Search Results/Filters    

Filters

Year

Banks



Expert Group










Full-Text


Issue Info: 
  • Year: 

    2020
  • Volume: 

    27
  • Issue: 

    17
  • Pages: 

    217-239
Measures: 
  • Citations: 

    0
  • Views: 

    231
  • Downloads: 

    0
Abstract: 

Introduction: Supervision of financial institutions, especially banks, in terms of implementing anti-terrorist Financing laws and regulations is one of the most important issues highlighted in international instruments, and countries should work to improve the effectiveness and efficiency of the system. There are various methods for supervising financial institutions, the most famous of which are the adaptive method and the risk-taking method. The adaptive approach, or the "one rule for all" approach, means that observers must inspect all of their supervised entities equally and use the same tools and make specific and similar decisions to break a rule. but, in a risk-based or risk-based approach, the amount of oversight is determined by the extent to which a financial institution is threatened and vulnerable. Achieve the goal of managing and reducing terrorist Financing risks. In other words, in this approach, achieving this goal replaces by ensuring compliance with the law in financial institutions. The implementation of this strategy requires the establishment of legal bases and the implementation of executive measures; Therefore, on the one hand, the purpose of this study is to assess the feasibility of implementing a risk-based monitoring strategy in the light of the legal principles accepted in Iran's legislative criminal policy and on the other hand, to assess the effectiveness and efficiency of the executive criminal policy of the Islamic Republic of Iran. In the field of supervision of financial institutions, this has been tried to achieve it by descriptive method. Methodology The research is descriptive-analytical. Conclusions and suggestions: In the legislature, regulators have no obligation to use risk-based methods and their decisions are not well supported. Existing performance guarantees, in addition to not being sufficient, are merely aimed at violating the prescribed rules. The supervisors have not been given the necessary authority, especially to enforce disciplinary guarantees in the event of violations of anti-terrorist Financing regulations. In the field of executive criminal policy, a review of the instructions and procedures shows that in the market entry stage, it is sufficient to inquire only about criminal records; While, firstly, not all criminals are convicted, and secondly, criminals typically use covert means to obtain a license and keep their identities secret. In the field of periodic inspections, the need to provide information alone is not enough and there is no responsibility for supervisors to create a risk profile and provide a clear correction plan. The guidelines issued so far also promote a more law-abiding approach and focus on enforcing anti-money laundering regulations; Although these provisions are largely similar to those of terrorism Financing, specific provisions on terrorist Financing, such as how to seize terrorist assets and identify suspicious terrorist Financing operations and transactions, have not been considered. Accordingly, in order to improve the effectiveness of Iran's criminal policy in relation to the Financing of terrorism, in the first place, the issue of legal principles, especially the obligation of supervisors to use risk management methods, and violation of their decisions should be accompanied by heavy enforcement guarantees. Then, in the executive field, first, by measuring the risks of Financing terrorism, applicants for obtaining a license for financial and non-financial activities should adopt an efficient method to prevent criminals and their associates from entering the financial markets; second, a national risk assessment must be conducted to ensure that regulators' information resources are largely adequate. Third, the necessary steps, such as creating a risk profile and drawing up a correctional plan for supervised entities by supervisors in each of the financial areas, must be taken. Fourth, violations of the correctional program must be addressed by disciplinary action by supervisors and the guarantee of administrative and judicial enforcement by the judiciary and related nstitutions. Fifth, guidance documents should be prepared and published in the field of detecting suspicious transactions and operations, as well as anti-terrorist Financing regulations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 231

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Nemati Leila | SEYED MORTEZA HOSSEINI RAHELEH | MAHDAVIPOUR AZAM

Issue Info: 
  • Year: 

    2020
  • Volume: 

    49
  • Issue: 

    2
  • Pages: 

    491-512
Measures: 
  • Citations: 

    0
  • Views: 

    827
  • Downloads: 

    0
Abstract: 

Today, in restoring the order ruptured by terrorist acts, the mission of the legal systems and governments is not summarized to the legislation of punitive laws and the formation of criminal responses after the occurrence of terrorist crimes. In order to control terrorism, a new strategy has been presented in legal literature, and legislative regimes have been equipped with legitimate mechanisms called preemptive strategies before the occurrence of terrorist crimes. Accordingly, with regard to the ineffectiveness of punitive-based strategies after the occurrence of terrorist attacks, the main question of this article is: what are the preemptive measures in confronting terrorism and their nature, components and the basics of justification? In an attempt to give an answer to the question, this article uses a descriptive-documentary research method. Based on the results of this study, preemptive approaches in order to mitigate the threat of terrorism have a preventive, punitive, retributive, restrictive and obligatory nature, and their components include legal status, early intervention in imminent danger, non-entry into criminal proceedings which would be taken against suspects of terrorist crimes. Preemptive measures have justificatory bases such as precaution, risk management, difficulty in prosecuting perpetrators, changes in the concept of liability and reducing damages.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 827

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    12
  • Issue: 

    2
  • Pages: 

    187-217
Measures: 
  • Citations: 

    0
  • Views: 

    18
  • Downloads: 

    0
Abstract: 

way that fighting it for the current generation and the international system; It has become a "natural" thing that should always be dealt with at any level and direction, this thinking has of course been popularized by the intellectual and political circles of "America" ​​and has been instilled as an undeniable "truth" to everyone. U.S.A has taken advantage of all its theoretical and practical possibilities, including discoursive, conceptual, economic, media, military… mechanisms.to convince the world that it has the upper hand in the fight against terrorism and that it is even possible to fight the basic principles of international law in the fight against this phenomenon. Therefore, by resorting to the facilities available to him, he has been able to form domination and subjugation and, in Foucault's terms, a disciplinary society. The current research seeks to analyze this domination and control with regard to the historicity of the events with Foucault's genealogical method. According to the stages of Foucault's genealogy, the present article comes to the conclusion that the "fight against terrorism" as claimed by the United States, was not so benevolent and did not aim at peace, but it is still possible to trace the interests of the United States and its hegemony in this policy. Found. Discontinuities and analysis of the origin and strength of the American foreign policy in the study of the fight against terrorism show that the United States has created the terrorist as "otherness" to build its new nature.  

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 18

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2024
  • Volume: 

    364
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    14
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 14

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2024
  • Volume: 

    2
  • Issue: 

    3
  • Pages: 

    37-45
Measures: 
  • Citations: 

    0
  • Views: 

    0
  • Downloads: 

    0
Abstract: 

This study aims to explore how legal professionals construct, justify, and critique counterterrorism policies in relation to individual rights and institutional legitimacy within a securitized legal context. The research employed a qualitative methodology grounded in a phenomenological approach to examine the lived experiences and interpretive narratives of legal practitioners, policy experts, and rights advocates based in Tehran. Sixteen participants were selected through purposive sampling to ensure relevance to the subject of counterterrorism legislation and rights discourse. Data were collected via semi-structured interviews, each lasting between 45 and 70 minutes, and continued until theoretical saturation was reached. Interviews were transcribed verbatim and analyzed using thematic analysis with the aid of NVivo software. An inductive coding process was followed by axial coding to identify patterns and interrelations among themes. Three primary themes emerged from the analysis: (1) legal justifications of security measures, including rule-of-law framing, preventive logic, and judicial endorsement; (2) rights and liberties under pressure, characterized by disproportionate targeting, suppression of dissent, and fear-based public consent; and (3) ethical and institutional dilemmas, such as professional role strain, institutional accountability gaps, and the erosion of democratic norms. Participants described how ambiguous legal terms and selective use of international norms facilitate the normalization of exceptional measures and the marginalization of human rights discourse. Legal narratives in counterterrorism policy are not merely descriptive but deeply constitutive of the security-rights equilibrium. In fragile or securitized contexts, law can function as both a facilitator of repression and a potential site of resistance. Understanding these narratives is crucial for designing legal reforms, enhancing institutional accountability, and protecting fundamental rights.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Geopolitics Quarterly

Issue Info: 
  • Year: 

    2023
  • Volume: 

    19
  • Issue: 

    4
  • Pages: 

    246-267
Measures: 
  • Citations: 

    0
  • Views: 

    10
  • Downloads: 

    0
Abstract: 

In the last half-century, Iran has emerged as a regional power in the Middle East. One of the indicators of a country's regional power is regional custodianship that includes fighting intra-regional threats, such as terrorism. The aim of the current paper is to study Iranian Foreign Policy approach on fighting terrorism. Confronting terrorist groups in the Middle East has been one of the major aspects of Iran's foreign policy under two different political regimes. The Iranian government's struggle with the Dhofar Liberation Front (DLF) in Oman during the Pahlavi era and the fight against the Taliban terrorist group in Afghanistan and ISIS in Iraq and Syria can be seen as examples of this inter-regional struggle after Islamic revolution. Using David Rapoport (2004) and Robert Stewart's theory (2012), the paper seeks to investigate Iran’s foreign policy stance on fighting terrorism in West Asia. The main question of this article is How have the waves of international terrorism, effected Iran's regional foreign policy in the Middle East over the past half century? The findings show that Iran's foreign policy has been countered by the waves of international terrorism and has protected the security of the Middle East against terrorist groups and shows how a strong Iran has always reduced the cost of major powers in the fight against terrorism.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 10

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    6
  • Issue: 

    18
  • Pages: 

    249-286
Measures: 
  • Citations: 

    1
  • Views: 

    842
  • Downloads: 

    0
Abstract: 

Over the past year in restive Yemen, in Abyan and Shabwa provincial regions, it was declared that fighters of Al-Qaeda, who were related to Saudi Arabia, were hiding and accumulating their power which resulted in shaping new groups such as Ansar al-Sharia. In this regard, the above-mentioned group, before being destroyed by Yemeni military in summer 2012, was attacked by unmanned drones, in line with Obama‘s counterterrorism strategy. The present study discusses whether the use of unmanned drones can help promote regional stability and security or it only serves as a new way to expand and extend extremism? We argue that the drone strikes in so called counterterrorism operations in tribal Pakistani areas and expanding these operations to Yemen has helped extremism and rise of bloody conflicts in the region and Al-Qaeda and Taliban have used this opportunity for more destabilizing the region. This indicates that Obama's counterterrorism and military strategy does not work.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 842

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Water and Wastewater

Issue Info: 
  • Year: 

    2024
  • Volume: 

    35
  • Issue: 

    5
  • Pages: 

    24-38
Measures: 
  • Citations: 

    0
  • Views: 

    0
  • Downloads: 

    0
Abstract: 

Tetracycline is a common commercial antibiotic that is used in large quantities against bacteria and a wide range of microorganisms. The presence of TC in pharmaceutical industries and hospital wastewater can cause an unpleasant odor, skin disorders, and microbial resistance in pathogenic agents, and can lead to the death of effective microorganisms responsible for purifying wastewater. Therefore, its removal before entering into the environment is of great importance. Given the importance of the issue, this study evaluates the efficiency of TC removal from aqueous environments using a photocatalyst with an organic-covalent structure under visible light. In this study, a photocatalyst with an organic-covalent structure ((CTF)-P) was synthesized by reflux method and its efficiency was investigated. To identify the synthetic photocatalyst characterization, transmission electron microscopy, scanning electron microscopy, X-ray diffraction, elemental mapping analysis (EDX-Mapping), Fourier transform infrared spectroscopy, nitrogen adsorption-desorption analysis (BET) and diffuse reflectance spectroscopy were employed. Moreover, the effects of pH variables (4-9), photocatalyst concentration (10-40 mg) and contact time ((-30)-180 min) on the removal process were evaluated. Based on the results obtained, maximum removal efficiency was achieved at a 90 min contact time, 30 mg of photocatalyst content, and pH=7. The study of scavengers showed that the oxidants (i. e., e- and ) play an important role in the degradation process of TC from wastewater. As shown, (CTF)-P photocatalyst with organic-covalent structure could be used as an effective material for the removal of TC from industrial wastewater under visible light.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    6
  • Issue: 

    24
  • Pages: 

    79-99
Measures: 
  • Citations: 

    1
  • Views: 

    567
  • Downloads: 

    0
Abstract: 

The use of targeted killings is increased by the United States with the beginning of the presidency of Barack Obama and became a key component of the country's anti-terrorism policies. Increasing non-state actors and activities of transnational networks as the main threat to the national security of the United States has led to tactical change in America's anti-terrorism policies from broad military attacks to limited and targeted attacks. Although technological advances such as guided weapons and advanced monitoring systems have increased the ability of America to target specific individuals while reduced unwanted losses were effective in this regard. Despite the wide political and military achievements of targeted killings, several legal objections have been raised against America because these achievements caused the United States to ignore international law. Political realism approach with emphasis on national security and national interests provides an appropriate account of America's anti-terrorism politics. This article examines the legal and political implications of the United States targeted killings in the field of international relations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 567

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    7
  • Issue: 

    4
  • Pages: 

    517-524
Measures: 
  • Citations: 

    0
  • Views: 

    491
  • Downloads: 

    149
Abstract: 

Countries need short, medium, and long-term investmentplans for production growth and development. Differentsources for these investments can be supplied through retainedprofit, stock issuance, and bank loans, or a combination them. Institutions and firms need huge amount of capitals for theirsurvival, production, and also development of activities. In addition, these institutions and firms rely heavily on financialmarkets for self-Financing. The role of financial markets is toprovide the required capitals for institutions and firms. Financingstrategy is considered as one of the main areas of financialmanagement decisions in companies seeking to increase shareholders’ wealth. Therefore, the aim of this paper was to discussconventional methods of external Financing through debt andstock issuance and explain their associated advantages anddisadvantages.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 491

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 149 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button