cards valued at $1,000, $2,000 and $3,000 for various canceled getaways. After being warned by President Barack Obama, â€Å"That companies receiving bailout money can’t go take a trip to Las Vegas or go down to the Super Bowl on the taxpayers’ dime,† Citigroup decided to pay employees in lieu of canceled getaways. Stakeholders: Creditors (U.S. Government), Taxpayers, Shareholders, Employees, Consumers Citigroup’s dilemma encompasses a large number of stakeholders, including creditors, taxpayers, shareholders, employees, and Citigroup customers. Creditors (including the U.S. Government) are stakeholders because they provided the funds used by Citigroup to make these bonus payments. The government has sought to calm this debate by imposing unfavorable tax treatments against unduly paid bonuses, essentially reclaiming the bonuses paid. Taxpayers have argued that the funds should be used in a way to benefit all society, i.e. rebuilding the financial credit system, rather than a discrete segment of Citigroup employees. Taxpayers’ main contention is that it is unfair for Citigroup to pay reward bonuses to employees using government bailout money from tax payer dollars when Citigroup’s performance has been so poor. As owners, all Citigroup shareholders are inherent stakeholders. Citigroup shareholders make the argument that the funds can be used to improve the financial outlook of Citigroup, increase the profitability of the corporation allowing it to pay creditors, stabilize the financial and credit sectors, and lead to an economic recovery.

Monday, September 16, 2019

EIP and Project Based Learning Essay

The title of the study is to be dubbed as EIP and Project Based Learning: Studying student’s motivation and academic achievement. The research would be carried out in a manner which would facilitate the identification of what impact does standard project-based learning have on EIP (Early Intervention Program) and the student’s impetus and academic achievement? Statement of the Problem A fresh evaluation of student achievement conducted by the National Conference of State Legislatures divulged that the average performance of eighth-grade learners in the United States in the disciplines of mathematics, science, and reading literacy ranked below the performance standards of 14 countries (NCSL, 2009). To deal with such a problem, state administrative bodies have initiated the adoption and the implementation of accountability founded on certain stipulated standards. Nevertheless, the conventional classroom based learning practices persists to be prevalent in the United States education imparting arena despite the fact that several research findings have revealed that project-based learning is much more effectual in terms of achieving stipulated standards, better explains different subject areas, enhances learning methods, and improves test performances (Andres, 2006). The most important issue in this context is that project-based learning has to be put into practice in more De Kalb County education facilities in order to foster cognitive thinking and enhance the accountability of the students in their learning activities. This fact is substantiated by the Georgia Assessment of Performance on School Standards (GAPSS) evaluation findings and is consistent with the stated objectives of the De Kalb County School System. Relation of the Problem to the Specialization Comprehending the productivity of the project-based learning approach can facilitate bridging the gaps that presently exist between how students live and how they are taught (Andres, 2006). This technique of learning rises above the mere technicalities introduced by course books and worksheets and lays more emphasis on constructivist attitudes. Education in itself would stand to benefit from this research and at the same time educators would gain knowledge of how to successfully structure and sustain the learning content and activities whilst highlighting achievement of standards, comprehensible outcomes, and enhanced accountability (BIE). Background and Context for the Problem The approach that was adopted in the education imparting framework in the past decades is eventually becoming outdated and is not competent enough to suffice in the contemporary educational arena. Those old-fashioned past approaches were unsuccessful in developing and nurturing the skills and aptitudes required to answer intricate questions and to implement that knowledge in real world circumstances. By means of standards based projects, a dynamic issue that is genuine and fascinating will foster critical cognitive thinking, knowledge implementation, organizational noesis, and enhance the students’ conscientiousness relating to their own learning process (Andres, 2006). Research Question The most important questions that this research would be attempting to answer are the following: †¢ What impact does the project-based approach have on the students’ learning achievement? †¢ To what level are students inspired by project-based learning methodology? †¢ Were the evaluations of project-based learning consistent with Georgia Performance Standards? Georgia’s Performance Standards (GPS) are obligatory standards that must be met while imparting education to every public school student in the De Kalb County and the state of Georgia. Treating The Giver by Lois Lowry in the form a web-based thematic component, students would be able to implement the skills recognized by the Georgia state learning standards as essential for elementary school learners. Making use of the Student-Interview Questions from the GAPPS evaluation, the information would be gathered and scrutinized. In addition, previously-existing instructional policies and evaluation practices by means of observing students conduct, surveys based on students’ achievement-goal perceptions, and group discussions are approaches which, as indicated by Pintrich and Schunk, can be carried out sensibly to judge the students’ endeavor, determination and evasion behaviors (Pintrich & Schunk, 2002). Importance or Significance of the Study A constant rise in the high school dropout rate and low performance grades have become a widespread phenomenon in the United States education arena. In light of such an issue project-based learning assumes immense significance as an effective methodology that is capable of delivering high performance standards, presenting interesting challenges, and providing a framework for reliable evaluation techniques (Nastu, 2009). If the supposition that, enhanced student performance is largely reliant upon their understanding and proficiency to efficiently shoulder their new responsibilities as global citizens is true, this research would prove to be a valuable asset for all stakeholders. Topics in the Literature Review The Project-based learning methodology presupposes that learning is a dynamic, integrated and productive activity. In such an interactive learning atmosphere, students work in the company of other classmates to work out compound and real-life problems that will facilitate the development of content knowledge in addition to helping them to become accustomed to the art of problem solving, logical thinking, communication, and self evaluation (CTL, 2001). Proponents of this approach hold that majority of the students consider project-based learning initiatives to be encouraging, which in the long run helps development of important skills (Helle et al. , 2007). Performance oriented evaluations will render high expectations, simulate real-world problems, and would necessitate a variety of skills and proficiencies to deal with such issues (BIE). Even though the potential such techniques exhibits are beyond measure, project-based learning faces some serious challenges. It entails a wide-ranging framework, skills, procedural planning, support, and resources that go beyond the precincts of a textbook (Andres, 2006). Methodology This research would employ a mixed research methods design that will make use of both quantitative as well as qualitative approaches. Quantitative data will be accumulated to evaluate the students’ reading accomplishments via a pre and post appraisal of a learning element. In addition, the qualitative technique would be used to appraise the efficiency of project-based learning techniques on the students’ enthusiasm to shoulder responsibility and the ingenuity in their coursework and other learning activities. Data Collection Data would be gathered across a timeline scaling six-weeks in course of a reading unit within the learning environment. The research team would shoulder the responsibilities of an observer and detailed studies would be carried out with respect to the usefulness of project-based educational approaches. In this examination students would be monitored, and pieces like journals, class work, project reports, and unit test performance sheet would be collected. Such a research-based scrupulous practice is in line with the features of a fully operational educational atmosphere (Georgia Department of Education, 2007). Data Analysis The information collected would be evaluated by means of triangulation. Graphically, the linkage between the students’ pre and post test results would be determined. A t-test would be carried out to contrast each unit’s intensity of enthusiasm and level of reading accomplishment. In order to examine the statistical implications, a mixed model analysis of variance (ANOVA) would be employed to identify the differences that generally exist in the treatments processes. Identification of Necessary Approvals So as to carry out the pertinent research processes effectively, the De Kalb County School System in Decatur, Georgia and the school authority would need to sanction the proposal and approve the research initiative.

Sunday, September 15, 2019

Emma by Jane Austen Essay

The comic novel â€Å"Emma† by Jane Austen tells about smooth and roughs of a young lady Emma who is intelligent, but has nothing to do. Actually, the author ironically shows how Emma is trying to change her position in life. Nevertheless, the novel differs fro others Austen’s writings as Emma is financially independent and, therefore, she doesn’t want to marry because of money and better position in society. The author departs from her primary theme as in other works she focuses mostly on the quest for marriage. Therefore, â€Å"Emma† is lighter and more humorous than other writings. Emma is twenty one. She lives with her father who takes too much care of her. Emma’s live is comfortable as she has loving family and money, though she considers her life rather dull and empty. She is presented as determined young lady and throughout the novel we see that she mutedly protests against such life of wealthy lady. She is disappointed as she has no one to love and she is still childless. However, instead of marrying unpleasant man she prefers matchmaking. Firstly, she tries to match her friend Harriet Smith. The novel turns interesting when Frank Churchill arrives with Jane Fairfax. Emma starts thinking that she has to find something to do and to change her dull life. She sees that many young ladies have handsome couple and she tries to fall in love with Frank, but her old friend Mr. Knightly loves her. Harriet thinks that he is in love with her and Emma feels jealousy about that fact. Finally, she understands Mr. Knightly is her true love. When she makes her a proposal to marry him, she agrees. Harriet marries young farmer. Actually, the novel is provided with happy ending. As for me, I enjoy reading Austen’s novels as they raise important theme: to marry a person whom you love or who is wealthy. I think that it is still a matter of debates. Austen’s heroines are vividly shown leading us into new word of adventures, secret engagements and mysteries.

Saturday, September 14, 2019

Trends in Modern International Terrorism

Trends in Modern International Terrorism Boaz Ganor Abstract This chapter examines some of the most widely researched trends and developments within the phenomenon of modern international terrorism, providing policy recommendations on how to counter its emerging threats – particularly that of the Global Jihad movement and â€Å"homegrown† terrorism. The magnitude of the modern terrorist threat was demonstrated by the attacks of September 11, and ever since, the field has experienced a renewal of sorts, attracting unprecedented attention by both scholars and the mainstream public.This chapter will introduce readers to the main schools of thoughts within the academic field that explain terrorism. It will also present the many disciplines applicable to the study of terrorism, demonstrating that the phenomenon is multifaceted in nature, requiring a cohesive international and broad-based response. In covering a number of dilemmas facing terrorism experts, the chapter explore s the debate over a definition of terrorism, providing a proposed definition that distinguishes acts of terrorism from criminal acts.The chapter continues on to explore the phenomenon of modern terrorism, the role of traditional crime within the terror sphere, and the growing threat of Global Jihadi terrorism – including terror networks and homegrown cells and activists who have emerged as a result of the spread of radical Islamic ideology. The role of terrorism in democratic states and the economic ramifications of terrorism are also explored. Finally, the chapter ends with recommendations on how governments should effectively respond to terrorism and discuses room for further research.Trends in Modern International Terrorism In recent years, the academic world has witnessed a surge of research and academic programs in the field of homeland security and counterterrorism. After the attacks of 9/11, the threat of global terrorism immediately topped the international agenda. B. Ganor Lauder School of Government, International Institute for Counter-Terrorism (ICT), Interdisciplinary Center (IDC), Herzliya, Israel e-mail: [email  protected] ac. il D. Weisburd et al. (eds. ), To Protect and To Serve: Policing in an Age of Terrorism, DOI 10. 007/978-0-387-73685-3_2,  © Springer Science + Business Media, LLC 2009 11 12 B. Ganor Growing recognition of the threat, combined with an increase in government spending, spurred the development of academic research institutions, think tanks, and new higher education programs in the study of homeland security and counterterrorism. The trend was particularly prominent in the United States, as researchers sought a basic understanding of the characteristics of terrorism and agencies sought ways to effectively cope with the phenomenon.This trend was accompanied by a significant increase in the number of researchers focusing on the phenomenon of terrorism. These researchers came from a wide array of academic disciplines, applying varied quantitative and qualitative research tools and methods in their analysis of the threat. In understanding the phenomenon and preventing future terrorist attacks, researchers have focused primarily on understanding the rationale of terrorist organizations in general and Global Jihad organizations in particular – their cost-benefit calculations and their decision-making processes. Trends† in terrorism have also been explored – often focusing on the introduction, transition, or prominence of a specific modus operandi or a method, such as suicide bombings, the Global Jihad movement, or the use of unconventional weapons. Reviewing these trends and themes in terrorism – and the academic research that has accompanied them – is crucial in determining how far we have come and how far we have to go, both in terms of the governments designing and deciding on counterterrorism policy and the academics informing such decisions.In exploring the phe nomenon of modern international terrorism, this chapter will first introduce readers to the various schools of thought and academic approaches used in explaining terrorism – drawing on a wide range of disciplines and theories. Discussion will then move to one of the most basic components of the terrorism dilemma, with implications on how the term – and thus phenomenon of terrorism itself – is treated, applied, and understood by the international community – the debate over defining terrorism.As will be demonstrated, definitions of terrorism vary widely – with equally as wide implications – yet there is still a general consensus among most leading scholars as to the essential nature of the threat. â€Å"Modern terrorism,† the next theme that will be explored in this chapter, is regarded as a form of psychological warfare intended to spread fear and anxiety among the target population. This fear is translated into political pressure on decision makers to change policies in such a manner that will serve the terrorist’s interests.As such, modern terrorists attempt to exploit the liberal values of democratic states, forcing governments to adhere to their demands as a result of the physical, psychological, and economic ramifications of terrorist attacks. The nature of terrorism in relation to the democratic state will be explored in a later section of this chapter as well. As terrorist groups are usually engaged in a long war of attrition, terrorist organizations need ongoing support and funds to ensure they can maintain their activities.In fact, one of the main sources of funding for many terrorist organizations is criminal activity: smuggling, counterfeiting, extortion, and narcotics. At the beginning of the twenty-first century, the threat of international terrorism grew with the spread of Global Jihad terrorism. Made up of complex networks of hierarchal terrorist organizations, proxy and affiliate organizat ions, local and international terror 2 Trends in Modern International Terrorism 13 etworks, sleeper cells, and indoctrinated radical activists, all these actors share a common extreme ideology and the readiness to use violence in general – and terrorism in particular – in order to achieve their goals. The economic ramifications of these activities only further exacerbate the damage posed by terrorist attacks, another focus of terrorism research. This dynamic terrorist phenomenon has threatened an increasing number of states while involving more terror organizations, networks, activists, and supporters worldwide.The growing level of the threat, its international scope, its lethality,1 and the possible use of nonconventional terrorism (CBRN – chemical, biological, radiological, and nuclear weapons) necessitate future multidisciplinary research in the field and a more cohesive, international response. Explaining Terrorism In general, two schools of thought explaini ng the phenomenon of modern terrorism have emerged out of the collection of academic work within the discipline – the â€Å"psychological-sociological† school of thought and the â€Å"political-rational† school of thought.Both schools maintain that terrorism seeks to achieve political goals by instilling fear and anxiety among the target population, but each stresses a different aspect of the explanation. The psychological-sociological school, represented most recently by scholars such as Dr. Jerrold Post (1998) and John Horgan (2005), stresses the phenomenon’s psychological component, maintaining that the immediate and central goal of terrorism is to instill fear and anxiety, while its political goals are long term. Terror as a clinical term refers to a psychological state of constant dread or fearfulness, associated with an abnormally high level of psych-physiological arousal. This is central to what terrorists aim to achieve, since after all, while the y have some ultimate set of political objectives, it is an immediate goal of most terrorist groups to cause terror† (Horgan, 2005:14). The psychological-sociological school addresses both the desired effect of terrorism and its root causes, relying primarily on social group dynamics and the psychological profile of an individual terrorist actor.Some early psychological explanations of terrorism have focused on the disruptive or psychopathological personalities of terrorist operatives, analyzing terrorists based on characteristics or disorders associated with violent or aggressive behaviors (De la Corte et al. , 2007). Some of the common psychological characteristics that have been attributed to alleged terrorists Analysis of terrorist incidents over the last 35 years confirms that terrorist attacks, while arguably decreasing in quantity, are growing more deadly over time, as the number of fatalities per attack has increased (LaFree and Dugan, in this volume).Such data, however , rely on a definition of terrorism that LaFree and Dugan themselves note is relatively â€Å"inclusive. † The Global Terrorism Database (GTD), on which their analysis is based, excludes â€Å"attacks on the military by guerilla organizations,† but includes military targets attacked by substate actors motivated by political, economic, or social motives (See LaFree and Dugan; in this volume). 1 14 B. Ganor re paranoia, antisocial and narcissistic personalities (Millon, 1981; Post, 1987), lack of empathy with victims, hostility toward parents, dogmatic or ideological mentality, or a simplistic or utopian worldview (Victoroff, 2005). At one end of the spectrum within such literature is the assertion – and at times assumption – that terrorists are to some degree psychologically â€Å"abnormal,† possessing personality disorders that qualify them as insane or psychopathic (as discussed by Cooper, 1978; Hacker, 1976; Lasch, 1979; Pearce, 1977; Taylor, 198 8).Despite early research providing psychological profiles of terrorists, other terrorism researchers have come to the general conclusion that there is no universal terrorist personality pattern; most terrorist operatives are not necessarily â€Å"psychopaths† (Silke, 1998), nor do they show traces of being clearly or consistently mentally ill (Crenshaw, 2000; Post, 1998; Stahelski, 2004). Early studies on the topic have been largely disproved or debunked, in fact, even within the psychological-social school of thought.Further research has shown that terrorists rarely meet the criteria for insanity,2 but rather may possess some â€Å"particular personality dispositions† related to psychological conditions or disorders (Post, 1987). Dr. Jerrold Post, an expert in political psychology, maintains that even though terrorists fit within the spectrum of â€Å"normality,† a large number have demonstrated specific personality characteristics that indicate a minor psycho pathology, such as aggression, activism, thrill seeking, an externalist psychological mechanism and factionalism.These are characteristics of narcissistic disorders and borderline personalities (Post, 1998:25–27). While Post stops short of actually diagnosing terrorists with such disorders or characteristics, he does claim they tend to have high frequency among terrorists, contributing to a uniform rhetorical style and logic (Silke, 1998:65). According to Post, there is a unique logic that characterizes a terrorist’s thought process – a â€Å"terrorist psycho-logic. Post claims that terrorists are motivated by psychological influences when they choose to conduct violent acts, as expressed in rhetoric that relies on â€Å"us versus them† and â€Å"good versus evil† dichotomies. He further claims that lodged in a terrorist’s permanent logic is the notion that the regime must be toppled, which is a result of the terrorist’s search for i dentity. In an attack against the regime, a terrorist is actually trying to destroy the inner enemy within him.However, even as some researchers cite it as the primary cause, a terrorist’s individual psychological profile is not the only significant explanation for the phenomenon of terrorism. Rather, group psychology and sociology may be significant explanatory factors behind terrorist attacks. Various researchers have cited group pressure as a variable to explain recruitment, methods of operation and involvement in terrorism (Merari, 2004). Others have applied the cult model to terrorist organizations (Morgan, 2001). Studies by Heskin (1984), Rasch (1979), and Taylor (1988) have all cited evidence discrediting the assumption that terrorists are psychologically â€Å"abnormal. † 2 Trends in Modern International Terrorism 15 It is in this context that Post emphasizes the group as a framework in which a sense of belonging and importance for its members is created. He cl aims that ideology plays an important role in supporting a unifying environment for the group.Shared ideology justifies the group’s activity and quickly transforms into the group’s moral guide. The psychological-sociological school relies, therefore, on psychological and sociological characteristics, motives, and grievances in explaining the phenomenon of terrorism. In contrast, the â€Å"political-rational† school of thought views terrorism as a rational method of operation intended to promote various interests and attain concrete political goals (Crenshaw, 2000; Hoffman, 1998; Shprinzak, 1998).Rational choice theory has been adopted by a number of terrorism researchers within this school, and maintains that terrorist action derives from a conscious, rational, calculated decision to choose one route of action over another (Crenshaw, 1992; Sandler et al. , 1983; Sandler and Lapan, 1988; Wilson, 2000). 3 Leading researcher Martha Crenshaw explains that an organiz ation chooses terrorism among several operational alternatives in order to promote their mutual values and preferences.In making a rational calculation of the costs and benefits, terrorism is deliberately chosen as the preferred method of political activity because it is perceived to be the most effective of the operating alternatives – the benefits exceed the costs. In this context, Ehud Shprinzak similarly stressed that the phenomenon of terrorism is not the result of disturbed human activity or a random thoughtless attack. This is a process that almost always begins without violence or terrorist activity (Shprinzak, 1998:78).Rand terrorism expert Bruce Hoffman further clarified the â€Å"rationalist† approach: â€Å"I have been studying terrorists and terrorism for more than twenty years. Yet I am still always struck by how disturbingly ‘normal’ most terrorists seem when one actually sits down and talks to them†¦ Many are in fact highly articulate and extremely thoughtful individuals for whom terrorism is (or was) an entirely rational choice†¦Ã¢â‚¬  (Hoffman, 1998:7)The dispute between the rationalist and psychological approach is important in understanding the root causes of terrorism, allowing experts and security professionals to identify characteristics of the threat and formulate effective counterstrategies. While the two schools may seem to fundamentally clash, an interdisciplinary explanation of terrorism may actually be the most effective way to approach the phenomenon. In a sense, these two schools can complement and complete each other.In the Israeli setting, for example, the case of a suicide bombing is likely motivated by a combination of the rational calculations of the organization, a cost-benefit analysis made by the attackers themselves, social pressure from the attackers’ peer group, and personal psychological, social, cultural, and religious motivations. The decisionmaking process functions on a number of levels, in which both political-rational 3 For an overview of psychological, social, and rational choice theories, see Victoroff, 2005. 16 B. Ganor Psychology H ci ol og ist or y So Law Why Terrorism ? Economics Media & Communication Political Science Fig. 2. 1 Explanatory disciplines to terrorism and the psychological-sociological explanations have their place, demonstrating the multidisciplinary nature of terrorism. As Crenshaw noted, even though an act of terrorism may not be wholly the result of a psychological disorder, that is not to say â€Å"the political decision to join a terrorist organization is not influenced or, in some cases, even determined by subconscious or latent psychological motives† (Crenshaw, 1998:386).It seems that only multivariable explanations based on methodologies and theories from different disciplines can adequately address the complex phenomenon of terrorism, provide explanations for the growth, development and characteristics of th e phenomenon, and suggest methods for effectively dealing with terrorism (Fig. 2. 1). Explanatory Disciplines to Terrorism Different research disciplines may be able to provide answers to fundamental questions at the core of terrorism research, such as:Psychology The field of psychology can provide answers to such questions as: Do terrorists have common psychological characteristics? Do terrorists have a psychological profile? Why do people become terrorists? Which people might become terrorists and which will not? Why do people join a terrorist organization and why do they leave it? When, why, and how does the personal radicalization process take place? (See Post, 1998; Raine, 1993; Hubbard, 1971). 2 Trends in Modern International Terrorism 17 Economics How important are economic variables in explaining the development and motivation of terrorism?To what degree can terrorists’ financial situation explain the motives for their behavior? How much does the economic factor deter mine the scope and characteristics of terrorism activity? 4 (See Abadie, 2004; Kahn and Weiner, 2002; Krueger and Laitin, 2008; Krueger and Maleckova, 2002; Piazza, 2006). Sociology How much influence does one’s peer group have on the decision to join a terrorist group or the motivation to conduct acts of terrorism? How much can processes of socialization and delegitimization by society – ostracizing, discrimination, alienation, etc. serve as variables explaining the motives of terrorism? Why does a certain population at a specific time tend to carry out terrorist attacks while another population with similar characteristics does not choose this course of action? What is the extent of the connection between terrorism and different cultures? 5 (See Bandura, 1973, 1998; Gibbs, 1989; Merari, 2004; Morgan, 2001; Webb, 2002). Criminology To what extent should terrorism be treated as a phenomenon in the criminal sphere? What are the differences between the characteristics of criminal and terrorist activity?What are the similarities and the differences in the organizational characteristics between terrorist and criminal organizations? 6 (See Klein et al. , 2006; Klein and Maxson, 2006; Lafree, 2007). 4 Several studies have focused on refuting the widely claimed link between poverty and terrorism (Harmon, 2000; Hasisi and Pedahzur, 2000; Schmid, 1983). In fact, a 2003 study by Krueger and Maleckova showed that higher-earning Palestinians were more likely to justify the use of terrorism to achieve political goals; and a 2002 study (Krueger and Maleckova, 2002) did not find a link between Hezbollah fighters and impoverished conditions – ather, they were richer and more educated than their counterparts. Another study looked at the biographies of 285 suicide bombers and found them to be richer and more educated than members of the general population (Victoroff, 2005:21). 5 Until September 11, there were few academic studies of terrorism from a strictl y sociological viewpoint. However, Bandura (1973, 1998) used social learning theory to suggest that violence follows observation and imitation of an aggressive model. Friedland (1992) cited the â€Å"frustrationaggression hypothesis† in understanding why terrorists turn to violence (as cited in Victoroff, 2005).Morgan (2001) applied the cult model to understand individual actors and group dynamics within terrorist groups. 6 For the role of policing in counter-terrorism strategies, see Chaps. 3–5 of this volume. LaFree and Dugan (Chap. 2) also briefly discuss the comparison between rates of terrorist attacks and other types of criminal violence. The interplay and linkages between organized crime and terrorism are explored in several anthology volumes, such as Holmes (2007), among many others. 18 B. GanorPolitical Science and International Relations To what extent should terrorism be understood in rational terms (cost-benefit calculation) as an effective method intended to achieve political goals? To what extent can political terms such as sovereignty, power, authority, and social justice serve as variables to explain the phenomenon of terrorism? To what degree is the phenomenon of terrorism connected to certain ideologies or a certain form of government? To what degree does modern terrorism aim to take advantage of the liberal democratic form of government’s values and traits?To what extent is the media component essential in order to explain the strategy of modern terrorism? How are the decision-making processes different in terrorist organizations than other organizations? Can terrorism be understood as a means for states to achieve their interests in the international arena? To what extent can terrorism be dealt with by using deterrent measures in general and deterring state-sponsors of terrorism in particular? (See Crenshaw, 2000; Ganor, 2005; Hoffman, 1998; Nacos, 1994). Theology To what extent is modern terrorism a result of religious extremism?How is incitement to terrorism carried out with the use of religious rationalizations and how can this incitement be dealt with? (See Atran, 2006; Hoffman, 1995; Juergensmeyer, 2003; Ranstorp, 1996; Rapoport, 1984). Hence, nearly every academic research discipline has been, and will continue to be, critical in providing answers to some of the central issues that lie behind understanding the phenomenon of terrorism and the methods for dealing with it. Only this multidisciplinary approach can provide a profound understanding of the phenomenon. The Definition of TerrorismGrowing interest in the field of terrorism and increased funding allotted to academic research and teaching budgets post-9/11 has spurred and supported the publication of hundreds of books and articles in the past few years, many professional and academic conferences, and a general flourishing of the field. Yet, six years after the world recognized the magnitude of the terrorist threat on 9/11, researchers, security professionals, politicians, jurists, and others have still not been able to agree upon its most fundamental component – what is terrorism?Moreover, and somewhat surprisingly, the only consensus these individuals have reached is that it might be impossible, or even unnecessary, to reach an internationally 2 Trends in Modern International Terrorism 19 accepted definition of terrorism. 7 Those who hold this opinion – in fact the majority in the field – usually cite the cliche â€Å"one man’s terrorist is another man’s freedom fighter,† in order to imply that, in their opinion, the issue of definition is subjective. As such, even partial agreement regarding its content cannot be reached. Louis Henkin (1989) captured this entiment in 1990 when he said that: â€Å"Terrorism†¦ is not a useful legal concept. † Those who do not regard a definition as critical believe that the international system – and the security establi shment in particular – can manage without consensus on the issue. They claim that terrorists, in a sense, commit regular crimes – extortion, murder, arson, and other felonies already covered by conventional criminal law. Therefore, they can be tried for committing these felonies without the need for a special criminal classification, and thus definition, for terrorism.Needless to say, there is no shortage of proposed definitions for terrorism. Every researcher, expert, security professional, NGO, country, and politician espouses their own definition, one that likely represents a distinct world view and political stance. By the early 1980s, Schmid and Jongman had already listed 109 definitions of terrorism proposed by researchers in the field (Schmid and Jongman, 1998:5). In their chapter in this volume, LaFree and Dugan touch upon the difficulty in reaching a consensus on a definition of terrorism given its controversial and highly politicized nature.It is within this context that they note the U. S. was reluctant to define the attacks by Contra rebels in Nicaragua as terrorism, while regarding practically all violence in Iraq and Afghanistan as such. They further note that more inclusive definitions of terrorism are often preferred by businesses or private think tanks that are collecting data for the purpose of risk assessment, as such an approach ultimately benefits their clients (LaFree and Dugan, in this volume). Among the hundreds of definitions of terrorism that have been accepted throughout the years, some contain conceptual and phrasing problems (Hoffman, 2004:3).Many researchers note that the only certainty regarding terrorism is the pejorative manner in which the word is generally used and associated (Hoffman, 2006:23; Horgan, 2005:1). As such, when scholars, politicians, or activists describe and analyze the activities of alleged terrorist organizations, they very often use alternative terms that bear more positive connotations, such a s guerilla or underground movements, revolutionaries, militias, militants, commando groups, national liberation movements, etc. (Hoffman, 2006:28).Many in the Western world have accepted the premise that terrorism and national liberation are located on two opposite ends of a spectrum legitimizing the use of violence. The struggle for â€Å"national liberation† is, allegedly, located on the positive 7 In a presentation on the definition of terrorism to the UK Parliament in March 2007, Lord Carlile quoted David Tucker from Skirmishes at the Edge of the Empire, stating that: â€Å"Above the gates of hell is the warning that all that enter should abandon hope. Less dire but to the same effect is the warning given to those who try to define terrorism† (See http://www. amilnation. org/terrorism/ uk/070317carlile. htm); for a reporter’s perspective see Kinsley, 2001; see also Levitt (1986), in which he claims a definition for terrorism is no easier to find than the Hol y Grail. 20 B. Ganor and justified end of the violence spectrum, while terrorism is its unjust and negative polar opposite. Within this framework, it would be impossible for a specific organization to be considered both a terrorist group and a national liberation movement, as Senator Henry Jackson claims: â€Å"The thought that one man’s terrorist is another man’s freedom fighter is unacceptable.Freedom fighters or revolutionaries do not blow up buses with noncombatants; terrorists and murderers do. Freedom fighters do not kidnap and slaughter students, terrorists and murders do†¦Ã¢â‚¬  (As cited in Netanyahu, 1987:18) There is little basis for the claim that â€Å"freedom fighters† cannot carry out acts of terrorism and murder. This approach unintentionally plays into the hands of terrorists, who claim that since they are acting to expel who they consider to be a foreign occupier, they cannot also be considered terrorists.However, many freedom fighters i n modern history committed crimes and purposely targeted innocent civilians. The difference between â€Å"terrorism† and â€Å"freedom fighting† is not a subjective distinction based on the observer’s point of view. Rather, it derives from identifying the perpetrator’s goals and methods of operation. Terrorism is a means – a tool – for achieving an end, and that â€Å"end† can very well be liberating the homeland from the yoke of a foreign occupier. An organization can be, at the same time, both a national liberation movement and a terrorist group.It is not the specific goal – whether â€Å"freedom fighting† or another legitimate political objective – that distinguishes a group as a terrorist organization or justifies its activities. Many groups, however, such as the Muslim World League, do not clearly make this distinction. In a special publication from 2001, the Muslim World League states that: â€Å"Terrorism is an outrageous attack carried out either by individuals, groups or states against the human being (his religion, life, intellect, property and honor).It includes all forms of intimidation, harm, threatening, killing without a just cause†¦ so as to terrify and horrify people by hurting them or by exposing their lives, liberty, security or conditions to danger†¦ or exposing a national or natural resource to danger† (Al-Mukarramah, 2001). In presenting the activities that constitute terrorism as being committed â€Å"without a just cause,† the Muslim World League’s definition infers that such acts committed with a just cause are not considered terrorism.Such definitions are typical of attempts to create confusion between the means and the end, ultimately foiling any possibility of reaching a consensus on a definition. Since September 11, international terrorism has emerged on the top of national and international security agendas, widely perceived as a s evere and very real threat to world peace. It is a threat that necessitates international alignment and cooperation on an unprecedented level. Such a high degree of cooperation cannot be established or sustained however without agreement over the most basic common denominator – the definition of terrorism.Outside intelligence and military circles, the effectiveness of other apparatuses essential in countering the terrorist threat is dependent upon a clear, broad, and objective definition of terrorism that can be accepted internationally. Such a definition is essential in order to: disrupt the financing of terrorism, respond to states and 2 Trends in Modern International Terrorism 21 communities that support terrorism, prevent recruitment and incitement of terrorist operatives, and establish legal measures and guidelines to both outlawed terrorist organizations and activities, and arrest and extradite alleged terrorists.Above all else, the international community must establis h a binding normative system to determine what is allowed and not allowed – what is legitimate and not legitimate – when violence is used for political objectives. A definition that would address all these requirements is: Terrorism is the deliberate use of violence aimed against civilians in order to achieve political goals (nationalistic, socioeconomic, ideological, religious, etc. ) In defining terrorism within the above framework, it is important to note that a terrorist act would not be classified as a â€Å"regular† criminal activity warranting the application of criminal legal norms.Rather, terrorism would be viewed as an act of war, and the countermeasures mounted against it would too be conducted in accordance to the norms and laws of war. The Israeli High Court of Justice has itself struggled with the distinction between criminal acts and acts of war, reflecting the tension facing those studying and responding to terrorism today. According to Justice C heshin, â€Å"a judge’s job is difficult. It is sevenfold as difficult when he comes to deal with a hideously murderous attack such as we have in front of us.The murderer’s action is inherently – though not within the framework of or as part of the formal definition – an act of war, and an act that is inherently an act of war is answered with an act of war, in the ways of war† (Abd Al-Rahim Hassan Nazzal and others vs. the Commander of the IDF forces in Judea and Samaria, 1994). In a different verdict, the judge ruled that a â€Å"criminal code created for daily life in human society does not have an answer for the question† (Federman and others vs. the Attorney General, 1993).The debate over whether terrorism should be considered a criminal act or an act of war remains strong among academics, NGOs, and counter terrorism professionals. Without consensus on the issue, states have applied their own policies in trying and convicting alleged ter rorist suspects – whether as criminals or combatants. Despite the fact that criminal acts can consist of the same actions as terrorism – murder, arson, and extortion – terrorism, unlike an average criminal act, threatens the internal social order, personal and national security, world peace, and the economy. As previously noted, acts of terrorism are intended to achieve various political goals and could thus be considered arguably more severe than criminal violations. In addition, as international law expert and terrorism prosecutor Ruth Wedgwood has argued, criminal law may be â€Å"too weak a weapon† to counter terrorism, as destroying terrorist infrastructure and networks requires diplomacy, use of force, and criminal 8 Resolution 1566 (2004) adopted by the Security Council in its 5053rd meeting, on Oct. 8 2004: â€Å"†¦Reaffirming that terrorism in all its forms and manifestations constitutes one of the most serious threats to peace and security .Considering that acts of terrorism seriously impair the enjoyment of human rights and threaten the social and economic development of all states, they undermine global stability and prosperity. † (See: http://daccessdds. un. org/doc/UNDOC/GEN/N04/542/82/ PDF/N0454282. pdf? OpenElement. ) 22 B. Ganor law combined. She adds that the restrictions embedded in a criminal justice system make sense in civil society where deterrence is a factor, but this may not apply in a fight against a highly networked terrorist organization (Wedgwood and Roth, 2004). Bruce Hoffman points to a fundamental difference between a criminal and a terrorist when he asserts that while a criminal seeks personal material goals, a terrorist usually sees himself as an altruist acting for and in the name of many others (Hoffman, 2006:37). Therefore, a terrorist may be perceived as posing greater danger through his actions, since he is significantly more willing than a criminal to sacrifice in order to achieve his goals – even to the point of self-sacrifice in certain situations. The criminal code in itself does not serve as an adequate platform to define terrorism.The laws of war are better suited as a framework for defining and dealing with terrorism, since the phenomenon is a violent action intended to achieve political goals, often involving the use of pseudo-military methods of operation. By basing the definition of terrorism on an established system of norms and laws, already included in international conventions and accepted by most of the countries in the world, the international community is more likely to reach a broad international agreement on the definition of terrorism – a basic tool in the joint international struggle against terrorism.At the core of the Geneva and The Hague conventions are rules differentiating between two types of personnel involved in military activity: â€Å"combatants,† military personnel who deliberately target enemy military pers onnel; and â€Å"war criminals,† military personnel who, among other actions forbidden by the laws of war, deliberately target civilians. Currently, the moral differentiation between a legitimate combatant and a war criminal is based on the attacked target (military or civilian), and, at least in principle, only applies to state entities and their armies and not to substate entities.In the Israeli setting for example, a Palestinian, considered part of a subnational group, who is involved in a deliberate attack against an Israeli military target, will receive the same treatment and punishment as a Palestinian who deliberately attacks a civilian target. Since there is no distinction made between the two, despite the difference in their targets, the degree of international legitimacy or condemnation of both cases will likely continue to be dependant on the supporter or condemner’s political stance and not necessarily on the character or target of the deliberate operation – its legality under applicable rules and norms.The American government, for example, classifies attacks against its troops in Iraq as terrorist attacks, as it does the October 2000 attack against the USS Cole or the attack against the American military barracks in Dhahran (June 1996). In fact, in an attempt to expand the definition of terrorism to include attacks against soldiers, the U. S. State Department’s definition states that terrorism is the Ruth Wedgewood and Human Rights Watch Director Kenneth Roth debate the US’s treatment of terrorist suspects – as combatants versus criminals – in a series of articles in Foreign Affairs (See Roth, 2004; Wedgwood and Roth, 2004). 2 Trends in Modern International Terrorism 23 deliberate use of violence against â€Å"non-combatant targets,† which includes both civilians and military personnel not on the battle field. 10 While it is natural for victims of terrorism to adopt this broad-based definitio n, terrorist organizations and their supporters can legitimately argue that in seeking to achieve their political goals, they cannot reasonably be required to either not confront military personnel entirely, or do so only when they are fully armed and prepared for war.They claim that they must be given the right to attack and surprise soldiers whatever the circumstances. In applying these considerations, the U. S. State Department’s definition of terrorism could not successfully serve as a common denominator leading to international agreement. It is only in reducing the scope of the definition to the deliberate targeting of civilians – as opposed to â€Å"non-combatants† – that may solve this problem, enabling the establishment of a clear moral boundary that should not be crossed. A terrorist act would be considered, in a sense, the equivalent for a substate entity to a war crime committed by a state. 1 During a state of war, normative principles and the laws of war forbid the deliberate targeting of civilians but allow deliberate attacks on an enemy’s military personnel (in accordance with other applicable regulations). Similarly, in modern asymmetric warfare, a normative rule must be set to address limitations on substate actors, differentiating between guerilla warfare (violence against military personnel) and terrorism (violence against civilians) – just as the rules of war differentiate between legitimate combatants and war criminals.For the purpose of defining terrorism, it is not significant what goal the organization aspires to achieve (as long as it is political); both the terrorist and the guerilla fighter may aspire to achieve the same goals. However, they each chose a different path – a different means – in order to realize these goals. Defining terrorism is critical in ensuring that the same normative standards currently enforced on states are applicable to nonstate actors, defining when thei r use of violence is permissible and when it is prohibited.Paradoxically, what is currently prohibited for states is not yet prohibited for organizations. Defining terrorism does not raise or lower the obligation of states to behave normatively and certainly does not place additional legal burdens upon them. It simply makes organizations accountable for their actions under the same value system currently obligating states. Terrorism is defined by the U. S. State Department as: â€Å"premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents. (from the 22 U. S. C. , 2656f(d)(2); See http://www. state. gov/s/ct/rls/crt/2005/65353. htm. ) 11 The UN short legal definition of terrorism, proposed by terrorism expert Alex P. Schmid, states that an act of terrorism is the â€Å"peacetime equivalent of a war crime. † While such a definition does not consider terrorism an act of war, in drawing a parallel with a w ar crime it notes the importance of the target (civilian vs. military) in legitimizing acts of violence. (See: http://www. unodc. org/ unodc/terrorism_definitions. html. ) 10 24 B. GanorReaching a broad international agreement regarding the definition of terrorism may require the international community to apply laws of war that forbid the deliberate targeting of civilians, but allow for the deliberate attack (in accordance with the other regulations) of an enemy’s military personnel. The definition proposed in this chapter may be capable of eliciting a broad base of support from many countries and organizations, both because it is based on already accepted international norms, and because it seemingly provides subnational organizations the possibility of legitimately using violence in order to achieve their goals.Such a definition would not allow for the artificial distinction that is often made between â€Å"bad† terrorism and â€Å"good† or â€Å"tolerableâ €  terrorism. It instead adheres to the principle that â€Å"terrorism is terrorism is terrorism,† no matter who carries it out – a Muslim, Christian, Jew, or member of any other religion. Terrorism would be considered an illegitimate and forbidden method of operation in all cases, under all circumstances. The ideological or cultural background of the perpetrators; and the religious, political, social or economic motives of the act; would all be irrelevant in classifying an act of terrorism.Many view the effort to achieve a broad international agreement on terrorism as hopeless and naive. However, Security Council Resolution 1566, which was unanimously accepted by Council members in October 2004, may be a basis for hope that countries will overcome prior disputes, rise above their own interests, and reach an agreement in the near future regarding the international definition of terrorism. Resolution 1566, without serving as the definition itself, already establishes one basic principle on which an international definition can be built.It stipulates that terrorism is a crime against civilians, which in no circumstance can be justified by political, philosophical, ideological, racial, ethnic, religious, or other considerations. 12 Modern Terrorism Descriptions of typical terrorist operations and their common characteristics are often included in proposed definitions of modern terrorism – particularly in those that address the fear and anxiety created by terrorist acts. In such definitions, terrorism is presented as a form of violent activity (or threat of violence) that 2 Resolution 1566 (2004): â€Å"Condemns in the strongest terms all acts of terrorism irrespective of their motivation, whenever and by whomsoever committed, as one of the most serious threats to peace and security†¦Recalls that criminal acts, including against civilians committed with the intent to cause death or serious bodily injury or taking hostages with the pur pose to provoke a state of terror in the general public or in a group of persons or particular persons intimidate a population or compel a government or an offences within the scope of and as defined in the international conventions and protocols relating to terrorism, are under no circumstances justifiable by considerations of a political, philosophical, ideological, racial, ethnic religious or other similar nature and calls upon all states to prevent such acts†¦Ã¢â‚¬ . (See: http://daccessdds. un. org/doc/UNDOC/ GEN/N04/542/82/PDF/N0454282. pdf? OpenElement) 2 Trends in Modern International Terrorism 25 intends to frighten a group of people beyond the actual victims (Horgan, 2005:1).After reviewing the development of the definition of terrorism and examining a variety of definitions, Bruce Hoffman reaches the following conclusion in his important book, Inside Terrorism: â€Å"We may therefore now attempt to define terrorism as the deliberate creation and exploitation of fea r through violence or the threat of violence in the pursuit of political change†¦ terrorism is specifically designed to have far-reaching psychological effects beyond the immediate victim(s) or object of the terrorist attack†¦Ã¢â‚¬  (Hoffman, 2006:40). Definitions that refer to terrorism as an act intended to instill fear and anxiety in the public are generally based on the literal meaning and historical use of the term â€Å"terrorism,† its application dating back to the French civil war. 13 Such definitions also rely on what is perceived to be the primary operational tactic of modern terrorism – psychological warfare – which seeks to achieve political goals by instilling fear and anxiety among its target population.While definitions vary widely, there is a general consensus among most leading scholars as to the essential nature of the terrorist threat; researchers will rarely dispute the importance fear and anxiety play in understanding the phenomen on of modern terrorism. However, it is important to note that resulting fear and anxiety may not be an essential variable in defining a terrorist attack. In order to ensure that acts are objectively classified as terrorist attacks, an accepted definition must, in application, serve as a checklist of components. Based on the definition proposed in the previous section, if an act is not violent, does not deliberately target civilians, or does not attempt to achieve a political goal, then it is not a terrorist attack.Adding the element of fear and anxiety to the definition – essentially putting it on the checklist of required components – significantly changes the term’s application. If an attack, which would otherwise be considered an act of terrorism, does not aim to frighten, but rather only seeks to achieve concrete, tangible objectives – such as the release of prisoners or the assassination of a leading political figure – would the action not be considered terrorism? Similarly, a nuclear attack aimed at eradicating the majority of the population or contaminating an extensive area – which ultimately seeks to disable the state and prevent it from operating as an independent political entity – would be widely considered a terrorist attack, even though instilling fear and anxiety is not its primary purpose.Since such circumstances and scenarios can reasonably exist, the â€Å"fear and anxiety element† may not be necessary in defining terrorism; rather, it is valuable in explaining the modus operandi of a significant portion of modern terrorist attacks. 13 The term â€Å"terrorism† comes from the Latin terrere, â€Å"to cause to tremble. † The term became popularized during the â€Å"Reign of Terror† carried out by the revolutionary government in France from 1793 to 1794 (Juergensmeyer, 2003: 5). 26 B. Ganor Indeed, modern terrorism is not necessarily about the numbers. In fact, most mod ern terrorist attacks, while violent in nature, generally produce limited damage or casualties. 4 Instead, they rely on psychological warfare as a tool in achieving their goals, creating fear and anxiety among the general population. In many cases, a terrorist attack is random, aimed not at someone specific, but rather a group that shares a common trait and symbolizes the organization’s broader target (Americans, Israelis, â€Å"infidels,† Westerners, etc. ). By simultaneously transmitting several messages, these attacks intensify the sense of anxiety felt by the target group, which leads civilians to pressure decision makers and their government into changing policies and agreeing to terrorists’ demands. Some of the messages terrorist organizations aim to send through their attacks include: 1.Uncertainty – The randomness of the attack is supposed to instill a sense of uncertainty in the public regarding â€Å"safe behavior,† prompting fear that an yone could be the next victim (Horgan, 2005:3). 2. Vulnerability – A terrorist attack can take place anywhere, anytime, making all citizens feel vulnerable. 3. Helplessness – The state’s security apparatus cannot foil or prevent attacks, or protect civilians. 4. Personalization – You or someone close to you may not have been hurt in a recent attack, but it could very well be you the next time, since the victims have the same pro? le as you (Ganor, 2005:256). 5. Disproportional price – The price the individual must pay due to his government’s policy is very high. For that reason he must act to change national/international priorities in a way that will serve the terrorist’s objectives. 6.Vengeance – The citizen suffers due to the government’s actions against the terrorist organization and its supporters, and for this reason it is in his best interest to pressure the government to avoid this activity. Such attacks aim to c reate anxiety among the target group at a level disproportionate to the actual capabilities of the terrorist organization, forcing members of the target population to reprioritize and shift their concerns from that of national security to personal security. The target population perceives a growing threat from terrorism, which may be viewed by the public as largely fueled by the government’s supposedly dangerous policies.As political tension and criticism against the government in the target country mount, according to the strategy of modern terrorism, the public will pressure decision makers to change their policies in a manner that will suit the interests and goals of the terrorist organizations, or call for a change in administration that will establish policies more favorable to terrorist groups. In order to create this effect of fear, terrorist organizations often choose to escalate their activity in such a manner as to shock the public. According to Crenshaw, a review L aFree and Dugan note that over 53% of terrorist organizations from the Global Terrorism Database included in their study (1974–2004) have never produced a single fatality (LaFree and Dugan, in this volume). 14 2Trends in Modern International Terrorism 27 of the history of terrorism reveals that terrorists have purposely chosen targets considered taboo or unpredictable in order to attract international media coverage (Crenshaw, 1998:14–15). The media component is central to modern terrorism’s strategy. Without media coverage, a terrorist organization has little opportunity to convey its message, let alone shock or scare its target population. The success of a modern terrorist campaign is arguably dependent on the amount of publicity it receives; the â€Å"journalist and television camera are the terrorist’s best friends† (Laqueur, 1987). Terrorism and Traditional CrimeIn seeking funding to support ongoing operations or infrastructure, terrorist orga nizations in Latin America, Europe, the Middle East, and the Far East have increasingly come to rely on â€Å"traditional† criminal activities, such as drug trafficking, counterfeiting, petty crime, human trafficking, and extortion (Vidino and Emerson, 2006; Mili, 2006). In fact, over the last three decades, law enforcement agencies have reported increased cooperation between terrorist organizations and criminal actors and activities – including attacks that have been financed through illegal crimes and suspects who have been prosecuted for crimes in which proceeds were directed to international terrorist organizations like Hezbollah and Al-Qaeda (Noble, 2003).Growing expenses associated with terrorist activity, such as payments to organization personnel, transportation, accommodation, training, and procurement of weapons, have served as incentive for terrorist organizations to get involved in common crime. These activities only further exacerbate the danger posed by t errorist organizations to the global economy and to the safety and wellbeing of the world’s population. By counterfeiting currency, for example, a terrorist organization can damage a country’s economy while it raises funds. Similarly, by producing and smuggling drugs to certain countries, an organization can cause considerable harm to the local population and simultaneously finance its activities.In the early 1970s, terrorist organizations, particularly those not supported financially by states, funded their activities through criminal activities such as bank robberies, kidnappings for ransom, and blackmail. Terrorist organizations, such as the Red Brigades in Italy, cooperated with criminal elements, enlisting them into the ranks of their organization. However, in the late 1970s and more so in the early 1980s, terrorist organizations realized that drug trafficking was far more lucrative than other routine criminal activities, leading to a phenomenon known as â€Å"na rco-terrorism. †15 Terrorist organizations have been involved in producing and selling narcotics throughout the world – in Latin America (Colombia, Peru, Cuba, Bolivia); in Asia and 5 To illustrate the amount of money involved, a survey conducted by the United Nations Office for Drug Control and Crime Prevention described the production, trafficking, and sales of illicit drugs to be an estimated $400-billion-a-year industry. A 2005 UN report estimated that global drug trade generated an estimated $322 billion in 2003, greater than the gross domestic product of 88% of the countries in the world (Pollard, 2005). 28 B. Ganor the Middle East (Sri Lanka, Lebanon, Afghanistan, India, the Philippines, Pakistan); and even in Western countries such as Italy, Spain, Ireland, and the United States. Drug trafficking by terrorist groups in Columbia is of particular concern to western governments. According to reports from the U. S.Bureau of Narcotics and Law Enforcement affairs, rev enues earned from narcotics cultivation, taxation, and distribution have accounted for at least half the funding used to support terrorist activities by two of the country’s largest terrorist groups – the Revolutionary Armed Forces of Colombia (FARC) and the United Self-Defense Groups of Colombia (AUC). The State Department estimates that the FARC receives $300 million a year from drug sales to finance its terrorist activities. 16 The tri-border area (TBA), or â€Å"triple frontier† as it is known, centered along the borders of Paraguay, Argentina, and Brazil, has been widely recognized as another hotbed for terrorism financing and activity, particularly to groups such as Hezbollah and Hamas. Without strict border controls, the area serves as a haven for drugs and arms trafficking, counterfeiting, smuggling and other illegal activities.Tens of millions of dollars are estimated to have been transferred to groups through illegal remittances and other illegal activ ities, according to investigations by local police forces (Madani, 2002; Tri-border Transfers â€Å"funding terror,† 2006). Most terror organizations, however, are not directly involved in actually growing or producing drugs. They are tasked primarily with protecting the drugs and ensuring the safety of growers and producers. They also are active in smuggling narcotics to the marketing centers in countries where the drugs are distributed (Hudson, 2003:24). These organizations usually have a diverse network of contacts, enabling them to cross borders via indirect routes and smuggle weapons, ammunition, and various other products.Terrorist organizations can use the same routes and network used by their supporters in order to smuggle drugs. In some cases, drugs have been used to recruit foreign activists, in a sense bribing them to execute terrorist attacks. In these cases, the activists, who are not members of the organization, are enlisted in order to carry out attacks on beha lf of the terror organizations, sometimes unbeknownst to the activists themselves, in return for a regular supply of drugs. 17 In other cases, terrorist organizations supply their members with drugs in order to increase their dependence on the organization and encourage obedience to its leaders. 8 Some terrorist organizations refer to the distribution of drugs as an alternative form of attack, since drug consumption can harm the national morale and weaken the ability of the population to cope with crises. 16 See Deborah McCarthy’s testimony before the Committee on the Judiciary United States Senate, May 20, 2003, â€Å"Narco-Terrorism: International Drug Trafficking and Terrorism – A Dangerous Mix. † 17 For example, On August 28, 1971, a Dutch citizen, Henrietta Hundemeir, was arrested in Israel with a suitcase containing a timer-activated bomb with a barometric altimeter. The bomb was meant to explode in the El Al aircraft in which she herself was flying to Isr ael.Hundemeir was enlisted in Yugoslavia by a member of the â€Å"Popular Front for the Liberation of Palestine,† who became her close friend by supplying her with drugs and using them with her. 18 One example is the â€Å"Weatherman† organization, which was responsible for terrorist attacks in the U. S. at the end of the 1960s and the beginning of the 1970s. The group perceived drug use as a part of the revolutionary process. 2 Trends in Modern International Terrorism 29 Global Jihadi Terrorism Terrorism is a dynamic phenomenon that develops over time, gradually changing its shape and activities. It is carried out by various organizations in the service of different ideologies.Despite the fact that various local terrorist groups have operated in the international arena in the past decade, there is growing recognition by scholars and the intelligence community that the current international terrorist threat does not come from organizations motivated by nationalist grie vances or separatist goals (such as the IRA, ETA, Fatah, LTTE, PKK, and others). Instead, the main threat is that of radical Islamic terrorism primarily aimed at promoting a radical religious world view. 19 Such groups are motivated by what they perceive as a divine command, making them potentially more dangerous than groups motivated by other causes. Hoffman stresses that while religion was an inseparable component of many terrorist organizations in the past, the dominant motivation for their actions was political rather than religious.This is not the case with Al-Qaeda and other radical Islamic organizations today. For them, religion is the most important component defining their activities, ideology, characteristics, and recruitment methods (Hoffman, 2006:82). According to James Thomson, â€Å"religions are very effective at guiding in-group morality and out-group hatred. They permit the take-over of groups by disenfranchised young males, they minimize the fear of death by sprea ding the belief in an afterlife reward for those who are dying in a holy war, etc. † (Thomson, 2003:82). Radical Islamic terrorism, part of the Global Jihad movement, includes acts perpetrated by many organizations, groups, and cells around the world.The movement is headed by Al-Qaeda, which, despite the many setbacks it has endured since September 11, 2001, is still capable of carrying out â€Å"direct attacks† through activists reporting directly to its authority or â€Å"indirect attacks† through proxy organizations – radical Islamic terrorist organizations and networks that share a similar fundamentalist Islamic ideology, aspirations, and interests. Some of these organizations, such as Egyptian, Bangladeshi, and Afghan Jihadi groups, were established by Osama bin Laden under the umbrella of his â€Å"International Islamic Front for Jihad Against Jews and Crusaders† (February 1998). Some of these organizations have made pacts or commitments to bi n Laden over the years, such as the Egyptian Al-Jama’a Al-Islamiya and the GSPC (currently referred to as Al-Qaeda of the Maghreb). However, the most significant trend of the past several years has been the phenomenon of â€Å"homegrown terrorism. Lone activists and local radical groups of Muslims, who either immigrated to Western countries There are also terrorist organizations that combine religious grievances with national-political motivations, such as Hamas. On the one hand, Hamas derives its ideology from the same narrative and background as Al-Qaeda, based on the early religious global ideology of the Muslim Brotherhood. At the same time though, Hamas seeks to achieve the nationalistic goal of destroying Israel and creating a Palestinian state in its place. 19 30 B. Ganor (first, second, or third generation) or converted to Islam in their country of origin, become inspired by the Global Jihad movement, leading them to carry out terrorist attacks.Al-Qaeda, its allies i n the Global Jihad movement, other radical Islamic terrorist organizations, and the radical Islamic networks and cells of the West, all believe in one divine mission, which calls upon them to spread their radical beliefs throughout the world (Sageman, 2004:1). In seeking to achieve this mission, they believe it is permissible and necessary to make use of violence and terrorism, and that they are fighting a â€Å"defensive war† that allows them to use drastic measures. One perspective shared by several researchers is that this defensive war is not actually pitted against American or Western imperialism, as Global Jihad organizations commonly claim. Rather, the â€Å"fight against the West† is used to help mobilize and recruit activists, arguably acting as â€Å"lip service† by Al-Qaeda.It also serves to at least express their concern over every aspect of modernization, including democratic forms of government, liberal values, and even modern technology that threa ten the way of life they strive for – a radical Islamic caliphate governed by Sharia law. It is also important to note that the threat of Global Jihad is not, as many tend to think, a war between Islam and other religions. Rather, it can be understood as a war of cultures – the culture of radical Islam against the outside world; or the culture of radical Islam against the culture of the â€Å"infidels,† as Islamists call all those who do not share their world view. Many in the radical Jihadi movement recognize that they will not be able to succeed in their worldwide campaign in the near future. Therefore they aim, as a first stage, to create localized radical Islamic revolutions, primarily in Arab and Islamic countries.In fact, the majority of Global Jihad attacks over the past several years occurred in countries of the Arab or Islamic world,