Naif University Press https://nup.nauss.edu.sa/index.php/sr <p style="direction: ltr;"><span style="font-size: 0.875rem;">Naif University Publishing House (NUPH) is the administration responsible for publishing and distributing NAUSS’s scientific publications. It publishes and distributes the books, translated books, and Security Policy Papers (SPP) of the Security Research Center (SRC) by adhering to the policies and procedures of the scientific research. In addition, the peer-reviewed journals are published by NUPH in accordance with the standard publishing rules applied by the Scientific Periodicals Administration. NUPH adopts the best global practices for publishing and distributing the scientific publications. It contributes to the security knowledge enhancement and supports the security decision making.</span></p> <p style="direction: ltr;"><strong>Areas of Publishing</strong></p> <p style="direction: ltr;">NUPH focuses on publishing scientific publications in various security disciplines and relevant topics in accordance with NAUSS’s vision, mission, and research priorities. Its publications offer a modern content that keeps pace with the recent developments covering the comprehensive concept of security.</p> <p style="direction: ltr;">The most important areas of publishing include:</p> <ul> <li style="direction: ltr;">Criminal Justice.</li> <li style="direction: ltr;">National Security.</li> <li style="direction: ltr;">Criminology.</li> <li style="direction: ltr;">Forensic Sciences.</li> <li style="direction: ltr;">Cybersecurity.</li> </ul> ar-SA <p>In the event that a book is accepted for publication, Author (s) attest to agree to abide by the terms of the <u><a href="http://nup.nauss.edu.sa/index.php/sr/Copyright" data-cke-saved-href="http://nup.nauss.edu.sa/index.php/sr/Copyright">copyright statement</a></u>.</p> nup@nauss.edu.sa (دار جامعة نايف للنشر) nupsupport@nauss.edu.sa (فريق الدعم الفني ) OMP 3.3.0.5 http://blogs.law.harvard.edu/tech/rss 60 Autonomous Vehicles and Road Traffic Safety https://nup.nauss.edu.sa/index.php/sr/catalog/book/274 <p>With recent advancements in the transportation industry—particularly the rise of autonomous vehicles, which operate without direct human control—these technologies are expected to offer substantial advantages. Among these are reductions in travel time, traffic congestion, and accidents; improved mobility and increased travel frequency; enhanced traffic flow efficiency; better fuel economy; decreased demand for parking; significant economic gains; and numerous other benefits.</p> <p>Accordingly, this study seeks to examine the current state of autonomous vehicle usage, identify the challenges these technologies encounter, and analyze their relationship to road traffic safety standards. It also reviews the regulatory frameworks and traffic laws governing the operation of autonomous vehicles.</p> <p>The study concludes with a set of short-, medium-, and long-term recommendations aimed at guiding policymakers—particularly legislative bodies involved in shaping and updating transportation policies. These recommendations emphasize the need for coordination among relevant stakeholders, proposing the formation of multidisciplinary working groups comprising traffic authorities, road administrators, and engineering design departments. These groups would be responsible for conducting the necessary research and testing to support the integration and regulation of autonomous vehicles within existing traffic systems.</p> Ali Alrashidi, Othman Ahmed Eltaher, Sherif Shokry Abdrabo, Wael Mohammed Eldessouki (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/274 Wed, 30 Jul 2025 00:00:00 +0300 Combating the Digital Marketing of Drugs and Psychotropic Substances: A Comprehensive Perspective https://nup.nauss.edu.sa/index.php/sr/catalog/book/275 <p>The international community is grappling with increasing challenges in combating and preventing drug abuse, compounded by the rapid advancements of the internet age. This study examines the electronic promotion of narcotics and psychotropic substances by analyzing the evolving tactics used in illicit drug trafficking in cyberspace, with a particular focus on the Arab context. It explores how social networks and online platforms are exploited to propagate drug culture, expand illegal markets, and target younger audiences through attractive and deceptive digital strategies.</p> <p>The study also addresses the technical and legislative challenges faced by relevant authorities in monitoring and preventing these activities, especially given the transnational nature of the internet and the various encryption and concealment techniques employed by promoters. Drawing from these insights, the study proposes a series of executive measures to strengthen countermeasures, including the development of national legislation, enhanced international cooperation, the use of artificial intelligence tools for monitoring, and increased public awareness about the dangers of online drug promotion. It also discusses several potential obstacles that could hinder the effectiveness of these measures, such as limited technical and human resources and insufficient coordination among relevant authorities.</p> <p>This study serves as a vital resource for researchers, policymakers, and professionals in cybersecurity and mental health, offering both qualitative analysis and practical recommendations for tackling one of the most pressing digital challenges related to community security and public health in the modern era.</p> Amr Osman , Abdelsalam Sharaf , Kyounggon Kim, Wadih Maalouf (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/275 Wed, 30 Jul 2025 00:00:00 +0300 Approaches to Combating Transnational Terrorist Crimes https://nup.nauss.edu.sa/index.php/sr/catalog/book/287 <p>Transnational terrorism increasingly threatens international peace and security, with terrorist activities evolving in terms of scope, complexity, and impact. This study aims to analyze and propose solutions to the challenges of securing borders in the fight against transnational terrorist crimes. It offers practical strategies and preventive approaches, including strengthening regional and international cooperation, leveraging advanced technologies for border surveillance, and developing robust intelligence-sharing systems. These measures are designed to enhance states' resilience against evolving threats over the long term. This study serves as a crucial resource for policymakers and researchers in national security, border security, and counter-terrorism fields.</p> Ibtihal Masoud AlTalhi, Hisham Alghanam, Eman Ragab (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/287 Wed, 30 Jul 2025 00:00:00 +0300 The Impact of Climate Change on Migration and Displacement and the Role of Border Governance in the Arab Region https://nup.nauss.edu.sa/index.php/sr/catalog/book/277 <p>This study examines the role of border security authorities in managing human mobility driven by climate change in the Arab region. It provides insights into best practices and innovative strategies that border governance entities can adopt to effectively navigate these challenges. The study also explores the policies and programs implemented by Arab states to address climate change, whether through mitigation or adaptation measures. Additionally, it assesses the institutional and legal frameworks governing climate change in the region, alongside global and regional best practices and novel approaches for handling climate-induced migration at borders.</p> <p>The study seeks to establish a framework for integrating climate change considerations into border governance, underscoring the importance of effective policies, regional collaboration, and capacity-building. Moreover, it aims to enhance understanding of the impact of climate change on migration, assisting governments and stakeholders in fulfilling their commitments to the Sustainable Development Goals and the Global Compact for Migration.</p> <p>Finally, the study presents a set of practical recommendations for policymakers and border security agencies to strengthen preparedness and response mechanisms for migration induced by climate change.</p> Erin McFee, Safaa Otani (Prepared by) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/277 Wed, 04 Jun 2025 00:00:00 +0300 Restorative Justice In Contemporary Criminal Policy https://nup.nauss.edu.sa/index.php/sr/catalog/book/280 <p>A crime gives rise to a legal relationship between the public prosecution, representing society, and the perpetrator of the criminal act. This relationship is embodied in affirming the state's right to punish, exercised through initiating criminal proceedings. The public prosecution holds the exclusive right to file a lawsuit and may not waive it except in specific cases defined by law. However, many legal systems—aligning with the desire to reduce punishment, curb legislative inflation, and address the occasional failure of short-term imprisonment in achieving reformative goals—have introduced modern alternatives to criminal prosecution. These include criminal mediation, criminal reconciliation, and criminal settlement. Thus, restorative justice represents a fundamental shift in managing criminal disputes, transitioning from punitive measures to consensual resolutions. </p> Mohamed Ahmed El-menshawy , Ali Wardak (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/280 Mon, 19 May 2025 00:00:00 +0300 Disaster Management Policies and Practices https://nup.nauss.edu.sa/index.php/sr/catalog/book/233 <p>In this book David E. McNabb and Carl R. Swenson blend their different experiences to outline the nature of the crises government leaders now face. Together they provide a foundation of knowledge from which current and future elected leaders, policy makers, and public managers can develop the knowledge and skills necessary to confront these challenges.</p> <p>Merging the historic, academic, and practical aspects of emergency planning and disaster response, the book fills in the missing pieces for creating a guide to understanding the nature and breadth of the work ahead. The authors focus on the principles, framework, and structure of emergency preparedness planning and disaster response and recovery. In doing so, they draw on an extensive literature review, combined with relevant practical examples and insights to create a detailed picture of how to prepare for and respond to the increasing array of emergency crisis and disaster management.</p> <p>Disaster Management Policies and Practices provides a solid foundation in emergency preparedness and disaster response for practitioners, public managers, and those who aspire to such positions. It is designed for use as a resource for scholarly research in the theory and practice of emergency response, public administration, public policy, and governance.</p> David McNabb, Carl Swinson (Author); Ahmad Elezabi (Translator); Osman Alyahyawy (Reviser) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/233 Sun, 11 May 2025 00:00:00 +0300 The Role of Criminal Law in Protecting Environmental Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/279 <p>In a world where environmental challenges are on the rise, the book offers an in-depth perspective on the vital role played by criminal law in protecting the environment and preserving its balance. It reviews the preventive and deterrent approaches adopted by legislation to combat the overexploitation of natural resources, address environmentally harmful activities, and reduce environmental crimes, thereby reinforcing the concept of environmental security as an integral part of public security.<br />Through a rigorous scientific approach, the book sheds light on the close relationship between environmental protection and human rights, affirming that the enjoyment of a sound environment is the cornerstone for the sustainability of life for both current and future generations. The book opens new horizons for researchers, specialists, and policymakers, as well as anyone seeking to understand the legal dimensions of environmental protection and the legislative mechanisms for confronting environmental challenges, ultimately aiming for a safe and sustainable environment.</p> Mohamed Ahmed El-menshawy , Ali Mostafa ALamin Gabr (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/279 Sun, 11 May 2025 00:00:00 +0300 Sports Hooliganism in Social Media Platforms https://nup.nauss.edu.sa/index.php/sr/catalog/book/268 <p>This study focuses on the relationship between sports fandom and the pervasive influence of social media in the Arab world, a region where sport plays a central role in cultural identity and social cohesion. Football has become a significant aspect of Arab identity, with millions of fans passionately supporting both local and international teams. The rise of digital media has enabled Arab fans to follow their favorite teams and athletes with unprecedented ease – individually and in communities, fostering a sense of connection that transcends borders.</p> <p> </p> <p>Football hooliganism in the Arab world is often tied to broader social and cultural contexts, making it necessary to adapt responses to the local environment. The study indicates that education is critical in addressing riots and hooliganism. Accordingly, comprehensive educational programs targeting young people, alongside public awareness campaigns, can mitigate the impact of online radicalization and instill values of respect and sportsmanship.</p> <p> </p> <p>The study highlights that regional cooperation is a critical requirement for encountering sports hooliganism. There is a clear need for coordinated efforts to share best practices, align legal definitions, and promote collaborative approaches to combat manifestations of football-related violence</p> Joel Rookwood, Security Research Center Team, Tiernan Harris (Prepared by) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/268 Wed, 19 Mar 2025 00:00:00 +0300 The Impact of Modern Technologies on Transnational Organized Crime Networks https://nup.nauss.edu.sa/index.php/sr/catalog/book/276 <p>While modern technological advancements play an increasingly important role in cross-border organized crime, they are not the sole determinant of criminal network operations. Various non-technological factors significantly shape how these networks leverage technology, influencing the scale of their cross-border activities and expansion. Similarly, these factors also affect law enforcement agencies’ ability to disrupt and weaken such criminal organizations.</p> <p> </p> <p>This study provides an objective assessment of the effectiveness of law enforcement agencies in Arab countries in combating cross-border organized crime. It carefully evaluates the role of modern technologies within criminal networks without overstating or understating their impact. Through a comparative technical approach, the study examines global and regional practices to analyze how digital innovations enhance criminal capabilities and necessitate evolving law enforcement strategies.</p> <p> </p> <p>Additionally, the study presents recommendations for Arab law enforcement agencies to strengthen their ability to counteract criminal networks. These recommendations focus not only on mitigating technological threats but also on addressing non-technological factors that contribute to the persistence and resilience of these organizations.</p> Mohamed Elguindy, Patrick Laberche, Alyaksandr Malyshau, Maryem Ammi‭ ‬‬‬‬‬‬‬‬‬‬‬ (Author); Eman Ragab (Editor) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/276 Wed, 19 Mar 2025 00:00:00 +0300 The Guidance Manual for Security of Critical Facilities https://nup.nauss.edu.sa/index.php/sr/catalog/book/271 <p>This guideline manual offers a comprehensive framework for safeguarding critical facilities. It consists of seven chapters that address key aspects such as security risk assessment, crisis management, and the protection of both physical and digital infrastructures.</p> <p>The manual is designed to strengthen facility security by establishing thorough policies and procedures that proactively identify and mitigate security threats and vulnerabilities. It emphasizes risk management strategies, probability analysis, and impact assessment. Additionally, it promotes security awareness among employees, ensuring alignment with the highest safety and security standards while incorporating sustainability and adaptive measures to counter evolving security challenges.</p> <p>Furthermore, the manual underscores the importance of developing human capital through ongoing training and certification of security personnel. It highlights the necessity of collaboration between facilities and national security agencies to enhance overall security effectiveness. Technical and engineering security measures, including the implementation of advanced surveillance and detection technologies, are also discussed. The recommendations focus on improving emergency response strategies and developing tailored security plans based on facility-specific risk and threat assessments.</p> Sameh Mohamed Elsayed, Ahmed Farouk Ibrahim, Paul Ligrang (Prepared by) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/271 Thu, 13 Mar 2025 00:00:00 +0300 Contemporary Methods and Trends in Cybercrime and Prevention https://nup.nauss.edu.sa/index.php/sr/catalog/book/278 <p>With the increasing importance of studying cybercrime in terms of the rapid technological advancements witnessed globally, this study aims to empower decision-makers in security agencies to adopt effective methodologies for preventing cybercrime. This contributes to enhancing the quality of life and reducing the economic and social damages resulting from such crimes.</p> <p> </p> <p>The study focuses on analyzing the exploitation of modern technologies (such as artificial intelligence, the metaverse, and blockchain technology) in cybercrimes and their impact on exacerbating security threats. It also provides a detailed analysis of ransomware crimes, which are among the most widespread cybercrimes in Arab countries. In addition, the tactics used by cybercriminal groups and the most prominent gangs targeting the region are also highlighted and identified.</p> <p> </p> <p>The study offers several recommendations. It emphasizes that a comprehensive national strategy, focusing on enhancing awareness among individuals and institutions and upgrading security infrastructure, should be developed for cybercrime prevention. It also recommends the establishment of an independent national authority to coordinate efforts among relevant entities and strengthen international cooperation for cybercrime prevention. Moreover, the study calls for reinforcing regional and international collaboration by sharing information and exchanging expertise on cybercrimes.</p> Abdulrazaq Al-Morjan, Raha Mosleh Helal Almarashi, Taqwa Alhaj, Ibrahim Alzahrani, Mostafa Moallim (Author) Copyright (c) 2025 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/278 Thu, 13 Mar 2025 00:00:00 +0300 Human Trafficking in the Era of Modern Technology https://nup.nauss.edu.sa/index.php/sr/catalog/book/289 <p>The wide-scale use of Information and Communication Technology (ICT) has led to its misuse for various criminal purposes, notably human trafficking. Human trafficking crime exploits cyberspace as a tool to achieve criminal purposes. This illegal activity includes sexual exploitation of women and children and extends to forced labor and child labor, posing challenges to legislators, law enforcement agencies, and human rights organisations. This book demonstrates how technology is misused in committing human trafficking crimes and provides an analysis to evaluate the effectiveness of the current legislative and regulatory framework in fighting it. It also presents case studies on some Arab and Western legislations. In its conclusive section, the book discusses the procedures taken by regional and international organisations in this regard, along with some recommendations to reduce this crime.</p> Mohamed Mahmoud Chawki (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/289 Tue, 12 Nov 2024 00:00:00 +0300 International and Transnational Crime and Justice https://nup.nauss.edu.sa/index.php/sr/catalog/book/203 <p>Studies in crime and criminal justice attract scholars and researchers from a diverse range of disciplines due to their interdisciplinary nature; they rely on numerous other fields to develop theories about crime, delinquency, and the criminal justice process. These fields include economics, law, human geography, sociology, psychology, correctional studies, public administration, policing sciences, and social work. This book presents the nature of international and transnational crimes, the theoretical foundations for understanding the relationship between social change and the reduction of crime opportunities, globalization, migration, cultural conflicts, and emerging legal frameworks for their prevention and control. It provides readers with a broad introduction to the key international issues in international and transnational crime and methods and techniques for their prevention, covering all the basic theories in these fields and explaining their relevance to the world today. The book covers a range of diverse topics, including, but not limited to: illegal trafficking in its various forms, crime networks, child-related crimes, organized crime and terrorism, environmental crime, cybercrime, currency crimes and money laundering, corruption crimes, violent and genocidal crimes, and models of policing, investigation, and imprisonment, as well as philosophy of punishment. It also includes many case studies and examples from around the world, as well as an overview of the challenges of achieving justice and international cooperation efforts to reduce, detect, and address international and transnational crimes. The book combines theoretical knowledge with practical experience, providing a timely analysis of a complex topic related to international crime and justice. It is considered one of the most valuable studies that benefit students, scholars, scientists, policymakers, and justice advocates seeking to achieve justice for millions of victims internationally and across borders.</p> Mangai Natarajan (Editor); Mahmoud Shalaby (Translator); Mohamed Shawky (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/203 Tue, 22 Oct 2024 00:00:00 +0300 Punishment https://nup.nauss.edu.sa/index.php/sr/catalog/book/235 <p><strong>The pursuit of a safe society has been one of the primary goals of punishment policies throughout history. This book offers a scientific narrative on the concepts and theories of punishment, exploring the social and psychological impacts of its implementation, not just from a legal perspective but also from the viewpoints of the community and the punished individual themselves. What sets this narrative apart is its simplicity and the seamless integration of theories with real-life examples and models from renowned dramatic and cinematic works, bringing these theories to life and helping readers understand the dimensions of punishment in modern societies. The author has presented this material in a smooth and simple style, and the translator has ensured that the Arabic translation maintains the same level of readability and accessibility.</strong></p> Rob Canton (Author); Hadeer Abu Al-Najat (Translator); Abdullah Abu Zaid (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/235 Sun, 20 Oct 2024 00:00:00 +0300 The Emerald Handbook of Crime, Justice and Sustainable Development https://nup.nauss.edu.sa/index.php/sr/catalog/book/205 <p>It is a highly complex and intertwined world where realms of politics, economy, society, and natural sciences overlap, interests vary, human life becomes complicated, and social, cultural, and natural environments collapse. Amidst this ever-changing world, there are vigorous efforts by active entities and institutions in societies to find an effective and balanced formula to preserve the natural environment, human rights, and scientific development. From this arises the global call for achieving sustainable development, aimed at preserving the earth, eradicating poverty, and improving livelihoods. The United Nations has set seventeen goals for this call, which the countries of the world strive to achieve by 2030.</p> <p> </p> <p>The " Emerald Handbook of Crime, Justice and Sustainable Development " comes as an important academic contribution and a critical analysis that examines the problems and compromises included in the formulation of these goals. It takes a close look at how well these goals match reality, their effectiveness, and their ability to achieve the desired progress. This book focuses on sustainable development goals related to criminology and raises important questions about the relationship between crime, justice, and sustainable development. The concept of crime in this context extends beyond physical violence to include crimes related to the depletion of natural resources, climate change, human and drug trafficking, extremism, terrorism, and illicit financial flows, among others.</p> <p> </p> <p>Through practical examples from different countries, the book confirms that globalization and its bias towards the northern countries at the expense of the southern countries have not achieved prosperity or eradicated poverty in the world. The book argues that the solution can only be achieved through the concerted efforts of the international community to promote the rule of law, achieve environmental justice, empower developing countries, and combat poverty and inequality. The research contributions in this book emphasize the need for tolerance, mutual understanding, inclusivity, and responsiveness, values that lie at the heart of the sustainable development goals.</p> <p> </p> <p>This book brings together the expertise of a diverse group of scholars, researchers, and field activists from different countries around the world with various specializations. This results in a rich discussion and a diversity of approaches and solutions, making it a valuable resource in understanding the future of sustainable development.</p> Jarrett Blaustein, Kate Fitz-Gibbon, Nathan W. Pino, Rob White (Editor); Said Hassan Fares (Translator); Faleh Salem al-Kahtani (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/205 Tue, 27 Aug 2024 00:00:00 +0300 Crime, Deviance and Society https://nup.nauss.edu.sa/index.php/sr/catalog/book/206 <p>The book, "Crime, Deviance, and Society: An Introduction to Sociological Criminology," authored by a team of academics and experts from Australia, New Zealand, and the United Kingdom, stands as an exemplary document. It combines academic depth with practical relevance in its selection of diverse chapter topics and its presentation of scientific content. The book is characterized by precision, clarity, logical sequencing, and methodological simplification, making it well-suited to the educational needs of university students studying crime and deviance issues within a globalized societal context. It sheds light on the interdisciplinary nature of criminology and monitors its interaction with a range of theoretically related subjects, be it direct or indirect. It takes the reader on a temporal journey through a set of theories that criminologists have drawn upon to expand the horizons of this emerging field, rationalize its tools, enhance the credibility of its theoretical outputs, and strengthen its connection to the realities of crime and deviance in society, taking into account contextual, cultural, and legislative circumstances. With clear methodological coherence, the book delves into a wide spectrum of theoretical tributaries that have generated intellectual and cognitive frameworks underpinning criminology, such as biological criminology, critical masculinities, cultural and ecological criminology, normative disintegration, social control policies, labeling, surveillance, governance, and the issue of disproportionate representation of prison sentences according to racial and social classification. It is worth mentioning the abundance of definitions interspersed throughout the text to explain key terms and simplify them for readers. Additionally, the book includes chronological tables of important theoretical contributions, accompanied by thought-provoking questions and end-of-chapter questions designed to stimulate critical thinking. Each chapter also features a set of case studies and links to social control resources that help contextualize the presented theories within the realm of criminal justice and test their scientific validity against empirical realities."</p> Ana Rodas, Melanie Simpson, Paddy Rawlinson, Ronald Kramer, Emma Ryan, Emmeline Taylor, Reece Walters, Alan Beckley, Chris Cunneen, Ashlee Gore, Amanda Porter, Scott Potniting, Emma Russell (Author); Faysal Maalej (Translator); Amira Y. Badri (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/206 Thu, 01 Aug 2024 00:00:00 +0300 Migration Paths and Shifts in the Global Context https://nup.nauss.edu.sa/index.php/sr/catalog/book/283 <p>Migration governance and border management have emerged as pivotal issues on the regional and international agenda, carrying political, economic, social, and security implications that impact most countries confronting this humanitarian challenge. This significance has heightened following major shifts in migration patterns and the increasing number of migrants, coupled with the emergence of intersecting trends, including mixed irregular migration flows and organized criminal networks involved in migrant smuggling and human trafficking.</p> <p>This report addresses the global context of migration, highlighting its key features. It dissects prevailing discourses surrounding migrants, addressing the lack of standardized terminology in addressing migration and its dimensions. The report offers a comprehensive definition of migration, mixed migration, and their respective flows. It examines the diverse factors influencing international migration and presents a holistic overview of the migration landscape worldwide, encompassing its geographical, demographic, and economic characteristics.</p> <p>It is important to note that, to achieve the intended objectives and purposes of this report and to reach a shared understanding and vision regarding global and regional population movements, the report employs the broad concept of migration as defined in the 'Glossary on Migration' published by the International Organization for Migration. It is acknowledged that migration and categories of migrants, such as workers, displaced persons, refugees, asylum seekers, and victims of human trafficking and smuggling, are referred to using varying terminology according to the context of countries in the Arab region.</p> Amira Ahmed, Alaa El-Din Dridi, Karim Helal (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/283 Thu, 25 Jul 2024 00:00:00 +0300 Biometric Technology https://nup.nauss.edu.sa/index.php/sr/catalog/book/281 <p>Countries encounter a range of security challenges that extend beyond national borders, such as organized crime, drug trafficking, and terrorist threats. To address these challenges, security agencies depend on advanced technologies like biometrics, which are crucial elements of the security infrastructure. Biometrics encompass fingerprints, facial features, and iris scans. This technology is noted for its high accuracy and resistance to forgery, making it effective for identity verification, streamlining security processes, and improving operational efficiency, thereby enhancing national security at all levels.</p> <p> </p> <p>Moreover, biometrics are vital in enhancing international security cooperation by facilitating the rapid and efficient exchange of security information between countries, reducing the likelihood of errors, and aiding in the fight against cross-border crime and the prevention of terrorist infiltration.</p> <p> </p> <p>Biometrics are employed in several key sectors, including government services, intelligence and criminal investigations, law enforcement agencies, border control, and military applications. In government services, biometrics provide a reliable identity management system, facilitate registration for public services, and secure banking transactions. The technology is also used in criminal investigations to link individuals to forensic evidence and accurately identify perpetrators. In border control and military applications, biometrics enhance border security, prevent infiltration, and detect forged identities. Additionally, in military applications and access control, biometrics are essential for ensuring security in sensitive areas and facilities, guaranteeing access to authorized personnel, and securing confidential information and weapons.</p> <p> </p> <p style="direction: ltr;">Due to the varying economic and developmental levels and infrastructure advancements in the Arab region, the application of biometrics for national security has been implemented to different extents. This variation presents numerous challenges that may threaten the sustainable and effective use of biometric technology. This report aims to address these challenges by examining international standards, best practices, and case studies of prominent global experiences in this field.</p> Fahad Alharby, Maryam Ammi, Adel El-Adawy, Margherita Natali (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/281 Mon, 01 Jul 2024 00:00:00 +0300 Using Artificial Intelligence Applications and Technologies to Reduce Road Congestion Rates in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/284 <p style="direction: ltr;">With the emergence of Artificial Intelligence (AI) and the growing expectations of the role its emerging technologies can play in effectively tackling transportation system challenges, the integration of AI technologies into urban transportation systems has garnered increased attention. This is due to their capabilities to process and analyze vast amounts of data in real-time and the anticipated potential of AI as a promising means to tackle traffic congestion and improve vehicle routing in urban areas. By harnessing the power of AI, it becomes possible to develop smart systems that dynamically adapt to traffic conditions, thereby enhancing transportation efficiency, reducing congestion-related issues, and promoting sustainable urban development.</p> <p style="direction: ltr;">Accordingly, as part of the efforts of Naif Arab University for Security Sciences, this report aims to explore the potential of employing AI techniques to reduce congestion rates on roads in Arab cities. The report delves into the intersections between AI and urban transportation, with a particular focus on improving vehicle routing and alleviating traffic congestion in the Arab region. The primary objective is to uncover the most important AI techniques and algorithms related to the field of transportation and the opportunities for their application and utilization in designing transportation policies for the Arab region that reduce congestion rates, shorten travel times, and contribute to road safety. This report is based on a systematic review of published research literature on papers related to the problem of traffic congestion and AI techniques used in measures to reduce it.</p> Ali bin Dbayan Al-Rashidi, Othman Ahmed Al-Taher, Sherif Shukri Abed Rabbo, Osama A. Osman (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/284 Mon, 01 Jul 2024 00:00:00 +0300 Glossary of Key Terms in Cybercrimes and Digital Forensics https://nup.nauss.edu.sa/index.php/sr/catalog/book/288 <p>Towards strengthening joint Arab security work, Naif Arab University for Security Sciences has published a specialized dictionary of cybercrime and digital forensics. This dictionary aims to serve as a comprehensive reference for public prosecutors, relevant courts, law enforcement agencies, researchers, academics, and security media professionals across Arab countries.</p> <p>The importance of this dictionary stems from the rapid technological progress and digital transformation within Arab societies, coupled with the extensive use of electronic devices in everyday life. These advancements have introduced new criminal patterns and methods. Modern technologies now facilitate traditional crimes and enable cybercrime, which has evolved into cross-border crimes. Consequently, these devices produce digital evidence, necessitating swift exchange of this evidence among Arab countries to uphold justice and safeguard cybersecurity against criminals, terrorists, and lawbreakers.</p> <p>One of the challenges facing security agencies and decision-makers in Arab countries is the lack of precise scientific definitions in the Arabic content of terms in the fields of cybercrime and digital forensics. This is due to the scarcity of specialized Arabic sources and the lack of approved translation among Arab experts and specialists in these fields, especially as we face imminent technological advancements in the coming years.</p> <p>This initiative marks the initial step toward creating a sustainable English-Arabic dictionary tailored to enrich Arabic content in combating cybercrime and managing digital forensics. The dictionary contains over 700 terms related to various types of cybercrime, digital evidence, their sources, and associated cyberspace technologies.</p> <p>The dictionary’s distinction lies in its thorough review by regional and international experts from academic institutions, law enforcement agencies, and specialized international security organizations. The Arabic terms were reviewed by Arab experts and practitioners in the fields of cybercrime and digital forensics. As the University is a founding member of the INTERPOL Global Academy, the dictionary’s English terms were reviewed by academy members, INTERPOL’s cybercrime experts, and specialized academics from Korea University.</p> <p>This dictionary is expected to benefit law enforcement and investigative agencies, judges, lawyers, specialized media professionals, academics, researchers, and university students from 22 Arab countries.</p> <p>To ensure sustainability and continuity, this initiative will remain ongoing and accessible to all interested parties through a crowdsourcing strategy, given the fast-evolving nature of these crimes and the necessity to enhance Arabic content in the fields of cybercrime and digital forensics. In the next phase, the Center of Cybercrimes and Digital Forensics will create an electronic platform that will enable experts, practitioners, specialists, and researchers from all Arab countries to participate and contribute.</p> Abdulrazaq Almorjan, Seokhee Lee, Ibrahim Al-Zahrani, Sumaya Alshokeeran (Prepared by) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/288 Mon, 01 Jul 2024 00:00:00 +0300 The Guidance Manual for Handling Digital Forensic Evidence in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/282 <p>Amid the rapid evolution of information and communication technology and the widespread use of electronic devices, law enforcement agencies face a significant and accelerating challenge in dealing with digital forensics. These digital forensics, stored or transmitted through electronic devices, play a crucial role in various crimes, ranging from traditional offenses such as murder to cybercrimes like hacking. The challenge lies in obtaining digital forensics that are admissible in court to prove these crimes. Digital forensics may be one of the sources of proof for a crime or the sole source of evidence for certain offenses, such as hacking or deepfake audio manipulation. The handling of digital forensics becomes more complex due to its presence in both traditional and digital crime scenes - electronic devices serving as digital containers.</p> <p>The issue of dealing with digital forensics from a legal, procedural, and technical perspective in both traditional and digital crime scenes is a global challenge. Therefore, international regulations and agreements, such as the Budapest Convention on Cybercrime (2001), the UNODC's Digital Forensics Best Practices, ISO guidelines, and the recently issued Saudi Evidence Law (2022), have been consulted. On the technical side, guidelines such as Interpol's First Responder Guide for Digital Forensics and ISO/IEC 27037 for identifying, collecting, acquiring, and preserving digital forensics have been referenced.</p> <p>A guiding manual for Arab states has been developed to address digital forensics based on international best practices related to securing and collecting digital forensics at crime scenes. The manual is divided into two main parts: one addressing legal and procedural matters and the other focusing on technical and technological aspects. This manual provides guidance to specialists and practitioners on evidentiary, legal, and technical matters to obtain reliable digital forensics for court proceedings. It also includes illustrative models for device seizure and a suggested mechanism for coding or naming digital forensics.</p> <p>This guiding manual aims to contribute to the integration of security and judicial entities, serving the interests of joint Arab action. It strives to provide an Arab model that caters to the current advancements in criminal investigation and enhances the efficiency of experts' work. By developing the manual's outputs into detailed guides and conducting training sessions for experts that contribute to raising the readiness of relevant authorities in handling digital forensics. In the future, there is potential to further develop this guiding manual to unify procedures among security and judicial agencies in Arab countries, ultimately facilitating the exchange of digital forensics between Arab countries.</p> Abdulrazaq Almorjan, Mohamed M. Shawky, Yousif Al-Sabaawi, Mohammed Minshawy (Prepared by); Seokhee Lee, Jalal Alhashil (Reviser) Copyright (c) 2024 Naif University Press https://creativecommons.org/licenses/by-nc/4.0/ https://nup.nauss.edu.sa/index.php/sr/catalog/book/282 Wed, 26 Jun 2024 00:00:00 +0300 Forensic Science https://nup.nauss.edu.sa/index.php/sr/catalog/book/208 <p>This book “Forensic Science: An Introduction to Scientific and Investigative Techniques” offers a comprehensive introduction to the field of forensic science, which has evolved to become highly interdisciplinary in modern times, intersecting with a diverse range of disciplines. These include medicine, biology, chemistry, anthropology, engineering, computer science, psychology, and behavioral sciences. The book effectively showcases how these fields and others contribute to criminal investigations, shedding light on their collective role in uncovering, analyzing, and interpreting evidence using objective scientific methods. Beginning with a chapter dedicated to justice and science, the book explores their areas of overlap and divergence while dismissing pseudo-sciences that lack verifiable evidence or make false claims. This introductory chapter is followed by a comprehensive discussion of different types of evidence, their sources, and their admissibility in legal proceedings. The subsequent nineteen chapters delve into critical aspects of criminal investigations, covering death investigations, fire and explosion analysis, and document forgery, among other topics. These chapters emphasize how criminal investigations leverage cutting-edge advancements from various modern sciences. One of the distinctive features of this book is its successful integration of theoretical concepts with practical, real-world applications. It achieves this by incorporating numerous case studies and real-life examples that enhance the reader's understanding. The book is further enriched by the inclusion of illustrative figures, tables, and thought-provoking questions that encourage active engagement from readers. Each chapter also contains a glossary of relevant terms, and a separate comprehensive glossary at the end provides easy access to definitions, enhancing the book's overall value and ensuring a deeper understanding for its readers.</p> Suzanne Bell (Author); Ahmed Seddik Al-Wahy (Translator); Abdulaziz ALDukhyil (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/208 Wed, 05 Jun 2024 00:00:00 +0300 Fundamentals of Criminological and Criminal Justice Inquiry https://nup.nauss.edu.sa/index.php/sr/catalog/book/207 <p style="direction: ltr;">How to think about, conduct, and evaluate research is fundamental to the study and understanding of criminology and criminal justice. Students take methods, statistics, theory, and topic-specific classes, but they struggle to integrate what they learn and to see how it fits within the broader field of criminology and criminal justice research. This book directly tackles this problem by helping students to develop a 'researcher sensibility’ and demonstrates how the 'nuts and bolts' of criminal justice research - including research design, theory, data, and analysis - are and can be combined. Relying on numerous real-world examples and illustrations, this book reveals how anyone can 'think like a researcher'. It reveals, too, why that ability is critical for being a savvy producer or consumer of criminological and criminal justice research.</p> Daniel P. Mears, Joshua C. Cochran (Author); Afra Saleh Alshiban (Translator); Moataz Sayed Abdullah (Reviser) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/207 Sun, 26 May 2024 00:00:00 +0300 Handbook of Crime Prevention and Community Safety https://nup.nauss.edu.sa/index.php/sr/catalog/book/201 <p>Handbook of Crime Prevention and Community Safety provides a completely revised and updated collection of essays focusing on the theory and practice of crime prevention and the creation of safer communities. This book is divided into five comprehensive parts:</p> <p>Part I, brand new to this edition, is concerned with theoretical perspectives on crime prevention and community safety.</p> <p>Part II considers general approaches to preventing crime, including a new chapter on the theory and practice of deterrence.</p> <p>Part III focuses on specific crime prevention strategies, including a new chapter on regulation for crime prevention.</p> <p>Part IV focuses on the prevention of specific categories of crime and the fear they generate, including new chapters on organized crime and cybercrime.</p> <p>Part V considers the preventative process: the methods through which presenting problems can be analyzed, responses formulated and implemented, and their effectiveness evaluated.</p> <p>Bringing together leading academics and practitioners from the UK, US, Australia and the Netherlands, this volume will be an invaluable reference for researchers and practitioners whose work relates to crime prevention and community safety, as well as for undergraduate and postgraduate courses in crime prevention<span dir="rtl" lang="ar-SA">.</span></p> Aiden Sidebottom, Nick Tilley (Editor); Abdelhamid Elewa (Translator); Khaled Dabbour (Reviser) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/201 Mon, 06 May 2024 00:00:00 +0300 1st Artificial Intelligence Forum for Law Enforcement Uses https://nup.nauss.edu.sa/index.php/sr/catalog/book/272 <p>This report summarizes the outcomes of the inaugural AI Forum for Law Enforcement Uses in the Arab region, organized collaboratively by the Center of Excellence in Cybercrimes and Digital Forensics at the Naif Arab University for Security Sciences and the Centre for Artificial Intelligence and Robotics at the United Nations Interregional Crime and Justice Research Institute.</p> <p>Focused on addressing technical, malicious, and ethical concerns related to AI proliferation, the forum brought together global experts to discuss four key themes: AI-based capabilities, challenges specific to the Arab region, potential for malicious applications, and promoting responsible AI innovation. The report provides recommendations derived from forum discussions, surveys, and use cases, aiming to establish a foundational framework for AI utilization in Arab law enforcement. Key findings emphasize challenges in resources, infrastructure, data quality, regulatory frameworks, skills, training, collaboration, and guidelines. Recommendations stress proactive AI integration, accompanied by robust legal frameworks, budget flexibility, investment in research and development, academia and training, collaboration, and addressing data availability challenges. The report serves as a valuable resource and guide for Arab law enforcement and security leaders. It promotes the responsible, effective, and ethical use of AI in law enforcement and aims to address the escalating malicious exploitation of AI by criminal actors.</p> Centre of Excellence in Cybercrimes and Digital Forensics, United Nations Interregional Crime and Justice Research Institute (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/272 Tue, 20 Feb 2024 00:00:00 +0300 Drug Trafficking and Money Laundering https://nup.nauss.edu.sa/index.php/sr/catalog/book/240 <p>In today's interconnected world, the menace of illicit funds tied to drug trafficking poses a significant threat to global economic and social sustainability. Not only do money laundering crimes serve as a facilitator for the drug trade, but they also empower organized crime groups, exacerbating corruption and undermining national economies.</p> <p> </p> <p>In response to these pressing challenges, our latest report offers an in-depth examination of the intricate issues surrounding money laundering and drug trafficking. Drawing upon extensive research and expert insights, we delve into the mechanisms employed by criminals to launder funds and fuel the illicit drug market.</p> <p>But it's not all doom and gloom. Within these pages lie invaluable recommendations and best practices aimed at policymakers, law enforcement agencies, financial institutions, and stakeholders. These actionable insights provide a roadmap for preventing and combatting money laundering, dismantling its nefarious links with drug trafficking, and bolstering global efforts to counter these threats.</p> <p>Join us as we shine a light on this critical issue, empowering communities worldwide to foster a safer and more secure future. Together, we can turn the tide against the illicit activities that undermine our collective prosperity and well-being.</p> Julie Astoul, Rafik Hounas, Mereym Ammi, Aymeric Salamone (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/240 Wed, 24 Jan 2024 00:00:00 +0300 Dictionary for Forensic Entomology https://nup.nauss.edu.sa/index.php/sr/catalog/book/55 <p>This dictionary provides comprehensive coverage of the terms used in the field of forensic entomology, which specializes in criminal incidents involving insects that are relevant to legal professionals. It draws upon evidence and methods from the field of forensic entomology. A wide range of readers with various levels of knowledge can benefit from this glossary. It contains over 5000 scientific and technical terms, covering areas such as modern techniques in forensic entomology, the collection and analysis of insect-related case data and reports, laboratory methods for collecting, preserving, and rearing insects, common and scientific names of insect species of forensic importance, insect morphology, biology, crime scene evidence collection, post-mortem changes, insect succession on bodies in different environments, forensic meteorology, insect toxins, and post-mortem time intervals since death.</p> Walid Abdulghani Kaakeh, Ashraf Mohamed Mashaly, Reem Attalla Al-Ajmi, Fahd Abdu Al-Mekhlafi, Mohamed Saleh Al-Khalifa, Fouzi Ibrahim Boulkenafet (Author) Copyright (c) 2021 Naif University Press https://sbs.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/55 Mon, 22 Jan 2024 00:00:00 +0300 Public Health Security and Epidemics Control https://nup.nauss.edu.sa/index.php/sr/catalog/book/267 <p>جاءت هذه الدراسة من الحاجة الملحة لفهم وتعزيز استعداد وآليات الاستجابة في المنطقة العربية تجاه التهديدات الصحية. وتماشيًا مع زيادة الأزمات الصحية العالمية، وذلك بهدف تقييم الآليات الحالية للاكتشاف المبكر والاستجابة للتهديدات الصحية، وفحص فاعلية خطط الاستعداد والاستجابة الطارئة، وتقييم أنظمة المراقبة والمتابعة، وتحليل البنية التحتية الصحية، واستكشاف حملات التوعية العامة والتثقيف، والبحث في التعاون عبر الحدود داخل المنطقة العربية، وفحص هياكل الحوكمة، وتطوير السياسات، والتنسيق بين الجهات المعنية، والأطُر القانونية، والتعاون الدولي المتعلق بالأمن الصحي ومكافحة الأوبئة في الدول العربية.<br />وأوصت الدراسة بضرورة أن تعتمد الدول العربية إستراتيجياتِ رصدٍ تعاونية فعّالة لتعزيز الاستخبارات الصحية العامة، وتعزيز التأهب والاستجابة، وتقليل تأثير حالات الطوارئ الصحية. وتعزيز قدراتها في تنسيق الطوارئ وتعزيز نظم الاستجابة والاستعداد للطوارئ الصحية بشكل عام. وأن مشاركة وزارة الداخلية الفعّالة أمر بالغ الأهمية للحفاظ على القانون والنظام وضمان سلامة الجمهور خلال حالات الطوارئ الصحية العامة في الدول العربية.</p> Mohamed Eisa Moukhyer, Khalifa Abdelrahman Elmusharaf, Khaled Kazem Aboudouh (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/267 Mon, 22 Jan 2024 00:00:00 +0300 The Future of Alternative Development Programs as a Mechanism for Countering the Drugs Problem in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/273 <p>هدفت هذه الدراسة إلى استكشاف المبادئ والإستراتيجيات التي يمكن باتباعها تنمية المجتمعات المحليَّة العربيَّة المعرضة للوقوع في مشكلة المخدِّرات، سواء إنتاجًا (زراعة وتصنيعًا) واتجارًا (تهريبًا وترويجًا) أو إساءة استعمال، كذلك (تعاطيًا وإدمانًا)، والخروج بها إلى عالم معزز لجودة الحياة، يدعم الفرص التنمويَّة المتنوعة والمستدامة للتنمية.<br />وحددت الدراسة كثيرًا من الاستخلاصات الحيوية لوضع توصيات عملية بشأن تعميق ممارسات التنمية البديلة في المنطقة العربيَّة، بغية تقديم المساعدة إلى الحكومات العربيَّة في تطوير إستراتيجيات تنموية للتعامل مع مشكلة المخدِّرات وفقًا للتوجهات التي يجمع عليها عالميًّا والتي وردت في الإعلانات السياسيَّة التي اعتمدتها الجمعيَّة العامَّة للأمم المتحدة، وقدَّم التقرير الراهن مجموعة من التوصيات على مستوى صنع السياسات والحلول الوطنيَّة، ومستوى المجتمعات المحليَّة والتدابير التنفيذيَّة المقترَحة نحو خُطة عمل عربيَّة للتنمية البديلة.</p> Amr Othman, Abdel Salam Sharaf, Shahla Eltayeb, Wadih Maalouf (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/273 Mon, 22 Jan 2024 00:00:00 +0300 Cyber-enabled Terrorism in the African and Arab Regions https://nup.nauss.edu.sa/index.php/sr/catalog/book/251 <p>The seventh review of the United Nations Global Counter-Terrorism Strategy (A/RES/75/291) underscored Member States' deep concern regarding the use of the Internet and other technologies for terrorist activities. Emphasizing collaboration among academia, the private sector, and civil society, the resolution sought to prevent terrorists from finding safe haven online while promoting an open, secure, and innovative Internet. In alignment with these principles, the Centre of Excellence in Cybercrimes and Digital Forensics (CoECDF) at Naif Arab University for Security Sciences (NAUSS) and UNOCT's United Nations Counter-Terrorism Centre (UNCCT) conducted a workshop on Cyber-enabled terrorism. A survey of selected Member States in Africa and the Middle East was conducted during the workshop, revealing their apprehensions about the misuse of Information and Communications Technologies (ICT) for terrorism. The survey outcomes aim to inform Member States' capacity-building strategies to combat cyber-enabled terrorism. The report comprehensively analyzes cyber-enabled terrorism threats in the African and Arab regions, offering key insights, findings, and recommendations. It identifies active terrorist groups, their methods, and the crucial need for specific skills in digital forensics, cyber security, and cyber intelligence. The diverse requirements of the African and Arab regions underscore the necessity for tailored capacity-building efforts in tackling cyber-enabled terrorism.</p> Centre of Excellence in Cybercrimes and Digital Forensics (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/251 Wed, 17 Jan 2024 00:00:00 +0300 NAUSS Ransomware Trends Report in Arab Countries 2020-2022 https://nup.nauss.edu.sa/index.php/sr/catalog/book/250 <p style="direction: ltr;"><span style="font-size: 0.875rem;">Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1.</span></p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a deep web search, collecting, analyzing, and classifying data on ransomware gangs targeting Arab countries and organizations from 2020 to 2022. We have collected the information of ransomware victims through the darknet and dark web, focusing on leaked information.</span></p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">This report focuses on the Arab countries, organizations, and sectors victimized by ransomware gangs and whose information has been leaked on the darknet. Moreover, it investigated ransomware gangs that carried out cyberattacks against Arab countries, and the tactics, techniques, and procedures (TTPs) they were using.</span></p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">The number of organizations that are attacked by ransomware gangs is increasing significantly. Some organizations pay ransom to ransomware gangs in order not to publish their information on the darknet. As a result of not paying the ransom demanded by the ransomware gangs, certain organizations and countries had their private and sensitive data leaked to the dark web.</span></p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">The purpose of this report is to help law enforcement agencies combat ransomware cyberattacks by providing them with insights into the evolving tactics of ransomware gangs. By understanding how these gangs operate, law enforcement agencies can better prepare to combat and respond to ransomware attacks.</span></p> Abdulrazaq Almorjan, Dr. Kyounggon Kim, Ms. Norah Alilwit (Author) Copyright (c) 2024 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/250 Sun, 14 Jan 2024 00:00:00 +0300 The Integrative Relationship between Meteorology, Environment Protection and Security Agencies https://nup.nauss.edu.sa/index.php/sr/catalog/book/245 <p>هدفت هذه الدراسة إلى مناقشة نظم الأرصاد على المستوى العالمي والإقليمي، والوقوف على أهم التحديات والفجوات المتصلة بفاعلية دور هذه النظم، وصولًا لرؤية مقترحة لتفعيل العلاقة التكامليَّة بين نظم الأرصاد والأجهزة الأمنيَّة؛ مما يعزز حماية البيئة لمواجهة المخاطر الأمنيَّة التي يشكلها ارتباك الأرصاد الناتج عن تغير المناخ، ويساعد على توفير بدائل عملية للتعامل مع المناخ والأرصاد بوصفه أحد الأخطار الأمنيَّة وضبط الأداء وتحسين المخرجات، مع التركيز على سرد مهددات الأمن الإنساني الناجمة عن ظواهر الأرصاد المتطرفة وكيفية تحسين وتطوير الأمن الإنساني بتحسين أداء أجهزة الأرصاد والبيئة من جهة والأجهزة الأمنية من جهة أخرى.<br />وأكدت نتائج الدراسة أن المنطقة العربية تمتلك المقومات الأساسية لنظم الأرصاد المختلفة، وهناك بعض الدول العربية حققت الكثير من التقدم في هذا المسار، إلا أن هناك المزيد الذي يمكن القيام به، فهناك فهم شائع فيما يتعلق بأنظمة الرصد والإنذار، هو أنها موجودة ليتم تنشيطها بمجرد وقوع الخطر، رغم أن الهدف من نظم الأرصاد والإنذار المبكر ليس فقط تسهيل استجابة مؤسسية أو مجتمعية أو فردية لخطر وشيك، ولكن تطوير سلوك وممارسات طويلة الأجل للحد من المخاطر، واتخاذ الإجراءات الاستباقية لضمان الحفاظ على الأمن بأبعاده الشاملة.</p> Ahmad Kamel Hegazy , Saud Leily R. AlRowaily (Author); Khaled Kazem Abudouh Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/245 Mon, 25 Dec 2023 00:00:00 +0300 Crime Prevention https://nup.nauss.edu.sa/index.php/sr/catalog/book/204 <p>Crime Prevention: Approaches, Practices, and Evaluations, tenth Edition, meets the needs of students and instructors for engaging, evidence-based, impartial coverage of interventions that can reduce or prevent deviance. This edition examines the entire gamut of prevention, from physical design to developmental prevention, to identifying high-risk individuals, to situational initiatives, to partnerships, and beyond. Strategies include primary prevention measures designed to prevent conditions that foster deviance, secondary prevention measures directed toward persons or conditions with a high potential for deviance, and tertiary prevention measures to deal with persons who have already committed crimes.<br />In this book, Lab offers a thorough and well-rounded discussion of the many sides of the crime prevention debate in clear and accessible language, including the latest research concerning space syntax, physical environment and crime, neighborhood crime prevention programs, community policing, crime in schools, and electronic monitoring and home confinement.<br />This book is essential for students and research in criminal justice, criminology, and sociology and other security sciences.</p> Steven P. Lab (Author); Omar Sheikh Al-Shabab (Translator); Abdelhamid Elewa (Reviser) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/204 Tue, 12 Dec 2023 00:00:00 +0300 Metaverse https://nup.nauss.edu.sa/index.php/sr/catalog/book/242 <p>ركزت هذه الدراسة على الكشف عن مهددات الميتافيرس للأمن الوطني، وقد حددها في تسع فئات تندرج تحتها هذه المهددات الأمنية: البنية التحتية المعرضة للخطر، التلاعب بالهوية، محاذير انتهاكات الخصوصية، الاختراق، الإرهاب الإلكتروني، الجرائم السيبرانية، انتشار المعلومات المضللة والزائفة، المخاطر التي تهدد السيادة والثقافة، التعبئة الاجتماعية والسياسية. خاصة في ظل الانجذاب العالمي الكبير للفرص التي تُقَدِّمُها تقنية الميتافيرس، واتجاه غالبية دول العالم نحو استكشاف الطرق الممكنة للاستفادة من إمكاناتها، ومع التوقعات الواعدة وإمكانات التجارب الرقمية التحويلية، وسعي الجميع نحو الاستفادة من المزايا المحتملة للميتافيرس، وعلى الرغم من أن عالم الميتافيرس مليءٌ بالفرص والمزايا التجارية، فإن له أيضًا تأثيرًا محتملًا هائلًا على قطاع الأمن الوطني. وفي هذا السياق يتقارب العالم العربي وعالم الميتافيرس بعضهما من بعض، كلما ازداد تنامي التحولات الرقمية الإقليمية من جهة، وتنامي تقنيات الميتافيرس من جهة أخرى.</p> Mohammed Soliman, Salah Ghazzal, Vincent Carchidi, Adel El-Adawy (Author) Copyright (c) 2023 Naif University Press https://creativecommons.org/licenses/by-nc/4.0/ https://nup.nauss.edu.sa/index.php/sr/catalog/book/242 Tue, 12 Dec 2023 00:00:00 +0300 National Security Implications of Climate Change https://nup.nauss.edu.sa/index.php/sr/catalog/book/243 <p>تقيٍّم هذه الدراسة التداعيات الأمنية لتغير المناخ في العالم العربي بناءً على الدراسات العلمية والبيانات الكمية المتاحة. حيث سيواجه العالم العربي آثارًا هائلة لتغير المناخ ما لم تكن هناك جهود تعاونية طموحة، تهدف إلى الحد من تغير المناخ. وفي الوقت ذاته، فإن المنطقة معرضة لتغير المناخ بسبب مناخها الحار والجاف وخطوط سواحلها الطويلة والتفاوتات الاجتماعية والاقتصادية. ونتيجةً لذلك، ستتضاعف التحديات المتعلقة بتوافر المياه والغذاء والطاقة في العقود القادمة؛ مما يتطلب إدارة متكاملة وشاملة ومستقبلية لتلك القطاعات الثلاثة. كما ستخلق الآثار المتوقعة لتغير المناخ تحديات إضافية أمام قدرات القطاعات العسكرية وجهات إنفاذ القانون؛ مما يستلزم تحسين التنسيق والاستثمارات في قدرة المنطقة على الصمود أمام تغير المناخ. ومن المحتمل أن يُضاِعف تغير المناخ من مخاطر الاحتجاجات والحروب الأهلية والإرهاب. ومع ذلك، يتعين تعزيز أساليب التعاون بشأن التحديات البيئية المشتركة على المستويين المحلي والدولي. يمكن رصد حركة الهجرة بسبب المناخ، مع العلم بأن أعداد المهاجرين ستتزايد إذا استمر تغير المناخ. وغالبًا ما تحدث الهجرة داخل البلدان أو إلى البلدان المجاورة مستهدفةً المناطق الحضرية. ويمكن أن تشكل دعم الجهود المحلية للتكيف وإعداد التجمعات الحضرية للمزيد من الهجرة إستراتيجيةً مناسبة للتعامل مع الهجرة المرتبطة بتغير المناخ. يوصي التقرير بإعداد استجابة طموحة وشاملة ومنسقة للحد من تغير المناخ والتكيف مع آثاره التي لا يمكن تجنبها.</p> Tobias Ide, Christiane Fr.hlich, Adel El-Adawy (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/243 Tue, 12 Dec 2023 00:00:00 +0300 Alternatives to Imprisonment https://nup.nauss.edu.sa/index.php/sr/catalog/book/246 <p>يستعرض هذا الدليل الذي تم تنفيذه بالشراكة بين جامعة نايف العربية للعلوم الأمنية ومكتب الأمم المتحدة المعني بالمخدرات والجريمة المبررات التي تدعو إلى تَبَنِّي وتطبيق العقوبات البديلة، ويُصَنِّفُها إلى مبررات إنسانية تُسْهِم في حفظ كرامة الإنسان وسلامته التي قد تتعرض للمساس والانتهاك في حالة تطبيق عقوبة سالبة للحرية عليه، خاصة مع التكدس الذي تشهده السجون على مستوى العالم والناتج من ارتفاع معدلات الجريمة من جهة، وتطور وسائل ضبط ومكافحة الجريمة من جهة أخرى. إضافة إلى المبررات الاقتصادية التي تسهم في خفض التكلفة المتضاعفة لتطبيق العقوبة الحبسية والمتمثلة في ارتفاع تكاليف تشغيل السجون من جهة، وزيادة معدلات العود للجريمة والناتج من ضعف المردود الإصلاحي للسجن من جهة أخرى.<br />وأكد الدليل التفاوت في نظم وسياسات العقوبات البديلة، وآلية التطبيق والجهات المعنية في الدول العربية. الأمر الذي يتطلب إرساءً لسياسات جنائية تُعَزِّز من استخدام العقوبات البديلة كعقوبة أصيلة، وإنشاء منظومة تطبيقية متكاملة للعقوبات البديلة، بدءًا من إعداد العاملين في العدالة الجنائية ورجالات إنفاذ القانون لممارسة دورهم الرئيس في تعزيز استخدام العقوبات البديلة، وتحديد الأنسب منها، إضافة إلى تطوير المراكز التأهيلية والمؤسسات المدنية التي تُطبَّق فيها العقوبات البديلة، والتركيز على تهيئة المنظومة المجتمعية برفع وعيها، ومن جهة أخرى إشراكها في التنفيذ والمتابعة والتقييم لضمان تكاملية تفعيل الأثر الإصلاحي والتأهيلي للعقوبات البديلة.</p> Faleh bin Salem Alkahtani, Mohamed Chafik Sarsar, Wijdan Altijani Abbas (Prepared by); Hatem Aly, Sohaila Hussein, Marine Mayer, Omar Elashmawy (Reviser) Copyright (c) 2023 Naif University Press https://creativecommons.org/licenses/by-nc/4.0/ https://nup.nauss.edu.sa/index.php/sr/catalog/book/246 Tue, 12 Dec 2023 00:00:00 +0300 Alternatives to Imprisonment in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/247 <p>انطلقت هذه الدراسة من أهميَّة العقوبات البديلة للسجن كإحدى ركائز السياسات الجنائية الحديثة، وحاولت الإجابة عن كيف يمكن -انطلاقًا من دراسة واقع العقوبات البديلة في التشريعات العربية- رسم آفاق تطوُّر السياسات العقابيَّة والتحديات التي يمكن أن تواجهها؟ وقد تمَّ اعتماد منهج مركَّب يجمع بين التحليل القانوني لمختلف النصوص القانونية المتعلقة بالعقوبات البديلة، ولا سيما في تشريعات الدول العربية، ولفقه القضاء في إعماله لهذه العقوبات البديلة، وبين مناهج علم الاجتماع لفهم البعد الواقعي والعوائق والتحديات التي قد تواجه نجاح العقوبات البديلة للعقوبة السجنية في الدول العربية.</p> Mohamed Chafik Sarsar, Wijdan Abbas, Osama AlSulaimani, Mohamed Bani Taha, Mohamed Bouzouitina, Mohammed Ali Haidass, Ahmed Mansour (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/247 Tue, 12 Dec 2023 00:00:00 +0300 Biometrics’ Role in Enhancing Border Security in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/238 <p>Arab states consist of 22 <a href="https://en.wikipedia.org/wiki/Member_states_of_the_Arab_League">Arab countries</a>. The region stretches from the <a href="https://en.wikipedia.org/wiki/Atlantic_Ocean">Atlantic Ocean</a> in the west to the <a href="https://en.wikipedia.org/wiki/Arabian_Sea">Arabian Sea</a> in the east and from the <a href="https://en.wikipedia.org/wiki/Mediterranean_Sea">Mediterranean Sea</a> in the north to the <a href="https://en.wikipedia.org/wiki/Indian_Ocean">Indian Ocean</a> in the southeast. In recent years the region witnessed some of the most significant interregional and cross-regional border movements and crossings. Multifaced reasons including war, conflict, economic status, and security factors, determine the pivotal importance of border crossings in some Arab countries. Furthermore, border security in some Arab countries is of great importance globally as some of the Arab countries are located in <a href="https://en.wikipedia.org/wiki/North_Africa">Northern Africa</a> and <a href="https://en.wikipedia.org/wiki/West_Africa">Western Africa</a>, which are considered crossing points for irregular migrants to Europe. The threats facing Arab countries’ border security are immense, including illegal migration, movement of terrorist groups, and transnational organized crime. However, there is a lack of information regarding the availability and use of biometrics to enhance border security in Arab countries.</p> <p>Border security cannot be managed efficiently without using advanced biometric systems that allow overcoming security challenges. Biometrics provides intelligent control of borders (e-gates, e-visas, and e-passport) and provides the possibility of optimizing the use of biometric data for travelers, as well as the ability to collect, use, store and exchange information.</p> <p>From this perspective, Naif Arab University for Security Sciences and its partners in IOM and UNCCT have developed the current report titled (Biometrics Role in Enhancing Border Security in Arab Countries). This partnership is an innovative approach to conducting a security related study across Arab countries, to combine field expertise and academia, to blend grey literature and academic production. The joint report aims to document the status of the use of biometrics in border security in Arab countries. The present report developed the BSBC Tool (Border Security Biometrics Checklist), a tool of 50 statements to collect evidence on the use of biometrics in Arab countries to enhance border security, and contains a quantitative and qualitative review covering four main areas: including identifying the legislative and regulatory frameworks and technical readiness in border security biometrics, as well as the standards and status in the Arab countries and best practices on the responsible use and sharing of biometrics to counterterrorism and current situation in the Arab countries. Furthermore, the report will present the operational capacities for border security biometrics and the technology implementation in border security biometrics (Current status and expected future). Finally, the report provided practical recommendations to decision-makers regarding the future use of biometrics in border security.</p> <p>The current results showed that several criteria are absent in the three participating countries, including access to a centralized national database that stores collected personal/biometric data, regulatory framework for biometric data at borders, and regularity of risk assessments. Findings indicated a gap with respect to the application of biometric technologies, such as the issuance of secure biometric identity documents through the proof of identity process to verify a person's identity such as identifiers, using contactless fingerprints to identify/verify travelers (including suspicious ones), using facial recognition To identify/verify travelers (including suspects), use iris scanning to identify/verify travelers (including suspects), use the Gait method to identify/verify travelers (including suspects), and use biometrics to identify Suspicious behaviors (cognitive biometrics), such as emotional facial recognition.</p> <p><strong>The report recommended the following:</strong></p> <ul> <li>Developing a joint Arab strategy for the use of biometrics in border security, including the development of regulatory frameworks and appropriate legislation that allow the sharing of biometric data, and general data protection laws. ¤ Joint Arab cooperation to develop a national database dedicated to storing biometric data.</li> <li>Develop a regulatory framework for border biometric data (for citizens, refugees and high-risk groups) from data collection to data deletion, including data, recording, use, review, processing, storage, retention and deletion.</li> <li>Develop procedures for assessing cybersecurity risks and conducting these assessments periodically.</li> <li>Strengthening the technicalcapabilities of border security personnel to enable them to handle and process biometric data, including the collection of personal biometric data and identification of suspicious persons, and to effectively supervise the processing of biometric data.</li> <li>Develop guidelines on public health and safety concerns, including international human rights standards, and risk assessments for the use of biometrics at borders.</li> <li>Develop initiatives for effective oversight of counter-terrorism data processing, which include a specific regulatory framework for personal data of children associated with known or suspected terrorists, including terrorist fighters and returnees, and a regulatory framework for biometrics management of data related to known and suspected terrorists (from collection to deletion).</li> <li> </li> <li>Develop robust communication networks to ensure that operational requirements are met, including timely processing of passengers, performing aircraft departures in a timely manner, and avoiding inefficiencies due to system disruptions. Likewise, stakeholder input is needed to provide funding and staff for the programme.</li> <li>Engage the community and the traveling public with biometric technology through a transparent and direct educational campaign and the benefits it provides to them and improve the overall level of security in travel and transportation.</li> </ul> <p>To achieve these recommendations, the report presented a number of QUICK WINS as follows:</p> <p> - Implementation of the ICAO Traveler Identification Program (TRIP)</p> <ul> <li>Implementation of MIDAS, the Migration Information and Data Analysis System developed by the International Organization for Migration.</li> <li>Develop principles to support the compliance of existing databases at Arab borders with the rules in force globally, and machine-readable travel documents compliant with the International Civil Aviation Organization (ICAO).</li> </ul> <p> Strengthening partnerships with international organizations to align their operational capabilities and benefit from capacity building programs to enhance border security in Arab countries.</p> Fahad Alharby, Slim Masmoudi, Shahla Eltayeb, Jacopo Carbonari, Margherita Natali (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/238 Sun, 10 Dec 2023 00:00:00 +0300 Traffic Safety Culture https://nup.nauss.edu.sa/index.php/sr/catalog/book/202 <p>This reference book provides traffic safety researchers and practitioners with an international and multi-disciplinary compendium of theoretical and methodological chapters. Together, these chapters discuss the research and application of “Traffic Safety Culture” as an important approach to traffic safety, including the vision of zero traffic fatalities and serious injuries. <br />Traffic crashes are a significant cause of death and debilitating injury worldwide, especially in low- and middle-income countries. Whereas most traditional safety efforts teach safe behavior (education), punish risky behavior (enforcement), or design the environment to minimize crash injury resulting from those behaviors (engineering), there is also the need to understand the culture of our social environments that influence our concern for traffic safety and choice of behaviors.</p> Katie Fleming-Vogl, Barry Watson, Nicholas John Ward (Editor); Ahmad Khuddro (Translator); Sadok Abcha (Reviser) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/202 Sun, 03 Dec 2023 00:00:00 +0300 Fluid Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/248 <p>Can security be a social, cultural, artistic, literary, and philosophical phenomenon? Can it be a topic of public discussions in people’s gatherings in daily lives?</p> <p>Has security evolved into a comprehensive and collective responsibility for everyone, or does it remain an individual responsibility? This shift arises from the expanded and pervasive concept of security, with threats now omnipresent in homes, workplaces, streets, clubs, bank cards, and social media accounts.</p> <p>The term "liquid security" possesses both social and physical characteristics. When “solid” materials are exposed to external stress and pressure, they lose their cohesion and turn into "liquid" materials. Similarly, solid security has transformed into a liquid state under the influence of globalization, information flow, technological advancements, social media applications, and media impact. The booklet delves into issues emerging from daily societal life and the cultural shift it undergoes, driven by novel security concepts. It dissects the realm of liquid security, posing a threat to the economic, intellectual, philosophical, literary, and psychological security of society. This necessitates that individuals equip themselves to comprehend and engage with it before it engulfs and unconsciously alters them.</p> Abdulrahman bin Abdullah Al Shuqair (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/248 Thu, 12 Oct 2023 00:00:00 +0300 Thinking Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/249 <p>Security has transcended its traditional confines and evolved into a multifaceted social and cultural concern, extending beyond the exclusive purview of the state. <br />Professionals in fields such as social sciences, technology, and urban planning now play pivotal roles as developers of security theories with new concepts. The growing scientific and intellectual interest in security and peace issues serves as an indicator for societal progress and national development. <br />Building on this, the booklet delves into the concepts of security and peace through the lens of social sciences, offering a simplified analysis of scientific and security matters. It explores global schools of thought on security and peace, delving into their primary theories, as well as examining economic security, environmental security, and the five dimensions of security. These dimensions revolve around safeguarding social and cultural identity against the influences of globalization and information flow, achieved through communication and technological means.<br />Additionally, the booklet addresses crime prevention in urban planning, highlighting the role of city planning and building design in reshaping individual lifestyles and their impact on personal and public safety, new smart cities, and environmental and societal health. Emphasizing the role of social sciences in bridging security gaps, the booklet offers non-specialist readers a simplified exploration of scientific issues, cultivating 'security thinking' as a general cultural paradigm that aligns with the developments in society, technology, and urban planning.</p> Abdulrahman bin Abdullah Al Shuqair (Author) Copyright (c) 2023 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/249 Thu, 12 Oct 2023 00:00:00 +0300 Convict Criminology for the Future https://nup.nauss.edu.sa/index.php/sr/catalog/book/213 <p>This book is a valuable contribution of a distinguished group of international scholars in convict criminology. It outlines the historical backgrounds of convict criminology and its prospects. Moreover, the authors discuss the current challenges faced by prisoners while recognizing that the voice of the convict has been ignored in academia and in criminal justice practice. The book is unique in its topic, approach, and theoretical perspectives. The translation of this book is an excellent addition to the Arab library in the field of Criminal Sciences.</p> Jeffrey Ian Ross, Francesca Vianello (Editor); Munahi Khanthal Shari, Aiyad Aswed Alshammari (Translator) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/213 Thu, 29 Dec 2022 00:00:00 +0300 Mechanisms to Reduce the Recruitment of Children in Armed Conflicts https://nup.nauss.edu.sa/index.php/sr/catalog/book/223 <p>The risk of child recruitment in armed conflicts has increased as a result of change in the nature of wars from war between states to civil wars that led to the emergence of armed groups, as the high percentage of child soldiers was associated with the presence and activity of armed groups in these countries. Violations related to the recruitment of children in armed conflicts increased in conjunction with the increase in the number of armed groups that recruit them for their benefit, as international reports revealed that number of violations related to the recruitment of children in armed conflicts doubled during the year 2020, as violations related to killing and maiming, and the recruitment and use of children, recorded the largest number among violations committed against children in armed conflicts, which amounted to 73% of the total violations since 2005, as armed groups caused about 64% of these violations in 2020, in addition to the increase rate of attacks on schools by 17% in 2020 compared to 2019 (UNICEF, 2022).</p> <p>The issue of child recruitment in armed conflicts placed on the international agenda in 1996, after a study conducted by Graa Machel in the same year, as the beginning of addressing this phenomenon indirectly within the framework of the rules of international humanitarian law in the Geneva Convention (1949) and (1977). Two protocols were adopted to the Geneva Convention, the first on international armed conflicts, and the second on non-international armed conflicts, in which the recruitment of children in armed conflicts under the age of fifteen was prohibited. International efforts have led the international community to conclude the Convention on the Rights of the Child (1989).</p> <p>The phenomenon of recruitment is no longer the product of social and economic factors. With increasing abuses and number of child soldiers, demand-side factors by armed groups appear to have contributed significantly to the widespread use of children in armed conflict along with structural, psychological and social driving factors. The increase in the number of child soldiers was associated with the spread of the phenomenon in many areas, which was accompanied by the tendency of armed groups to recruit children as an alternative option for adult fighters in light of the shortage of adult recruits, as a strategy to ensure the group’s sustainability and raise its operational capabilities, and as a military tactic in order to gain an advantage on the battlefield.</p> <p>The transformations that have occurred in the phenomenon have emerged in the security and social repercussions associated with it, as the failure in some of the rehabilitation and reintegration processes led to the re-recruitment of children by other groups in many areas, making child soldiers or former members of armed groups a security dilemma because they are victims, while they pose a threat to national and international security when rehabilitation and reintegration programs failed to achieve their safe and sustainable exit from the processes of ideological extremism. This makes challenges posed by the emerging recruitment paths associated with the recruitment of armed groups of children more difficult to overcome, even the structural and social factors are no longer at the national level, but rather have become linked to global issues such as climate change, which has caused economic deterioration and lack of food security in many regions, and thus exacerbated the spread of child recruitment.</p> <p>The report concluded with a set of results, as follows:</p> <ol> <li>Child recruitment has been linked to numerous grave violations against children in armed conflict. Abduction and the subsequent violations such as mutilation and violence have become a strategy of forced recruitment by armed groups as well as online recruitment, which explains part of the presence of “foreign fighter” children, who are children who migrate to conflict areas with their parents or who have been recruited in some cases through electronic games and videos.</li> <li>The roles of child soldiers have witnessed a remarkable shift through the assignment of combat tasks to children, which are according to internal determinants in some armed groups such as ideology, the group’s strategic goals, and their exploitation of natural resources, where armed groups have used children in conflicts through a systematic process aimed at achieving short and long-term goals of enhancing their operational capabilities on the battlefield, and emergence of a generation of extremist fighters that ensures the continuity of their ideological project.</li> <li>The recruitment of children varies from one context to another, and there are many emerging paths that have occurred in child recruitment, such as the abduction of children from outside conflict areas to participate in armed conflicts, or the recruitment of foreign children to conflict areas, which makes it a cross-border phenomenon, and therefore the push and pull factors associated with each path vary.</li> <li>International laws and conventions in preventing the recruitment of children came in response to the increase in violations committed against children in armed conflict and were not proactive in predicting the possible paths to the development of the phenomenon to prevent the recruitment of more children, nor was it explicit in prohibiting and criminalizing the recruitment of children under the age of 18.</li> </ol> <p>Accordingly, there are many areas where efforts to prevent the recruitment of children in armed conflict need to be intensified, such as understanding how internal and external determinants affect the decision of armed groups to forcibly recruit children and giving this aspect more focus within international efforts, whether at the level of prevention, rehabilitation, and reintegration programmes. Against this background, the report proposes the following recommendations:</p> <p><strong>&nbsp;</strong></p> <p><strong>General recommendations</strong></p> <ol> <li>Strengthen monitoring and control capacities for the recruitment of children through:</li> </ol> <p>- Tracking the trajectories of child recruitment and changes in terms of the approach used and how child recruitment is employed in the multiple contexts of armed groups.</p> <p>- Monitor the movement of foreign fighters to conflict areas to detect routes used for smuggling to those areas through the development of border control systems and border areas.</p> <p>- Support country task forces for monitoring and reporting and improve disaggregation of data and analysis related to child recruitment to develop better preventive responses and actions to reduce the recruitment of children in armed conflict.</p> <ol start="2"> <li>Targeting the capabilities of armed groups to disarm and demobilize children and work to establish special centers for the rehabilitation of children who were recruited into armed groups to reintegrate them into society without discrimination according to age, sex, or period of conflict.</li> </ol> <p>&nbsp;</p> <p><strong>Legal recommendations</strong></p> <ol> <li>The need for international and regional organizations such as the United Nations and the League of Arab States to urge countries to enact legislation limiting forced recruitment to the age of 18 years and above, in order to provide greater protection for children in armed conflict as well as criminalize the recruitment of children under the age of 18.</li> <li>The need for States to sign and ratify the Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict and to enact legislation explicitly prohibiting and criminalizing the recruitment and use of children into armed forces or armed groups.</li> <li>Member states of the League of Arab States to review the legal frameworks of counter-terrorism laws related to cases of children committing crimes while associated with terrorist groups so that children are treated in this context as victims and not perpetrators, as the rate of children detained in terrorism-related cases continues to rise as a threat to national and international security from a counter-terrorism perspective.</li> </ol> <p>4. Arab countries should review laws related to the treatment of children on the battlefield that do not discriminate between children and adult combatants and develop guidelines for dealing with child soldiers to protect them and prevent their continued exploitation in armed conflicts.</p> Amaal Mohammed Alhabdan, Mohamed Mahmoud Shawky, Ibtihal Masoud AlTalhi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/223 Wed, 28 Dec 2022 00:00:00 +0300 Merger and Disintegration Landscape of Terrorist Organizations https://nup.nauss.edu.sa/index.php/sr/catalog/book/224 <p>Terrorist organizations have experienced several transformations, in forms of merger and disintegration. These transformations came as a reflection of regional and global factors that affected the global terrorism landscape. It had several repercussions on the parent organization and the organizations resulting from the processes of merger and disintegration, in addition to its impact on the effectiveness of counter-terrorism efforts. The alliance between terrorist organizations has been a continuous and recurring state with different interactions and mechanisms. These alliances occur in a context of constant competition between terrorist organizations, which often leads to the end of alliances with disintegration and split to the point of conflict and competition.</p> <p>The nature of alliances between terrorist organizations and the repercussions of such alliances is what calls for this study as it seeks to reveal determinants affecting the merger/disintegration landscape of terrorist&nbsp;&nbsp; organizations worldwide, as well as reasons for terrorist organizations resorting to such inter-linkages, in addition to identifying the developments in sush alliances through the analysis of the most prominent models in different regions of the world, including the Arab region,&nbsp; Africa,&nbsp; Asia,&nbsp; and&nbsp; Europe.</p> <p>The study reveals that most prominent reasons for terrorist organizations resorting to this type of cooperative relations with other terrorist organizations are seeking to achieve security cooperation through security training, intelligence exchange, and the implementation of joint attacks; benefiting from the networks of external relations of terrorist organizations that will be allying with, and seeking survival in cases where the terrorist organization faces severe pressures that may affect its survival.</p> <p>As for the repercussions of such alliances on terrorist organizations, the more they bring advantages, they have costs. The desire to expand influence often clashed with some of the intellectual and ideological constants of terrorist organizations, which prompted these organizations, in several cases, to abandon those constants. In the case of local alliances, the goals of the allied organizations are close to a large extent, so that the enemy is common, and the goal pursued is one goal, but it does not necessarily happen in the case of cross-border alliances, in which some constants may be abandoned in exchange for pragmatic considerations.</p> <p>Cases of merger and disintegration between terrorist organizations had important implications for the security landscape. On the one hand, the security landscape has become increasingly complex, especially in the case of African and Asian, where alliances have reinforced the capacity of domestic terrorist organizations, becoming more dangerous to impose increased security threats as well as impacting the effectiveness of counter-terrorism policies based on several related scenarios discussed in the study. The security repercussions of such merger and disintegration of terrorist organizations were represented in the emergence of terrorist organizations / groups that are more deadly and extremist than the parent organization, the emergence of hybrid (terroristcriminal) entities, and the geographical concentration of terrorism, which affects different dimensions of national security.</p> <p>And based on our review of the most prominent features and forms of mergers /disintegration between terrorist organizations in the four regions,</p> <p>we reached the following conclusions:</p> <p>1- Many terrorist organizations in all regions witnessed different degrees of alliances, which were sometimes governed by pragmatic considerations and at other times by ideological factors.</p> <p>2- The alliances between terrorist organizations are characterized by overlapping ethnic and criminal dimensions, which complicates the map of terrorist alliances in Africa and Asia.</p> <p>3- Several regional and international transformations, led to major changes in nature of alliance through a continuous state of splits within terrorist organizations, as the principles governing alliances changed, they became more pragmatic, more fluid, and less permanent.</p> <p>4- Changes occurred in the geographical map of terrorism through the concentration of terrorist organizations in alternative areas, which in turn affected scenes of merger and disintegration and led to the emergence of organizations that are more violent and deadly than the parent organization such as ISIS.</p> <p>5- Despite the efforts made in counter-terrorism operations, whether at the local, regional, or international level, terrorist organizations in most of the regions have shown great flexibility in adaptation and resistance while targeted by counterterrorism operations; as they resort to continuous changes in its strategy and behavior in the Arab region, Africa, and Asia, while terrorist organizations in Europe have shown less resistance.</p> <p>The study reached the following recommendations:</p> <p>1- Including a study of the network of terrorist organizations alliances into counter terrorism efforts at local and international levels, due to the significant role these alliances play on counter terrorism efforts, which can be done through establishing a decision support unit to study the dynamic map of alliances between terrorist organizations.</p> <p>2- Inviting Arab research centers concerned with terrorism issues to contribute in creating a database on alliances/ splits between terrorist organizations worldwide, with periodic and continuous updates of the database, which can be through Naif Arab University for Security Sciences.</p> <p>3- Evaluating the effectiveness of “targeting of terrorist organization leadership” as a strategic tool in counter terrorism by addressing several repercussions of this strategy represented in the emergence of more scenes of merger and disintegration between terrorist organizations, the increased in terrorist activity, and the flexibility of the current terrorist organizations in cases of targeting leaders.</p> <p>4- Focusing efforts of counter terrorism on resource -rich areas, as they are considered as the most attractive areas for terrorist alliances to provide financial resources.</p> <p>5- Developing predictive studies in the field of counter terrorism, that contribute to tracking changes in the movements and behaviors of terrorist organizations, in addition to revealing caracteristics of terrorist organizations in light of the current political and economic changes, which will help the decision -makers draw future paths of terrorist organizations and proactive response to their movements.</p> khadiga Arafa Amin, Ibtihal Masoud AlTalhi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/224 Wed, 21 Dec 2022 00:00:00 +0300 Mechanisms to Reduce Vehicle Drivers' Fatigue to Enhance Road Traffic Safety https://nup.nauss.edu.sa/index.php/sr/catalog/book/216 <p>This documentary study was initiated from the observation that a large portion of the road traffic accidents involving truck drivers are attributed to fatigue and one of the reasons for this is due to the fact that truck driving and resting occupy suboptimal times due to the need for round-the-clock transportation. The resulting imbalance has an impact on driver stress through working during his daily time phase in which the body’s metabolism is reduced (at night) and a long waking time, that results from the addition of nighttime hours to the relatively normal waking period and shortened periods of daytime sleep due to daily activity that limits sleep periods. This behavior limited resting times during the day due to the importance of adhering to the deadlines set by companies for delivery procedures that stress on receiving on time due to repeated requests from the authorities to adhere to the delivery timetable. There is also evidence that driver fatigue incidents on the road are caused by factors other than those related to driving. Sleep hours play an important role, in addition to other factors such as the driver’s personality, age, and different types of sleep disorders in raising the risk of traffic accidents associated with driver fatigue.</p> <p>&nbsp;&nbsp; The potential to reduce stress among truck drivers is represented by scheduling, stress risk recognition, legislation, education, guidance, technical solutions, infrastructure and self-awareness which are considered as stress management treatments. Most countries have agreed that awareness, guidance, and the possibility of taking a rest while driving, especially in long distances, schedules, and work shifts, that take into account the human capabilities of drivers, are the most effective countermeasures to combat driver fatigue</p> Ali bin Dbayan Al-Rashidi, Othman Ahmed Al-Taher, Sherif Shukri Abed Rabbo (Author) Copyright (c) 2022 Naif University Press https://creativecommons.org/licenses/by-nc/4.0/ https://nup.nauss.edu.sa/index.php/sr/catalog/book/216 Wed, 14 Dec 2022 00:00:00 +0300 Climate Change and the Future of Human Security in the Arab Region https://nup.nauss.edu.sa/index.php/sr/catalog/book/222 <p>Climate change, including extreme events beyond the natural climate variability, has caused widespread adverse impacts along with their associated losses and damages to nature and humans. However, despite the efforts exerted in relation to development, adaptation, and vulnerability reduction across various sectors and regions, it is observed that the most vulnerable humans and systems are disproportionately impacted.</p> <p>Climate changes are conducive to the erosion of long-term opportunities for human development, undermining productivity, and decline in human capabilities. Despite that no single climate shock can be attributed to climate change, climate change may lead to the exacerbation of dangers and the heightening of vulnerabilities facing Arab people, especially those who live in developing regions. Thus, under weak economic and social conditions, more pressure is put on coping mechanisms, and individuals become shackled with deprivation and powerlessness. As such, the impacts of climate change constrain the abilities of individuals to break free from poverty and deprivation, which is the goal of human security.</p> <p>In this context, there has been increased recognition by international institutions, scientists, practitioners, and policy makers of climate change resulting in direct and indirect impacts on various levels and dimensions of human security, local and regional. This was not only due to potential dangers, but rather due to the combined effects of large-scale environmental, economic, social, demographic, and technological changes.</p> <p><strong>Objectives of the Report</strong></p> <p>The overall objective of the report is to explore the impacts of climate change on human security in the Arab region and to highlight the efforts of various interventions, along with proposing some strategic insights to avoid and mitigate the adverse impacts of climate change on Arab people. This objective is realized through few sub-objectives, namely:</p> <ul> <li>Developing a map of potential climate changes in the Arab region.</li> <li>Reviewing the impacts of climate change on water security and its future in the Arab region.</li> <li>Exploring the impacts of climate change on the reality of food security and its future in the Arab region.</li> <li>Examining the impacts of climate change on health security and its future in the Arab region.</li> <li>Identifying the existing links among climate change, migration and displacement trajectories, and conflict paths over resources in the Arab region.</li> </ul> <p><strong>Methodology of the Report</strong></p> <p>The report is based on combining a number of methods and tools, in a manner appropriate to the nature of the topic and its various variables through analysis, comparison and investigation. The researchers employed the secondary analysis methodology, applied the critical approach, and combined quantitative and qualitative data. Moreover, the report relied on basic data, such as reports, and studies conducted by relevant international and regional institutions and bodies in addition to national reports issued by Arab countries on climate change. Furthermore, it relied on studies, reports, statistics, notes and strategies developed individually by some independent bodies, researchers and experts.</p> <p><strong>Findings of the Report</strong></p> <p>The findings of the report point to increasing evidence that climate change will inevitably have direct and indirect impacts on the future of human security in the Arab region. It further indicates that climate change is expected to pose a number of future threats and challenges represented in natural disasters, such as: hurricanes, floods, severe drought, disruption of ecosystem services, material degradation, imbalances in agricultural and ecological systems, and low access to natural resources. This accords with what was stated in the Fourth Assessment Report issued by the Intergovernmental Panel on Climate Change (IPCC): “Changes in water availability and quality, precipitation patterns, particularly the likelihood of floods and associated threats, are likely to play a key role in causing adverse impacts on critical areas of human security”.</p> <p>Based on these possible causal links between climate change and the future of human security and judging by the economic and social conditions of the Arab region countries, we affirm the existence of seven threats to the future of human security in the Arab region. Such threats can be termed “climate vulnerability threats” and may lead to security threats in the future if associated with other factors of fragility and vulnerability. Managing security challenges associated with climate vulnerability threats begins with a clear understanding of these threats which may appear or exacerbate when climate change interacts with other social, economic, political and environmental pressures. We will shed more light on these links through the following points:</p> <ul> <li>Extreme weather events and disasters: Climate crises and disasters (such as hurricanes and floods) will exacerbate challenges of fragility, increase vulnerabilities, threaten livelihoods and sources of income for some groups of people, or may pose threats to health security. Frequently, the relationship between disasters and fragility is mutually reinforcing, which creates additional pressure on regimes, and such a situation could generate chaos and increased political unrest.</li> <li>Sea level rise: Sea level rise poses threat to low-lying areas even before being submerged under water, potentially leading to social unrest and causing migration and displacement.</li> <li>Deterioration of human livelihood, migration and displacement: Climate change is likely to increase human insecurity for people depending on natural resources; which may push them to migrate or flee; since their livelihoods will be subject to risks such as: degradation of pastureland, drying up of water sources, decreased agricultural land productivity or crop damage.</li> <li>Competition over resources: With the increased pressure on natural resources that may be scarce in some countries, competition over resources may lead to a state of instability, which may reach violent conflict in the absence of effective solutions, thereby threatening human security.</li> <li>Food insecurity: Climate change is likely to disrupt food production in many regions; thus, leading to increased prices, market fluctuations, and increased risks of local protests and riots.</li> <li>Transboundary water resources management: International rivers often constitute a source of tension and political conflict among countries. With the growing demand for water resources, especially on rivers, the amount of which climate change may reduce affecting the shares of some countries; competition over water use is likely to increase along with the decreased levels of precipitation and poor water resources. This may create complications and conflicts over the management and use of water resources, especially with regard to transboundary rivers.</li> <li>Unintended impacts of climate policies: The implementation of climate change adaptation policies may result in unintended adverse impacts, especially in fragile social contexts, or in social contexts with weak economic and social conditions.</li> </ul> <p><strong>Recommendations of the Report</strong></p> <p>Based upon the above-mentioned frameworks and mechanisms and associated vulnerabilities and challenges, and considering the corresponding visible and possibly invisible needs, the effectiveness of the individual or collective work of mechanisms for climate management and regional cooperation should be improved and strengthened. This will assist to meet the future needs of Arab countries in relation to addressing complex and thorny issues of climate change.</p> <p>The lack of specialized regional organizations and mechanisms to facilitate the implementation of climate action is among the most prominent observations yielded by the study. Regional management and cooperation in the Arab region have focused largely on assessment studies, knowledge exchange and capacity building. In return, it has not directly supported or enabled the implementation so far, including implementation tools and the leading body responsible for implementation. In addition, it is important to note the absence of action plan and map of partners, distribution of tasks agreed upon and distributed among partners, in the presence of a responsible coordinating body under the direction of the leading authority (the Arab League), and the approach followed to establish a project with its tasks and plan under the umbrella of the Arab League and the competent council.</p> <p><strong>Strengthening Climate Action in the Arab Region</strong></p> <p>Towards strengthening effective climate action, Arab countries may benefit from existing regional arrangements and should work closely together to overcome the vulnerabilities identified in this study in the following manner:</p> <ul> <li>The integration of policies and institutions is imperative. An integrated approach to climate change mechanisms and sustainable development objectives in regional governance should be followed.</li> <li>Climate change policies and related action of relevant regional institutions should be harmonized and simplified. This can help pool resources, avoid duplication of efforts and strengthen the local level. Harmonization should be extended to the effective presence in climate change activities, globally and regionally.</li> <li>Mainstreaming climate and development policies and promoting a more opportunity-oriented approach for adaptation and mitigation. In addition to considering the establishment of a coordination mechanism among the various bodies of the Arab League engaged in issues related to climate change.</li> <li>Implementation strategic approach: To develop a detailed comprehensive strategic action plan incorporating clear objectives and programs along with specific roles for implementation, review and follow-up. A specialized committee may be formed at the Arab League to conclude an approved and binding draft strategic action plan.</li> <li>Creating regional initiatives to enhance the enforcement of the commitments of the conferences of the parties and to emphasize the leading role played by the agricultural sector in addressing climate challenges.</li> <li>Subregional cooperation: It can be established by identifying strategic implementation initiatives (such as the Africa Clean Energy Corridor (ACEC) or the Small Island Developing States (SIDS) Lighthouse Initiative (LHI)) for each of the major regional sub-groups, based on shared priorities, e.g., regional energy markets (GCC countries and Morocco), climate security and livelihoods (Morocco/least developed countries (LDCs)), climate resilient water sectors (Mashreq countries), and climate-smart agriculture (LDCs).</li> <li>Improving transparency: By creating an online platform to document relevant regional administration activities and meetings proceedings, include a dynamic list and links of technical assistance and scientific data resources, and further communicate simultaneously with all stakeholders to increase participation opportunities for non-governmental actors.</li> </ul> <p><strong>Development of a Proposed Road Map for Climate Change and Human Security for the Arab Region</strong></p> <p>The proposed road map which has been developed based on the study of climate change and human security, comprises three main parts, each with its sub-items and scope. These parts are the regional scope, the national scope, and the specialized technical scope. The latter represents the ideas for technical programs and projects in the field of climate change mitigation. While the second part (the national scope) can be expanded upon by conducting a separate study to investigate and examine the situation in the twenty-two countries of the region, which is to be considered later. As for the technical scope, specialized studies inspired by this study should be conducted. Food security, energy security, water security, population issue, environmental sustainability, biodiversity, and the degradation of pastureland, each of these domains has its field. Nevertheless, the literature and recommendations of climate conventions in addition to national literature represent a rich knowledge heritage to be applied and which would establish solid regional action refined and strengthened further by studies and surveys.</p> Ibrahim Adam El Dukheri, Khaled Kazem Aboudouh, Elsadig Abdalla Abdalla (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/222 Wed, 07 Dec 2022 00:00:00 +0300 The Security Challenges for the "Tiktok" Application https://nup.nauss.edu.sa/index.php/sr/catalog/book/221 <p>The number of internet users has increased around the world. Therefore, social media become the most preferable communication tools for expressing viewpoints and comments of people and sharing their information and daily life events with friends. Moreover, social media offer many privacy options for users, such as: private groups, private conversation, public group, or public page. Persons from different areas can exchange viewpoints and opinions and make discussions. Accordingly, members of terrorist groups and extremist organizations consider social media as one of the best effective ways for promoting their misleading thoughts, attracting new advocates, and making permanent and secure communications with other people.</p> <p>TikTok is considered one of the most recent and famous social media applications. It is used by some terrorist and extremist groups in many countries around the world. This creates security challenges and threatens social and moral values. Therefore, it is important to record all security, community, and moral challenges in terms the highly increasing number of this application users in the Arab region.&nbsp;&nbsp;</p> <p>In this regard, ADL Center on Extremism indicates that extremists utilize TikTok for sharing contents that promote hatred and recruit advocates and new members. They adopt some techniques for conveying their messages through videos which they share, such as adding connotations on screens, directing followers to an external content through links outside of TikTok application, highlighting signs or books for expressing their viewpoints during playback of videos, and using hashtags for increasing their audience.&nbsp;&nbsp;&nbsp;</p> <p>It is known that TikTok attracts an increasing number of users, most of them are youth and teenagers, in the Arab region. Factors of this attraction may be summarized as follow:</p> <ul> <li>Rich, diverse, and attractive content of TikTok</li> <li>Effective role of TikTok in supporting personal expression of youth and teenagers through short videos</li> <li>Youth ability to create big and extended social networks of followers via TikTok.</li> </ul> <p>However, excessive usage of TikTok may subject its users to social risks that create threats affecting both personal security and community security, in addition to security challenges associated with national security of Arab countries.</p> <p>From the abovementioned, we can summarize the theme and research problem of the report as follow:</p> <ul> <li>Exploring security challenges and social and moral risks associated with TikTok usage in Arab world countries.</li> <li>Identifying the most optimal policies for dealing with challenges originating from TikTok.</li> </ul> <p>&nbsp;</p> <p><strong>Report Objectives and Approach</strong></p> <p>We can highlight the report theme in some questions that need to be answered by the report. These questions are as follow:</p> <p>- What are security challenges associated with using TikTok by some terrorist groups in the Arab region?</p> <p>- What are social and moral risks associated with using TikTok?</p> <p>- What are the optimal policies for encountering security challenges and dealing with social and moral risks associated with using TikTok in the Arab region?</p> <p>The report adopts the integration approach that combines some suitable methods and tools. It is considered an explorative report on the nature and dimensions of the report theme. The most important methods adopted by the report can be indicated as follow:&nbsp;</p> <ul> <li>Secondary Data Analysis Method: This method is applied on some relevant studies and reports to identify the most critical social and moral risks that represent challenges for community security of our Arab societies.</li> <li>Qualitative Analysis of Content: This method is applied on a purposive sample of videos that include hate and violence speeches or are disseminated by some members of terrorist and extremist groups. It monitors disseminated speeches and thoughts and focuses on techniques that are utilized on TikTok. Moreover, this method is supported with videography methodology by linking standard analysis with interpretative analysis of videos. Analysis of videos is made on two levels: the most linked, and the most liked. Accordingly, each keyword incudes 20 videos that are analyzed into many categories such as: <ul> <li>Secondary topics</li> <li>Persuasive methods</li> <li>Interaction level</li> <li>Account type</li> </ul> </li> </ul> <p>Concerning reference of the analysis process, the analysis depends on two patterns: the first pattern one is associated with rational persuasion while the second one is associated with emotional persuasion.&nbsp;</p> <p><strong>Report Findings and Recommendations</strong></p> <p>The report findings affirm that TikTok has been the most growing application during the recent period. TikTok attracts a big number of people who are more than one billion active users around the world and most of them are teenagers and young youth. Recently, an increasing activity of extremist groups and terrorist organizations has been noticed on TikTok. This increasing activity of these groups and organizations is not apparent to most users of application. The report indicates that there is an activity of terrorist and extremist organizations and some of their members in the Arab region on TikTok. This can be recognized by the big number of videos, images, and indications that promote terrorism and violence and disseminate hate speeches, fake news, and disinformation in a manner that creates direct and indirect threats on national security of Arab countries. Although these threats may also originate from other social media applications, they become more dangerous on TikTok which includes distinctive features that make such threats more disturbing for security agencies. Moreover, most users of TikTok application are young people who are credulous when dealing with any content violating security measures. The following points summarizes the most critical security challenges that are highlighted by the report:&nbsp;&nbsp;&nbsp;</p> <ul> <li>Excessive usage of TikTok results in many challenges that negatively affect community security and its basic elements in the Arb region. TikTok videos that promote traditions and customs that are not suitable to Arab values may lead to some moral deviations and crimes. This may cause a medium-range moral weakness on two aspects: the first aspect represented by deviation forms shown by videos on TikTok, while the second one is related to negative impacts of immoral content of TikTok videos. This may lead to social fragmentation, distancing, and isolation.</li> <li>TikTok usage is associated with the gradual appearance of depression and behavioral disorders symptoms among teenagers. According to a research study, some videos on TikTok (like dangerous challenge videos) may promote Non-Suicidal Self Injury (NSSI) and lead to loss of appetite among some TikTok users. These consequences originate in terms of the increasing number of TikTok users who tend to imitate some practices which are published via TikTok videos.</li> <li>Regarding security challenges resulting from TikTok usage, they are represented by growing concerns about privacy, security, and application permissions. In this context, the privacy policy of TikTok application explicitly states that: “TikTok application may share user’s data with our parent company, affiliate, or other companies in the same group as TikTok”. There are also security concerns regarding amount of information and personal data collected by the application through its permissions. In case the collected data belong to users who work at security or military agencies, they will be sensitive information that has a serious effect on national security of countries.</li> <li>Increasing usage of TikTok application creates challenges on national security of countries. TikTok publishes contents that disseminate misleading information about some events associated with the Arab countries in a manner that threatens their national security.</li> <li>Security challenges are also represented in the increasing activity of some terrorist and violent organizations and their members on TikTok. They can utilize all TikTok features for disseminating a content promoting violence, hatred, and terrorism and may displease some users regarding some events that occur in their countries.</li> <li>In addition to the abovementioned points, TikTok includes some advantages that may be employed for strengthening national and community security and promoting loyalty values among Arab youth. Accordingly, Arab official institutions, whether they are security or non-security entities, should create TikTok accounts to deliver objective and moderate speech that encounters any content disseminating fake news and disinformation that negatively affect national security of countries.</li> </ul> <p>According to the report findings that have been obtained by reviewing studies and reports on TikTok, exploring most important international practices that are applied to encounter security risks and challenges associated with social media in general and with TikTok in particular, and examining updates approved by TikTok regarding community guidelines, we can indicate some relevant recommendations as follow:&nbsp;&nbsp;&nbsp;</p> <ul> <li>Concerned Arab governmental institutions (such as Arab ministries of communications and interior and the Arab Interior Ministers Council (AIMC)) should seek to take regulatory measures that start with enacting public laws and regulations and setting self-regulation frames on the Arab level. Accordingly, activities on social media applications, such as TikTok, may be controlled and regulated.</li> <li>AIMC should coordinate with owners of social media applications or with their regional offices in the middle east to set Arab code of practice, like EU code of practice, on disinformation and immoral content. This code will assist in regulating all social media platforms to take their community responsibilities. It will also motivate owners of social media applications to make efforts for encountering dissemination of any content that affects or threatens national or community security of Arab countries. Subsequently, a more transparent, safer, and reliable digital environment can be created. The code of practice will also seek to set procedures that can be taken for addressing security challenges associated with immoral content, disinformation, and dissemination of hate and violence speeches. The proposed main objectives and obligations of code of practice may demonstrated be as follow: <ul> <li>Policies for preventing dissemination of immoral contents, misleading information, or extremism and violence speeches should be included in the proposed Arab code of practices. They should state punishments for preventing any user who makes or promotes immoral or misleading contents from advertising revenues.</li> <li>TikTok algorithms should be enhanced to monitor any content that violates public morals, disseminates fake news and disinformation, or threatens national security of countries. Although TikTok developed its policies and removed millions of videos, a huge number of non-suitable videos, particularly those in Arabic language, still exists on the application.</li> <li>TikTok advertising content should be monitored in a better way to reduce revenues gained by immoral content creators and misleading information providers.</li> <li>Transparency and accountability policies should be developed to improve integrity of TikTok services.</li> <li>A mechanism should be set for ensure commitment to and implementation of code of practice objectives.</li> </ul> </li> </ul> <p>Arab government and security institutions should pay attention to set rules for regulating their affiliates usage of TikTok and other similar applications. In this regard, the report suggests two main types of policies as follow:&nbsp;&nbsp;</p> <ul> <li>Acceptable Use Policies: Each institution can set clear policies for categorizing applications into permissible and forbidden applications and obligating its affiliates to follow these policies.</li> </ul> <p>- Encryption Policies: It is important for each government or security institution to follow a policy that prevents storing important and secret data on non-encrypted devices or making videos about or inside institution without a security permission.</p> Walid Rashad Zaky, Khaled Kazem Aboudouh, Heba Atef Labib (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/221 Wed, 23 Nov 2022 00:00:00 +0300 Towards an Integrative Relationship between Security and Media Agencies in light of Contemporary Security Challenges https://nup.nauss.edu.sa/index.php/sr/catalog/book/215 <p>The relationship between the Security and Media Agencies has been a significant focus on crystallizing the societal expectation of government agencies, especially with the contemporary security challenges and rapid technological development, and this relationship has varied between divergence and convergence within interests that may seem conflicting between them, but it was never a complementary relationship. Therefore, this report raised a significant question - in an attempt to solve this problem - guaranteeing how the relationship between the security agencies and the media agencies can be integrative. Can some policies ensure the implementation of programs and projects to frame this relationship? The. The answer to this question required defining the connection Between the two agencies from the perspective of each of them, and the available options were discussed from two aspects. The first is the role of the media in enhancing security considering contemporary security challenges, and the second is the electronic boom of modern media and its repercussions on security services. Then the report presented a proposal for an integrative policy between media and security that includes strategic projects and programs. The report concluded with a set of recommendations, the most prominent of which is the holding of a series of periodic scientific forums that bring together workers in the security services and the media to support the knowledge and skills related to the security media to reach an integrative relationship between the media and the security services considering the contemporary security challenges. The executive report focused on the integration phase’s link to a clear institutional role for the media and security services that depends on partners at home and abroad and capacity building. This requires reformulating the media policy and related media regulations and legislation, building a media strategy governed by a media work protocol, and then developing practices according to organizational determinants., professional, valuable, and technical.</p> Mamdooh Abdelhameed Abdelmottlep, Abdulrahman Bin Nami Almutairi, Talal Mufrej Almutairi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/215 Wed, 16 Nov 2022 00:00:00 +0300 Risk Assessment Measures of Inmates in Penal and Correctional Institutions https://nup.nauss.edu.sa/index.php/sr/catalog/book/225 <p>Increasing criminal danger among inmates of correctional institutions and mental health institutions has become a threat to the public safety of society, and the safety of inmates and workers in these institutions. This situation prompted the criminal justice system to take measures to assess inmates and determine the extent of the risk, their behavior might pose to others, and to take the necessary measures to prevent this risk. The assessment was initially based on the personal experience of judges and prison officers, but it was not accurate. Accurate assessment of criminal risk requires the use of scales and measures that are valid, reliable, and able to predict their occurrence during a certain period. Over the last four decades, more than 150 risk assessment measures have emerged. This report provides an overview of the current state of these scales and reviews the most used scales for assessing and predicting the risk of violence among inmates of penal and correctional institutions. The report shows the emergence and development of criminal risk assessment measures and their types since the end of the 1920s, to the growing research movement in the 1980s. Several measures of assessment of dangerousness have emerged in the arena, which have been classified into four basic models, arranged according to their historical development, namely: First: the clinical model, that relies on the professional experience of judges, correctional officers and health practitioners in the risk assessment of violence. Due to the dependence of this method on personal experience in the absence of objective criteria, studies have confirmed that its evaluation does not exceed the probability of chance. Second: The statistical actuarial model, which came because of the criticism of the previous model, assumes that past behavior is an indicator of predicting future behavior and uses statistical algorithms to predict the risk of violence through the historical information of the individual. One of the shortcomings of this method is that it suffices with historical factors and does not consider the current dynamic factors in risk assessment. Third: The structured professional judgment model, which tries to avoid the defects of the two previous models, as it combines the historical and clinical factors that are associated with crime, along with the assessment of experts and health practitioners. Fourth: the integrating model that focuses on monitoring of individuals with risk management, which aims to maximize the benefits of treatment and rehabilitation for inmates to reduce criminal risk. The report also presents instructions about, the application of structured methods for assessing risk of violence, and how to design a scale to assess the risks of violence among inmates of penal institutions in the Arab countries.</p> Abdulhafiz Maqdam, Abdulaziz BinHussein (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/225 Wed, 09 Nov 2022 00:00:00 +0300 The Association of Drug Addiction Rates and Societal Security in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/219 <p>The report aims to identify the nexus between drug abuse and the societal dimensions of security in the Arab countries. as Drug use and substance use disorders (SUDs) have become one of the most serious global problems, a major behavioral problem that threats our contemporary societies. This problem affects millions of Arabs and imposes enormous costs on mental, psychological and physical health and also on our economy and security.</p> <p>The report also aims to identify the most important strategies s to combat and prevent the drug problem and its repercussions on societal security. And to present a future work vision that focuses on the dimension of drug demand reduction regarding the societal dimensions of Arab security, as well as the sustainable development goals.</p> <p>The report described defining the nexus between drug addiction rates and societal dimensions of security and reciprocity of influence and its confrontation challenges in the Arab countries, as the report refers to the following main results:</p> <p>- threats to human security; Which plays an influential role in the deterioration of the security situation within the community represent The same vulnerability factors that increase an individual's risk of falling into drug problem. Both dilemmatic phenomenons are in their origin a result of similar and common factors, and they are the product of overlapping fragility factors.</p> <p>-&nbsp; The phenomenon of drug abuse and addiction is intertwined with the societal dimensions of security in the Arab countries on the one hand, and the factors of threat and vulnerability on the other hand, in a self-reinforcing cycle whose components reproduce each other.</p> <p>- &nbsp;The problem of drug abuse and addiction reproduces more negative phenomena that exacerbate the deterioration of the human security situation in the Arab society, such as crime, societal violence and the low level of quality of life for people who suffer from drug abuse disorders and all aspects of society.</p> <p>At the end, the report concludes specific recommendations to draw the features of an integrated Pan- Arab plan of drug demand reduction and to enhance human security in the Arab countries.</p> <p>The report stresses the need for comprehensive and unified interventional efforts that include prevention, treatment and rehabilitation in all Arab societies to deal with drug problems, crime, violence, and everything that disturbs and threatens human security. &nbsp;</p> Amr Osman, Abdelsalam Sharaf, Wadih Maalouf , Shahla Eltayeb (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/219 Wed, 12 Oct 2022 00:00:00 +0300 Security Repercussions of Asylum in the Arab Region https://nup.nauss.edu.sa/index.php/sr/catalog/book/220 <p>This report aims to study the repercussions of the refugee crisis in the Arab Region by carefully examining Jordan, Lebanon, and Egypt as cases of study. In doing so, it analyzes the international and national databases by casting light on the condition of refugees worldwide starting from 2010. It then moves to examine the condition of refugees in Jordan, Lebanon, and Egypt as well as the security repercussions and recommendations that should be taken into account by the decision-makers and executive officials when addressing the security problems resulting from the refugee. The results are interpreted in the light of a new concept used for the first time in closely related reports, which is the concept of integrative human security, it is considered an amendment to the concept of human security adopted by the United Nations in 1994, by making all components of achieving human security linked to each other by the integrative circumstance.</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The report reaches the following conclusions: There is a significant increase in refugee rates in the world, while the United Nations High Commissioner for Refugees has extended its protection only to a third of the refugees in the world. The Arab Region has truly faced big challenges related to refugees from the very beginning of the Palestinian refugee crisis in 1948 until the Syrian refugee crisis in 2011. It is actually considered one of those regions of the world that are influenced much by refugees along with all its security repercussions. The report also concluded that state institutions in Jordan, Lebanon, and Egypt face immense pressures due to such situations, stressing meanwhile that the condition of both Lebanon and Jordan, in order, is more critical than that of Egypt, and all the response plans to the refugee crisis, which is being implemented in the three countries in collaboration with the UN agencies, donors, and NGOs, come to their end without the third-party organizations meeting their total obligations.&nbsp;</p> <p>The report came up with a number of recommendations, as follows:</p> <p>(1) The necessity of coordinating Arab efforts - under the auspices of the League of Arab States - in order to develop strategies and design plans that urge the international community to fulfill its obligations, and to provide the necessary support for the three Arab countries, stressing meanwhile on the importance of supporting the hosting local communities as well as giving hand to the refugees gatherings therein; (2) establishing a joint database on the demographic code-relating characteristics of all the registered/unregistered refugees in the hosting Arab countries; (3) establishing an academic center to study the future of the refugee situations in the Arab region, with its mission be restricted to be thinking of the expected scenarios on the refugee phenomenon in the countries of origin, transit countries and countries of destination, and to innovate solutions for the unexpected and unintentional consequences of refugee; (4) developing Arab mechanisms for the protection of internally displaced persons under the auspices of the League of Arab States and in cooperation with closely related international institutions. Its function is to achieve integrative human security for those fleeing violence, conflict, or natural disasters, to establish safe and appropriate camps within troubled countries, and to reduce the phenomenon of asylum.; (5) The necessity of building and strengthening trust between refugees, citizens, and the institutions of the host countries, and confronting all forms of violence, stigmatization, and provocation against the refugees; (6) Investing the capabilities of refugees in development projects and enhancing economic and social security, especially in cases of refugee protracted, to provide job opportunities for refugees and citizens, which enhances economic and social security in general, leads to a decrease in poverty and unemployment rates, and increases the ability of individuals or groups to cover their basic needs in a sustainable manner and with dignity; (7) Facilitating the registration of refugees after coding and enhancing existential security in coordination with the UNHCR; (8) Humanitarian response to requests for reunification of displaced families in more than one host country; and (9) Enhancing cognitive and existential security for refugees and citizens of host countries.&nbsp;</p> Ahmed Mousa Badawi, Sahar Aref Mukhaymar, Dolly Kamal El-Sarraf, Ibrahim Seif Menshawi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/220 Thu, 29 Sep 2022 00:00:00 +0300 The Role of Financial Institutions In Reducing Money Laundering Offences https://nup.nauss.edu.sa/index.php/sr/catalog/book/63 <p>This report covers the definition of money laundering operations at the level of international organizations as well as international and Arab conventions and treaties. It also sheds light on the role and efforts that financial institutions play in curbing money laundering crimes in the Arab world, and it highlights Arab efforts in enhancing the effectiveness of the regulatory and legislative framework for combating money laundering. This report relied on various documents and sources to cover Arab efforts and initiatives in combating money laundering and analyzing the compliance of FATF requirements. The report proposes several recommendations to enhance the maturity of anti-money laundering programs</p> Abdulrahman Alhothaily, Arwa Alrawais, Wael Mohammed Al-Maqoushi (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/63 Wed, 01 Dec 2021 00:00:00 +0300 Criteria for Selecting Candidates of Police Colleges and Academies https://nup.nauss.edu.sa/index.php/sr/catalog/book/62 <p>This report aims to explore the standards and criteria by which persons willing to join police colleges and academies are selected at the local, regional, and international levels. The report adopted two methods, the descriptive analytical method, and the comparative method. In addition, several colleges were chosen, such as police colleges and academies in the United Arab Emirates, Police Academy of Egypt, besides some colleges from other countries, including the United States, Australia, the United Kingdom, Norway, Finland, Canada, Singapore, the Netherlands.<br />The report has drawn several findings, light will be shed on the two most prominent. First, setting standards for the performance rates of the security work is not a temporary process, but rather a continuous process evolving along with the evolution of life and security reality. Second, the selection of persons willing to join police forces and practice security work within the framework of international standards will result in police personnel at the required level of performance and will avert security organization of failed security missions.<br />Police colleges and academies, under study, attached great importance to the development of training to be in par with the volume of challenges and threats posed in the security realm, on the one hand, and to raise the performance of police forces to international standards in confrontation operations, on the other hand, given that training is the primary means of developing the human factor in the security field. Moreover, security colleges undertake to establish partnerships and collaborations with stakeholders in other police training institutions in several countries, as well as with competent police authorities, with the aim of transferring training and knowledge. Furthermore, several police colleges are keen to provide persons nominated to join them with training on “International Civil Crisis Management”.</p> <p> </p> Mohammed Khamees Alothmani, Elsayed Helmy Elwazzan, Adnan Mohammad Aldhmour (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/62 Fri, 01 Oct 2021 00:00:00 +0300 Prevention of Crises and Disasters in Arab Crisis Centers https://nup.nauss.edu.sa/index.php/sr/catalog/book/61 <p>Arab institutions dealing with crises and disasters give great importance to improve their performance, including establishing crisis management centers, which enable them to prevent threats and mitigate their impacts. This study aimed to assess crisis and disaster management centers in Arab institutions, and how these centers help prevent threats and disasters. As well as, how these centers can gain from the best international practices. Finally, sharing visions and recommendations on how to establish advance crisis management centers in Arab countries. According to the best international practices, some countries established centers for crisis management; on the other hand, some other countries still implement emergency plans approach to deal with crises. The study used descriptive analytical method and comparative critical analysis. The most important findings and recommendations of the study were: The necessity of establishing or developing a national center for crisis and disaster management - as independent organization - at the national level, as well as centers in other government sectors. Indeed, the center will help prevent threats and disasters, or mitigate their damage. The importance of structuring crisis centers in a modern way to focus on their core functions to include the following departments: Monitoring and Forecasting; analysis; IT and Communications; Coordination; in addition to other departments such as: logistical support, public relations, community participation, etc. Moreover, the centers require continuous updating of technological and technical equipment. Also, supporting the centers with qualified human resources, under continuous training programs. Moreover, the centers should have well developed plans to be implemented during crisis for both the national level and other government sectors. In addition, the need to review these plans periodically, and update them annually depending on new situations. Furthermore, regional and international coordination must be enhanced, particularly when the state's resources are unable to meet the requirements of the crisis. Finally, the study recommended the establishment of an Arab Center for Crisis and Disaster Management at the level of Arab Interior Ministries</p> Abdulkarim H. Aldekhayel , Abdelalim Mohamed Abboud, Mamdooh Abdelhameed Abdelmottlep (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/61 Wed, 01 Sep 2021 00:00:00 +0300 The Role of Financial Institutions in Reducing Online Financial crimes https://nup.nauss.edu.sa/index.php/sr/catalog/book/60 <p style="direction: ltr;">This study focused on the causes of the increasing problem of online financial fraud in the Arab States and on the understanding of successful international best practices for dealing with such crimes, improving response procedures, and contributing to their reduction. The study makes recommendations and proposals that have been discussed with international practitioners, specialists, and experts at the regional and international levels.</p> <p style="direction: ltr;">The data for this study were collected through two groups: AFocus Group was formed to obtain data from private sources through Arab practitioners and specialists to identify types of financial fraud offences and to identify the challenges faced by stakeholders in dealing with those offences, especially the challenge of lack of data on such crimes in public sources. Another group that constituted a team from Naif Arab University for Security Sciences (NAUSS), was formed to obtain data from open sources to identify the criminal methods of fraudulent sites and the challenges facing security agencies in dealing with them. The team, in cooperation with the Interpol, collected about 500 links to fraudulent advertisements (Ads), and further discussed and analyzed study cases of some victims of financial fraud and fraudsters running fraudulent websites.</p> <p style="direction: ltr;">During a meeting of the focus group, most common financial fraud offences in the Arab States were identified as follows: investment fraud, romance scams, sextortion, phishing, smishing and business e-mail compromise (BEC). The use of 24 criminal methods to commit such crimes has been identified in the Arab States, including the use of reliable websites to publish fraudulent ads (phishing attacks), the introduction of cryptocurrencies to try to hide the tracking and tracing of proceeds of crime outside the borders of the State., A number of false</p> <p style="direction: ltr;">Saudi government apps in the Google Store have been also spotted. These apps were portraying as "Farjat," "Jude" and "Absher" platforms, some of which were accessed up to 14,000 times. It also identified 22 challenges facing law enforcement, prosecutors, and banks in dealing with financial fraud, the most important of which were slow exchange of data and access to approvals, tracing and recovery of assets/funds, and failure of victims to report.</p> Abdulrazaq Al-Morjan, Kyounggon Kim, Amir Osman, Sundaresan Ramachandran, Alexander Resch, George Spir, Nabih Nada (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/60 Thu, 01 Jul 2021 00:00:00 +0300 Environmental Risks in Educational Institutions https://nup.nauss.edu.sa/index.php/sr/catalog/book/59 <p>This study focuses on monitoring environmental risks in educational institutions. Environmental risks are now more important than ever for people, communities and states in view of the challenges and threats they pose. The aim of the study is to monitor existing or potential environmental risks in several educational institutions, to identify the importance of preparedness and readiness strategies to combat and prevent environmental risks, and to try to develop a model for protecting educational institutions from such threats.<br />The study was based on the combination of the analytical curriculum, Social Survey, and the monitoring of environmental risks was done through the questionnaire, which was applied to 163 schools in four Arab states (Egypt, Jordan, Saudi Arabia and Sudan).<br />The results of the study distinguished three levels of existing or potential risks in educational institutions:<br />- Most frequent environmental risks: high temperatures within classrooms and school buildings, power outages from school facilities, and total or partial disruption of drinking water supplies.<br />- Least environmental risks: The indoor air of the school is exposed to some pollutants, the prevalence of school infectious disease and the contamination of drinking water.<br />- Rare environmental risks: The school was exposed to the risks of floods, floods and earthquakes, a fire in a building and a chemical leak from school's labs.</p> <p>The study recommended the need to develop a program for the prevention and control of environmental risks, and in this context, a proposal was developed for this program, which is considered a main recommendation for the study, and serves as a holistic and comprehensive strategy, applicable in educational institutions.</p> Khaled Abu Douh , Ayad AlShammari, Ibtihal Al-Talhi (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/59 Sat, 01 May 2021 00:00:00 +0300 Arab Environmental policies and Its Role in Achieving the Environmental Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/58 <p>This report deals with Arab environmental policies and their role in achieving environmental security, while presenting the main environmental challenges within the framework of the prevailing concepts and considerations, especially after the politicization of environmental issues in the international relations. The objectives of this study revolve around assessing the environmental policies in the Arab Region, presenting the vision and necessary recommendations to achieve the regional environmental security. Since environmental issues in the Arab world cannot be evaluated in a strictly Arabic context, the Middle Eastern and global context have been addressed whenever possible with regard to urgent issues such as water scarcity, environmental degradation, climate change, energy, biodiversity, food security, poverty and unemployment, health and epidemics, pollution, tourism, cyber security, and other pressing environmental issues. In the past, the Arab countries viewed the environmental issues as not priority matters compared to other issues related to the state sovereignty and political stability. Currently, environmental issues in the Arab world are gaining strong interest political support within the frameworks of the Middle East and its relations with</p> <p>neighboring countries and the world. Arab countries need to amend their environmental model towards integrating environmental issues into their comprehensive national security strategy.</p> <p>The study resulted in a number of general and sectorial recommendations, with a future vision in support of comprehensive, i.e., traditional and environmental security, as well as national and regional sovereignty. The proposed policies and recommendations cover various aspects, including environmental institutions, ecological footprint and development, environmental legislation, education and scientific research, investment in the environment and sustainable trade, communication and media.</p> Ahmad K. Hegazy, Ali El-Keblawy , El-Mostafa Darfaou (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/58 Mon, 01 Mar 2021 00:00:00 +0300 Security Concepts within Educational Levels in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/57 <p>The current report aims to address the directions issued by the Arab Interior Ministers Council, to develop a matrix of incorporating the security culture within educational levels in the Arab countries. Security culture is an integral part of the educational mission which can be carried out through a set of curricular and extra-curricular activities and ultimately aim at strengthening both individual and social security.<br />The most common security threats that faces Arab school and students have been identified and distributed to four school stages. These Security concepts were framed within three areas; Personal Security, school Security, and social Security.<br />Adopting Delphi method, the security concepts were sent to a group of experts in the Arab World as matrix with scope and learning outcomes distributed by age groups. Depending on the recommendations of the referees, some concepts were ruled out. The concepts were also distributed to focus groups of teachers, supervisors, and students in order to have a deeper understanding in constructing the matrix. Accordingly, (70) concepts of security culture were identified.<br />To align the theoretical aspect with the practical one, a comprehensive matrix of security concepts has been constructed. Each concept has been assigned to an objective and learning outcomes that suit developmental characteristics of each stage. A set of inclusion techniques were suggested, and they range from total integration, in line with the process of curricula development, to integrating them by allocating spaces to properly include phrases or activities under each lesson.<br />The report concludes with several recommendations:<br />- Develop a comprehensive approach on security education (security and the future) to face security challenges, conflicts, and the youth concerns.<br />- Developing an e-application (security culture) that provides protection skills and seeking security assistance for children or / and adolescents.</p> Zaid Aladwan , Shahla Eltayeb , Ziad Alobeisat (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/57 Mon, 01 Feb 2021 00:00:00 +0300 Using Artificial Intelligence to Enhance Traffic Safety in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/64 <p>This study aimed to identify the current status of adopting artificial intelligence to enhance traffic safety in Arab countries. It aims also to identify the main areas in which artificial intelligence was implemented, the present uses of artificial intelligence in traffic safety and the challenges that adversely affect the adoption of artificial intelligence in the road traffic field. The study also aimed to determine the potential impacts of artificial intelligence in reducing road traffic accidents and the global practices in the adoption of artificial intelligence in road traffic issues. To achieve these goals, the documentary descriptive approach and the descriptive survey methods were used. A questionnaire survey was used as a tool. It was designed, and responses were received from only 8 Arabian countries: Saudi Arabia, Yemen, United Arab Emirates, Kuwait, Jordan, Palestine, Tunisia and Mauritania. The results indicated the limited use of Arab countries for artificial intelligence systems in road traffic managements. The emergency vehicle management systems were used in Arab countries with a mean (1.89± 0.05), and highway management systems was used with a mean (1.78± 0.83), while truck management systems are not available. Traffic priority systems for public transport vehicles and traffic accident prediction systems, indicating that the current situation of artificial intelligence adoption in road traffic management is still primitive.</p> <p>Artificial intelligence, therefore, can address road traffic problems in the areas of traffic management, traffic safety, public transport, and urban mobility. To accomplish this, the concerned authorities in Arab countries must set their priorities for the application of the needed artificial intelligence systems, by dealing with frameworks regulatory obstacles that set barriers against the adoption of emerging technologies in the areas of road traffic, providing secure databases for digital data that relate to artificial intelligence systems, providing opportunities for the private sector to participate in the development of the highly needed infrastructure for the applications of artificial intelligence systems through privatization, and they must keep pace with the rapid development in modern technologies.</p> Ali bin Debian Al-Rashidi, Osman Ahmed Eltaher, Sherif Shukry Abed Rabbo, Mohammed Saeed Al-Qahtani (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/64 Fri, 01 Jan 2021 00:00:00 +0300 Alternative Sanctions to Custodial Sanctions for Drug Addicts https://nup.nauss.edu.sa/index.php/sr/catalog/book/39 <p>This study seeks to find suggestions for alternatives to custodial sanctions commensurate with the situation of drug addicts inside prisons. The study aimed to identify the negative impacts of the custodial sanctions for drug addicts, and to identify suggestions for alternatives to custodial sanctions commensurate with the special situation of drug addicts, and to explore the obstacles that hinder the application of custodial sanctions for drug addicts. The researcher used the analytical descriptive method in conducting this study. As for the study tool, the researcher conducted an in-depth interview with sociologists and psychologists working in Riyadh prison. The study concluded with numerous findings, the most prominent of which are: the most negative effects of prisons are: recognizing the most dangerous types of drugs, and the familiarization with criminals, in addition to social stigma and the spread of infectious diseases due to weak immunity among drug addicts and the overcrowding of prisons, etc. Moreover, the study identified the most appropriate alternative sanctions for drug addicts as: community service and electronic surveillance, in addition to judicial probation, suspension of punishment, parole and financial penalty in specific situations provided taking into consideration the income of the addict. The study identified the obstacles to the application of alternative sanctions as: the absence of judicial legislation stipulating the alternative sanction, lack of convenience for some judges of the usefulness of the alternative sanctions, the shortage in specialized staff, and lack of clarity of the entity assigned to monitor the application of alternative sanctions. The study offered some recommendations, the most prominent of which are: an independent authority specialized in alternative sanctions for drug addicts should be established to deal with addicts in terms of diagnosis, supervision, follow up and coordination with other competent authorities before and after the sentencing, such as: the Ministry of Justice, the General Directorate of Narcotics Control, the Ministry of Interior, the Ministry of Human Resources and Social Development to follow up the addict’s situation during and after recovery. Moreover, the study recommended to enact judicial legislation to enable judges to rule for compulsory addiction treatment and to apply appropriate alternative sanctions or consider the treatment as a sentence. Also, the study recommended benefiting from modern technology in applying electronic control sentence to save time and effort, and to recruit distinguished specialized staff in areas related to alternative sanctions such as doctors, sociologists, psychologists, and others.</p> <p>Keywords: Custodial Sanctions, Alternative Sanctions, Drug Addicts, International Experiences, Labeling Theory.</p> Aiyad Alshammari (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/39 Tue, 01 Sep 2020 00:00:00 +0300 Drug Control in Public Education Environments https://nup.nauss.edu.sa/index.php/sr/catalog/book/40 <p>The phenomenon of drug abuse has become one of the most dangerous social problems facing all nations of the world, due to the health, social and economic harms caused by this phenomenon. In spite of the efforts rendered to confront this phenomenon, it continues to increase. The latest study conducted by the United Nations Office on Drugs and Crime (UNODC) in 2017 on global drug abuse revealed that about 250 million people which constitutes about 5% of the world's adult population at least used drugs in 2015. Even more seriously, 30 million of them began to suffer from mental disorders as a result of their drug use. Moreover, the spread of drug abuse among adolescents and youth has led to the mounting of this phenomenon, which necessitates the need to pay attention on how to combat and prevent drugs. This role can be played by multiple institutions of society, especially general education institutions that can have an effective and important role in drug control and prevention by focusing on the preventive aspect. Based on the foregoing, this study attempts to identify the scientific and procedural measures, procedures, and methods that may contribute to drug control and prevention in general education environment.</p> <p>&nbsp;</p> Menawer Alanzi (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/40 Sat, 01 Aug 2020 00:00:00 +0300 Economic factors and their impact in countering terrorism https://nup.nauss.edu.sa/index.php/sr/catalog/book/38 <p>The study has dealt with economic aspects of terrorism in Arab countries. It has focused on three main questions, namely: what are the economic determinants of terrorism, if any? What are the economic costs of terrorism? And what are the economic costs of terrorism combating policies? Due to paucity of data on terrorism in general and on its economic aspects in specific, the study has depended mainly on the analyzing the economic related data on terrorism in available international databases, while using comparative analysis for existing information on other countries affected by terrorism. The study reached the following conclusions: The Arab region is the most affected region in the world by terrorism. The economic variables, as poverty rate, GDP per capita, and education do not seem to play a major role in determining terrorism in the region. Yet, the worsening economic conditions play a role in enhancing terrorism. Moreover, the economic costs of terrorism in the region are exceptionally high. The most affected countries suffer costs ranging between 1to 24% of GDP which is exceptionally high. In addition, there are other non-calculated hidden costs in terms of changing the behavior of people and deterring flows of foreign capital. The costs of combating terrorism are high and despite the fact that in theory there might be means of reducing costs by choosing economic means to combat terrorism in practice such choice is difficult to follow.</p> Ahmed Ghoneim (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/38 Wed, 15 Jul 2020 00:00:00 +0300 Industrial safety and security https://nup.nauss.edu.sa/index.php/sr/catalog/book/20 <p>This study aimed to define the contemporary and renewable concept of industrial safety and security and areas of application, and to identify the general rules for industrial safety and industrial security in general, and the industrial hazards and work injuries in addition to the required protection and prevention in particular.<br />Methodology: The study used the analytical method for the industrial security system.<br />Findings: Industrial security should be viewed from a different angle than industrial safety, as to be viewed in a contemporary concept, whereas its rules differ from industrial safety rules. This is due to the fact that industrial security rules require that it should be viewed in its comprehensive sense in order to accommodate all the regulations and instructions pertinent to the four traditional fields which are: safety, firefighting, preserving environmental safety, and security.<br />Recommendations:<br />• To conduct training courses in competent institutions which modern industries can create in human life, and this should be related to the nature of each individual industry as the specific dangers are more related to the nature of industries.<br />• The owners of industrial facilities, along with state control, should allocate more technical and material attention to protect workers in industrial facilities from the dangers of multiple industrial professions and to undertake full medical assistance to face these dangers.<br />• Authorities in the areas of nuclear installations should provide adequate safeguards to secure the reactors from the causes of nuclear leak. This action should be performed under international control.<br />• Multi-site industries should be grouped together in an industrial city away from residential areas, especially the nuclear industries.<br />• Reliance should be on safe and environmentally friendly energy source technologies.<br />• The industrial safety and security course should be incorporated in the curriculum at the appropriate educational stage and also in specialized technical studies.</p> Abaas Abo shama (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/20 Wed, 01 Jul 2020 00:00:00 +0300 A Proposed Program for Protecting Youth from Intellectual Deviation in the Cooperation Council for the Arab States of the Gulf https://nup.nauss.edu.sa/index.php/sr/catalog/book/30 <p>This study aims to identify the measures taken by the countries of the Gulf Cooperation Council in the face of intellectual deviation among youth. The target is to reveal the causes of intellectual deviation among young people in the countries of the Gulf Cooperation Council (GCC) and to develop a proposed program to immunize the youth from intellectual deviation in the GCC countries.</p> <p>The researcher applies the descriptive and analytical method in this study, and the study tool used is the questionnaire. The study population consists of all young citizens in the countries of the Gulf Cooperation Council, and the sample is stratified random.</p> <p>This study reaches a set of results, including the following:</p> <ul> <li>Economic measures are the most common measures taken by GCC countries to confront the intellectual deviation among young people. Then come the institutional measures, then the social measures.</li> <li>The media work to criticize and analyze the problem of intellectual deviation and thus contribute to strengthening cohesion within society.</li> <li>The upbringing patterns used by contemporary Gulf families contribute to immunizing their children from intellectual deviation.</li> </ul> <p>Among the recommendations the study makes are the following:</p> <ul> <li>The concerted efforts of state agencies and community institutions in the GCC countries, with the cooperation of individuals and families, to discover early manifestations of intellectual deviation</li> <li>Adopting a promising new vision for sustainable development, and engaging youth in its implementation in the GCC countries.</li> <li>Implementing strategic plans to immunize youth from delinquency, with a community partnership</li> </ul> Samia Maddah, Musa Fateel, Hani Maddah, Muhammad AlKarashi (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/30 Mon, 15 Jun 2020 00:00:00 +0300 Specialized Training in Confronting New Types of Crimes https://nup.nauss.edu.sa/index.php/sr/catalog/book/25 <p>This study deals with specialist training, taking into account that it the best solution to face criminal behaviour related to modern crimes in general and those specifically related to terrorist crimes. This is done by raising the capability level of human resources so that they can face them by using professional means able to respond to and overcome the modern means used to commit a crime.</p> <p><strong>The study sought to fulfil the following aims: </strong></p> <p>- Looking into the specialist training methods that are used to develop the abilities of trainees from the Special Emergency Force in Riyadh to face modern crimes, especially terrorist incidents.</p> <p>- Explaining the statistically significant differences in the opinions among the study subjects, personnel from the Special Emergency Force in Riyadh, according to the following variables: Educational level, rank, number of years experience in this work, and courses completed in this field of work.</p> <p>The study used the descriptive-analytical method that allows the opinions of the study subjects to be surveyed and makes a generalization of the results more possible than by using other academic research methodologies. It also used the comparative method as a means of presenting all the items related to training and crime, as well as new developments in previous studies on Arab and non-Arab systems to compare between points of agreement and disagreement between them and the present study.</p> <p><strong>Some results of the study: </strong></p> <p>- Specialist training courses contribute, to a high degree, to raising the performance capabilities of trainees to face incidents of terrorism</p> <p>- There are significant statistical differences in the responses of the study sample regarding the training methods that are used to develop the specialist skills of trainees to face incidents of terrorism. These differences were also present regarding the degree to which these specialist training courses contribute to raising the performance capabilities of trainees to face terrorist incidents and were attributed to rank and number of years of experience.</p> <p><strong>Some recommendations of the study:</strong></p> <p>- Varying the specialist training methods used to develop the capabilities of trainees from the Special Emergency Force in Riyadh to face modern crimes</p> <p>- The necessity of approving specialist training for trainees based on sound academic methods when defining the training needs according to the methods that are employed to face these crimes.</p> <p>- Working to evaluate the outcomes of training in centres and institutes, after looking into the methods used to define, design, and implement them, to ensure that inputs and processes are specifically related to the actual aims</p> Ali Alreshidi (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/25 Fri, 15 May 2020 00:00:00 +0300 An Arab Strategic Vision for Security Training in the light of Common Challenges and Threats https://nup.nauss.edu.sa/index.php/sr/catalog/book/34 <p>This study focuses on identifying a system for security training in the Arab world, especially in light of the increasing threats and challenges that Arab security services face in the contemporary world. The aim is to enhance the capabilities of members of the security services to realistically confront the problems and challenges that threaten the security of the Arab countries. The study maps out the dangers that security personnel face reveals the development of police functions and roles in most Arab countries, discusses the reality of security training in comparison with international indicators and concludes with proposing a concept for an Arab strategy for security training.</p> <p>The study relies on the methodology of system analysis, and its results confirm the similarity of the actual roles played by the Arab police services, and that the declared roles of the police fall short of dealing with the serious challenges that these agencies should play. Concerning security training, the results of the study confirm that there are many problems associated with it, despite the developments that have occurred to it, and that there is a lack of security centers specialized in future studies in the Arab security field. The study recommends the necessity to establish security training centers, paying attention to prepare trainers specialized in the field of security training, and building a database of experts in this field.</p> Akef Almubaideen (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/34 Fri, 01 May 2020 00:00:00 +0300 Basics of Forensic Entomology https://nup.nauss.edu.sa/index.php/sr/catalog/book/11 <p>The book explores the forensic entomology by indicating its definition, historical background, and applications. It highlights some types of insects, such as Phylum Arthropoda, Crustacea, etc. In addition, the book provides detailed demonstration for flies, and shows their forensic importance and external morphology. The blowfly species in Jeddah city, Kingdom of Saudi Arabia are also described.<br />The book calls for providing a database on the insect types with forensic importance in each geographical region. It indicates that research on lifecycle of insects commonly disseminating in each region should be made. Moreover, it focuses on the necessity of training for forensic evidence technicians to appropriately collect the insect evidence from the death scene</p> Layla Oudah Humaid Al-shareef (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/11 Wed, 01 Apr 2020 00:00:00 +0300 The Rumor Dissemination through Interactive Media and its Effect on National Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/35 <p style="direction: ltr;">Rumors are one of the negative social phenomena that are widespread in societies as well as one of the most dangerous examples of psychological and moral warfare that spread in an atmosphere charged with multiple economic, political and social elements. The present study aims to identify the extent to which the public rely on interactive media as a source of information, and the reasons for the spread of rumors through such media.</p> <p style="direction: ltr;">In its descriptive part, the study relies on the media survey approach, "Delphi method," which includes pre-and post-measurements. The study population is represented by the users of interactive media in all its categories. The sample of the prospective study consists of 31 experts, and the study uses tools to collect data, which include the survey newspaper, and Delphi questionnaires.</p> <p style="direction: ltr;">The results of the study indicate that one of the most important factors affecting the growth and spread of rumors in society is the absence of clear and accurate information and that one of the roles of official bodies is to combat rumors and to issue press releases as soon as rumors appear. This should lead to an increase in the communication of the state apparatus to confront rumors. Experts' opinions differ on the expected routes for the spread of rumors in the case of censoring interactive media so that rumors will inevitably recede as a result of this censorship. Some experts believe that it is difficult to impose official censorship on interactive media, due to its huge content and information flowing momentum.</p> Yosra Abdul-Khaleq, Fatima Az-Zahra Muhammad (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/35 Wed, 01 Apr 2020 00:00:00 +0300 Control and Inspection over the Work of Security Bodies https://nup.nauss.edu.sa/index.php/sr/catalog/book/26 <p style="direction: ltr;">This study seeks to look into the state of monitoring and inspection in security agencies. This has the aim of evaluating its current state and clarifying the role that the job of monitoring and inspection plays in security agencies to limit its negative effects on the level of performance and services. That is because most security agencies provide services to those who deal with them in different sectors, in addition to searching for mechanisms that contribute to limiting the risks that result from mistakes and deviation.</p> <p style="direction: ltr;">This study makes a serious contribution to Arab literature in general and specifically literature from Saudi Arabia. It draws attention to the concept of monitoring and inspection in security agencies as an active and important administrative concept.</p> <p style="direction: ltr;">This study aims to review, analyse, and evaluate the literature on administrative monitoring and inspection and the variables that affect them both. This has the aim of defining the gap in knowledge and presenting proposals for future research and studies that may contribute to reducing or closing this gap.</p> <p style="direction: ltr;"> </p> <p style="direction: ltr;">The study used the descriptive methodology, due to the security-related specificities of all security agencies in Arab countries. The study relied on a review, analysis, and evaluation of published research and studies related to the subject. Besides, it reviews what Arab and non-Arab work has been done and printed in different trusted academic sources.</p> <p style="direction: ltr;">The most important results are as follows:</p> <p style="direction: ltr;">- Security-related monitoring and inspection consolidate the concepts of integrity and transparency and concepts related to stopping the haemorrhage of budgets and combatting personal desires and favouritism.</p> <p style="direction: ltr;">- Granting security organizations the competence to make their strategic plans succeed by stopping crises from happening and maintaining the organization’s assets</p> <p style="direction: ltr;">- Actualizing standards of fairness by ensuring the proper application of regulations, laws, and systems</p> <p style="direction: ltr;">- Defining actual deviations from standards that have been laid down and revealing mistakes early to improve performance</p> <p style="direction: ltr;"><strong>Some recommendations of the study</strong>:</p> <p style="direction: ltr;">- Organizational rules must be laid down to clarify the mechanism of inspection by criminal enforcement officers to guarantee that legal rules are being applied fairly.</p> <p style="direction: ltr;">- Different training courses must be held that increase the efficiency of personnel in monitoring and inspection agencies</p> <p style="direction: ltr;">- Changing the negative image of security-related monitoring and inspection</p> Ziad Almashaqba, Najwa Kashkosha (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/26 Sun, 15 Mar 2020 00:00:00 +0300 The Relationship between Terrorist Crime and Organized Crime https://nup.nauss.edu.sa/index.php/sr/catalog/book/43 <p style="direction: ltr;">This study investigates the factors that would confirm the hypothesis of the possibility of an alliance between terrorism and organized crime, and to research American allegations regarding the organic and functional link between terrorism and organized crime. It also seeks to research the possibility of formulating an integrated strategy with a security and development approach to confront the threat of an alliance between terrorism and organized crime and exploring the true intentions of the foreign initiatives taken in the Sahel region. The researcher applies the descriptive approach to describing terrorism and organized crime and the inductive analytical approach to reveal the factors affecting the studied phenomenon.</p> <p style="direction: ltr;">This study concludes with a set of results, including:</p> <ul> <li style="direction: ltr;">The term ‘terrorism’ suffers from a myriad of definitions due to ideological and intellectual differences.</li> <li style="direction: ltr;">The contribution of international conventions and laws in criminalizing acts that represent common forms of terrorism</li> <li style="direction: ltr;">The dominance of the economic nature over most of the crimes of organized groups due to the use of technology</li> </ul> <p style="direction: ltr;">This study makes a set of recommendations, including:</p> <ul> <li style="direction: ltr;">The need for the institutions of the international community to fulfil their responsibilities in dealing with the causes that lead to terrorism</li> <li style="direction: ltr;">Promoting international cooperation in disrupting networks used by groups in terrorism and crime</li> <li style="direction: ltr;">The need to focus on the development approach, such as improving the level of government services that require poverty reduction in all its dimensions to address one of the most important causes of the spread of terrorism and organized crime</li> </ul> Rogaih Awashriah, Fawzia Othman (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/43 Sun, 01 Mar 2020 00:00:00 +0300 The Psychological Roots of Terrorism https://nup.nauss.edu.sa/index.php/sr/catalog/book/27 <p>This study seeks to analyze the psychological determinants that drive individual terrorist behavior (personality characteristics, thought patterns, disorders). It then seeks to rely on them to produce a suggested proposal for the psychological factors that govern the terrorist personality. This is done to arrive at a more ideal understanding of terrorism. The study also sought to lay down recommendations and visions for ideal ways to deal with this phenomenon that has become the main security challenge that Arab countries have been facing in recent times.</p> <p>This study is important, as there is a dearth in academic research on the psychological roots of terrorism. Despite a large amount of research on other dimensions and their relation to terrorism such as social, political, and economic dimensions, as well as others, the psychological dimension has not been studied enough. The present study attempts to fill this gap in knowledge in this field.</p> <p>The study relies on descriptive methodology. It looks into and analyses the studies on the psychological roots of terrorism that include formation, thought patterns, and characteristics that pave the way for it. These studies were published from 1990-2018. The results of these studies are analyzed by using meta-analysis in an attempt to develop an integrative vision for the psychological determinants of the terrorist personality. This study also conducted several in-depth interviews with a group of experts in the field of psychology and interview content analysis.</p> <p>This study reanalyzed the results of the most important studies carried out in this field. It then relied on the results of the dimensional analysis and the analysis of the content of the in-depth interviews with experts to form the template for a psychological prevention program that is applied to teenagers, who could be more prone to being attracted to terrorist organizations. This program is one of the interventions that can be made by psychology regarding this.</p> Azza Hashem, Ahmed Hanafy (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/27 Sat, 01 Feb 2020 00:00:00 +0300 The Media Theories https://nup.nauss.edu.sa/index.php/sr/catalog/book/47 <p>The book discusses the media theories in the contemporary mass media. These media theories have appeared without prior social thought or theorization for the functions, objectives, and impacts of such theories. The book also shows how the contemporary media theories are valid for understanding what happen in our society because of mass media operations and activities, and explores the developments and changes affecting them. Moreover, it demonstrates that social institutions activities, developments, and changes affect the mass media content. Some theories indicates that it is difficult to depend on only mass media to form an image for the surrounding reality as they sometimes present inaccurate information and side with some parties.</p> Taha Negm (Author) Copyright (c) 2021 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/47 Sat, 01 Feb 2020 00:00:00 +0300 The Economic and Social Effects of Drugs on Human Development in the Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/23 <p>This study aims to identify the social and economic effects of drugs on human development, as well as in the fields of education, health, and income as indicators of development in Arab people. The study is applied to five Arab countries (the study sample), namely: Jordan, Egypt, Kuwait, Lebanon and Morocco.</p> <p>The study attempts to monitor most of what has been produced and researched about the social and economic effects of drugs on the development of people from Arab countries and to analyze it to come up with a set of findings and recommendations at the level of the Arab region that place officials, decision-makers and members of Arab societies facing a great societal responsibility that needs all efforts to limit its destructive effects on human development, especially in the areas of health, education and income. The study uses the descriptive and analytical approach and content analysis that help in making some generalizations and issues related to the effects of drug abuse on human development in its health, educational, social and economic fields in the Arab world.</p> <p>The study has found a set of results, including:</p> <p>- The growing phenomenon of drugs in the Arab world with a significant increase at the level of its abuse, trade and cultivation, in a way that precedes all efforts exerted to reduce it at the official and civil level</p> <p>- The spread of chemical drugs in all Arab countries has significant health and social effects, and that they are very dangerous for mental, psychological and physical health.</p> <p>The study concludes with some recommendations, including:</p> <ul> <li>The necessity to amend the school curricula at the regional level in the Arab world, taking into account the specificities of each country</li> <li>Studying Arab and international models on drug control policies and their impact on the development of Arab people.</li> </ul> <p>• Providing treatment and support programs that contribute to the rehabilitation of addicts and their effective integration into society</p> Afaf Rabee (Author) Copyright (c) 2020 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/23 Wed, 01 Jan 2020 00:00:00 +0300 Contemporary Industrial Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/65 <p>This book identifies the science of industrial security which seeks to reduce incidents in the industrial field to the minimum level, and to reduce the costs of injuries caused by incidents which are of direct relation to work incidents.</p> <p>The book is presented in six chapters.</p> <p>The first chapter addresses the study problem and its importance.</p> <p>The second chapter reviews the objectives of industrial security and relevant obstacles.</p> <p>The third chapter highlights industrial safety.</p> <p>The fourth chapter sheds light on fire prevention and firefighting through:</p> <p>. Fire prevention.</p> <p>. Firefighting.</p> <p>. Fire regulations and instructions.</p> <p>. Fire evacuation instructions.</p> <p>. The importance of a firefighting plan in industrial facilities.</p> <p>. Risks and nature of industrial fire.</p> <p>. Firefighting strategy and tactics.</p> <p>The fifth chapter shows instructions and regulations through:</p> <p>. Instructions.</p> <p>. Types of instructions.</p> <p>. Industrial safety and security instructions.</p> <p>. General instructions for the prevention of industrial hazards.</p> <p>. Safety and firefighting requirements.</p> <p>. Storage requirements.</p> <p>The sixth chapter is devoted to the role of preventive industrial security in environmental pollution, through:</p> <p>. Environmental Pollution.</p> <p>. The role of industrial security in industrial environmental pollution control.</p> <p>. Air pollution.</p> <p>. The role of industrial security in air pollution control.</p> <p>. Water pollutants.</p> <p>. The role of industrial security experts in water pollution control.</p> <p>. Soil pollutants.</p> <p>. The role of industrial security in soil pollution control.</p> <p>. The bombing of Kuwaiti oil wells.</p> <p>. Nuclear leakage.</p> <p>. Waste recycling as a form of environmental protection.</p> <p>. Pollution control regulations and instructions.</p> <p>The book concludes with the conclusion, findings, and recommendations.</p> <p>In the findings, it stresses that the work of firefighting devices should be integrated.</p> <p>Within its recommendations, the book stresses that the approved curricula and courses should the subject of industrial security in its comprehensive and modern concept.</p> Abbas Abu-Shama Abdulmahmoud, Yahya Ali Dammas Alghamdi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/65 Fri, 01 Nov 2019 00:00:00 +0300 The Policy of Punishment in Islamic Sharia and Contemporary Regulations https://nup.nauss.edu.sa/index.php/sr/catalog/book/153 <p style="direction: ltr;">This book addresses the penal policy in Islamic Sharia, which is characterized by stability in the origins, foundations, and principles of criminal justice, as well as flexibility. In this context, Islamic Sharia is compared with the contemporary man-made penal policy.</p> <p style="direction: ltr;">The book consists of six chapters.</p> <p style="direction: ltr;">The first chapter includes introduction to the study, its problem, questions, objectives, importance, method, limits, concepts and terminology, in addition to previous studies.</p> <p style="direction: ltr;">The second chapter reviews the nature of the penal policy and its emergence in Islamic Sharia and contemporary regulations through the following:</p> <p style="direction: ltr;">. The concept of penal policy in Islamic Sharia and contemporary regulations.</p> <p style="direction: ltr;">. The emergence of penal policy in human societies in the past.</p> <p style="direction: ltr;">. The emergence of penal policy in Islam.</p> <p style="direction: ltr;">The third chapter discusses the development of contemporary penal policy, its theories, and the position of Islamic Sharia regarding it.</p> <p style="direction: ltr;">The fourth chapter addresses the principles of penal policy in the theory of individualization in Islamic Sharia and contemporary regulations through the following topics:</p> <p style="direction: ltr;">. Regulatory individualization of the penalty.</p> <p style="direction: ltr;">. Judicial individualization of the penalty.</p> <p style="direction: ltr;">. Executive individualization of the penalty.</p> <p style="direction: ltr;">The fifth chapter clarifies the rules of penal policy in supervising penal execution in Islamic Sharia and contemporary regulations.</p> <p style="direction: ltr;">The sixth chapter incorporates summary of the study, its results, and recommendations.</p> <p style="direction: ltr;">Among the most important findings, the book reveals that penal policy works to achieve major objectives and legitimate purposes based on the stipulated penalties.</p> <p style="direction: ltr;">In the recommendations, the book stresses that the regulatory authority and guardians should pay special attention to strengthening the pillars of the penal policy by organizing and codifying crimes and discretionary penalties.</p> Shaker Muqbel Alosaimi (Author) Copyright (c) 2019 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/153 Mon, 01 Jul 2019 00:00:00 +0300 Civil Protection and Human Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/157 <p>This book discusses the development of civil protection concept from its early origin till now. It highlights the futuristic challenges affecting the role and plans of civil protection in the light of climate changes and the spread of the current form of international terrorism. It applies its academic vision on the Kingdom of Saudi Arabia.</p> <p>In application, the book explores the most critical environmental and human hazards threatening the Kingdom of Saudi Arabia today.</p> <p>The book includes six chapters.</p> <p>The first chapter presents the study problem, dimensions, questions, objectives, and importance.</p> <p>The second chapter shows the theoretical and conceptual frameworks of the study.</p> <p>The third chapter reviews the natural disasters in the Kingdom of Saudi Arabia and highlights the responding efforts.</p> <p>The fourth chapter focuses on the civil defense in the Kingdom of Saudi Arabia and relevant international experiences though the following:</p> <p>. Civil defense in the Kingdom of Saudi Arabia.</p> <p>. International experiences (India, Romania, European Union).</p> <p>The fifth chapter explores the future of civil defense and civil protection in the Kingdom of Saudi Arabia and their contributions to human security promotion</p> <p>The sixth chapter presents findings and recommendations of the study.</p> <p>The study yielded numerous findings, the most important is that the work of civil defense teams in the Kingdom of Saudi Arabia have witnessed an important development in recent years, resulting from the increasing challenges and disasters that took place in the Kingdom. Subsequently, civil defense forces have to play a greater role in this field.</p> <p>The study presents some recommendations, the most prominent is that the civil defense authority in the Kingdom of Saudi Arabia should include an independent division for environment issues. This division can be called "Environmental Civil Defense".</p> Khadeja Arafa Mohammed Ameen (Author) Copyright (c) 2019 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/157 Tue, 01 Jan 2019 00:00:00 +0300 The Image of the Traffic Cop in the Arab Media https://nup.nauss.edu.sa/index.php/sr/catalog/book/159 <p>This book sheds light on the image of the traffic cop in the Arab media represented in some Arab daily newspapers published in some Arab capitals.</p> <p>The importance of this book lies in identifying the mental image of the traffic cop through the daily read newspapers. The mental image of the traffic cop reflects the reputation of the General Department of traffic in society in addition to its spirit and identity.</p> <p>The book consists of five chapters.</p> <p>The first chapter highlights the general framework of the study.</p> <p>The second chapter sheds light on the theoretical framework and previous studies.</p> <p>The third chapter reviews the methodology of the study and its procedures through the following:</p> <p>. Methodology of the study.</p> <p>. Time sample.</p> <p>. Selection of newspapers.</p> <p>. Simple descriptive statistical processing.</p> <p>Chapter four presents the findings of the study and discussion through the following:</p> <p>. Identification of the volume of publication in the four newspapers.</p> <p>. Identification of the distribution of articles published on traffic.</p> <p>. Identification of the direction of press coverage positively and negatively, according to the newspaper.</p> <p>. Identification of the frequency distribution of the publishing source.</p> <p>. Identification of the frequency distribution of the published image on traffic according to the newspaper.</p> <p>Chapter five includes the conclusion, findings, and recommendations.</p> <p>Among the findings, the following is most important: the volume of publications in the Arabic daily newspapers amounted to (759) press materials within 22 months. The Algerian newspaper “Echorouk” came first, followed by the Saudi newspaper “Alriyadh” and the Egyptian “Youm7”and finally the Jordanian newspaper “Alrai”.</p> <p>The most prominent recommendation is that public relations departments in traffic departments should strengthen their relations with the local newspapers and provide them with information and developments in the traffic field.</p> Khalid Ibrahim Al-Kurdi (Author) Copyright (c) 2018 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/159 Thu, 01 Nov 2018 00:00:00 +0300 Structural Equation Modeling in Psychological and Social Sciences https://nup.nauss.edu.sa/index.php/sr/catalog/book/161 <p>In its second part, the book addresses the regression analysis, path analysis, exploratory factor analysis, confirmatory factor analysis, and others.</p> <p>Moreover, the book presents the path analysis as an appropriate way to verify the causal models that explain the causal relationships between the phenomenon variables in a more comprehensive manner which fits the nature of the psychological, social, and behavioral phenomena.</p> <p>In addition, the book demonstrates the factor analysis method, whether exploratory, confirmative, or exploratory-confirmative.</p> <p>The book comprises six chapters.</p> <p>The first chapter discusses the multiple regression, its axioms and analysis methods, an applied example of multiple regression and its interpretation using LISREL, as well as its implementation in SPSS.</p> <p>The second chapter includes the path analysis method between the measured variables and how to implement it through LISREL.</p> <p>The third chapter deals with the Exploratory Factor Analysis (EFA), its implementation stages, its axioms, extraction methods or recycling methods and provides an example of how it is implemented in SPSS.</p> <p>The fourth chapter contains the Confirmatory Factor Analysis (CFA) model, its significance, interpretation of its features, how it was implemented in LISREL.</p> <p>The fifth chapter includes the Exploratory Structural Equation Modeling (ESEM) strategy; its concept, its superiority over the exploratory factor analysis and confirmatory factor analysis and provides an applied example of the measurement of goals orientation and their implementation in MPLUS.</p> <p>The sixth chapter discusses the Multi-Group Confirmative Factor Analysis (MCFA); its concept, justifications for its use, implementation steps and an applied example of the self-assessment measurement and how to implement the multi-group factor analysis in MPLUS.</p> Abdulnasser Alsayed Amer (Author) Copyright (c) 2018 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/161 Wed, 01 Aug 2018 00:00:00 +0300 Structural Equation Modeling in Psychological and Social Sciences https://nup.nauss.edu.sa/index.php/sr/catalog/book/160 <p>In its first part, the book addresses the foundations and principles of the structural equation modeling as being a statistical method widely used in studies and research in all disciplines. The structural equation modeling presents an advanced analytical strategy in the psychological, behavioral, and social sciences.</p> <p>The book aims to assist researchers to comprehend the foundations, applications, and issues of the structural equation modeling and how to implement it using LISREL. This work serves as a guide for researchers in the Arab environment for the optimal use of the structural equation modeling strategy.</p> <p>The book is divided into nine chapters.</p> <p>The first chapter discusses the concept of structural equation modeling, its objectives,&nbsp; analysis strategies, the multiple forms of the structural modeling, and the historical development of this method.</p> <p>The second chapter includes the correlation and the factors affecting it, the Pearson correlation coefficient and its calculation and how it is implemented in SPSS, the case of the negative matrix determinant, and the issue of collinearity.</p> <p>The third chapter discusses the first stages of constructing the structural equation modeling, which is the allocation or designation of the model.</p> <p>The fourth chapter sheds light on the identification of the structural equation model.</p> <p>The fifth chapter deals with the issues of surveying, preparing, and refinement of data</p> <p>Chapter six presents LISREL commands and the execution of these commands on an example of the structural equation model.</p> <p>Chapter seven reviews the methods of estimating the structural equation model and the axioms of each method.</p> <p>Chapter eight includes the issue of evaluation or estimation of the model conformity.</p> <p>The ninth and last chapter deals with the model modification issue, justifications and risks of model modification strategies, as well as entries to the structural equation model.</p> Abdulnasser Alsayed Amer (Author) Copyright (c) 2018 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/160 Fri, 01 Jun 2018 00:00:00 +0300 Security and Safety Management in Laboratories https://nup.nauss.edu.sa/index.php/sr/catalog/book/162 <p>The book discusses security and safety culture in laboratories. It highlights the importance of this culture and its role in establishing an effective administrative system for ensuring laboratories safety and security. In addition, it explores how various hazards threatening laboratories are identified and managed. Moreover, the book sheds light on some ways that may motivate laboratories personnel to understand and apply rules and procedures of safety and security.</p> <p>The book includes eight chapters.</p> <p>The first chapter defines the security and safety culture in laboratories and its importance.</p> <p>The second chapter demonstrates how an effective administrative system may be established for ensuring safety and security of laboratories.</p> <p>The third chapter presents some topics related to the identification and management of different risks threatening laboratories. It demonstrates how evaluation processes for laboratories risks are made. The controls necessary for reducing these risks are also described.</p> <p>The fourth chapter discusses the planning mechanism for emergency cases that may occur in laboratories.</p> <p>The fifth chapter reviews the laboratories security by demonstrating the relationship between safety and security. It clarifies the different levels of security in laboratories and how they are designed.</p> <p>The sixth chapter focuses on the management of chemical substances and wastes. It defines green chemistry and its basic principles in addition to the sound and secure handling of all materials related to such substances and wastes is expounded.</p> <p>The seventh chapter explores methods to deal with chemical substances through safe and suitable planning and implementation of experiments and laboratories works.</p> <p>The eighth chapter explores the structures of facilities, devices, and equipment of laboratories. It reveals the basic principles for designing laboratories and indicates devices and equipment that should be available inside these laboratories. Lastly, the safe practices for using and maintaining laboratories devices and equipment are included.</p> Laila Abdullah Alkhateeb (Author) Copyright (c) 2018 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/162 Sun, 01 Apr 2018 00:00:00 +0300 Studies on the Sustainable Public Organizations https://nup.nauss.edu.sa/index.php/sr/catalog/book/163 <p>The book discusses the public organizations sustainability which is a tool for activating the strategies, plans, and programs of sustainable development. Now, sustainability is representing the "scientific and practical paradigm" offered through the organizations, conferences, and international agreements of the United Nations.</p> <p>The book includes ten chapters.</p> <p>The first chapter describes the features and roles of future organizations that make them distinguishable from traditional ones. It clarifies the reasons for transformation into organizations sustainability. The most important ways, mechanisms, theories, and operations of this transformation are also demonstrated.</p> <p>The second chapter highlights the roles that can be played by administrative and organizational leaderships for transforming the traditional organizations into sustainable ones.</p> <p>The third chapter focuses on the role of universities in achieving sustainable development and the requirements for sustainable education.</p> <p>The fourth chapter discusses the role of sustainable hospitals.</p> <p>The fifth chapter explores the role played by security organizations in achieving sustainable development.</p> <p>The sixth chapter reviews sustainable tourism.</p> <p>The seventh chapter discusses the charitable endowment (WAQF) and its types, features, and role in activating the programs of human and social development. The Saudi endowment contributions are presented as well.</p> <p>The eighth chapter explores the role of civil society organizations and their participations.</p> <p>The ninth chapter defines the concept of sustainable city as an environment that can include all organizations with different fields and specializations.</p> <p>The tenth chapter shows some pioneering experiences of sustainable development such as the experiences of the Kingdom of Saudi Arabia in utilizing solar energy.</p> <p>In the book's conclusive section, some basic concepts and terminology are shown. They can serve as guiding tools for developing the traditional features and objectives of public, civil, and private organizations to achieve the third millennium aspirations.</p> Amer Khudair Al-Kubaisy (Author) Copyright (c) 2018 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/163 Mon, 01 Jan 2018 00:00:00 +0300 Iran’s Nuclear Program https://nup.nauss.edu.sa/index.php/sr/catalog/book/164 <p>This book addresses the emergence of Iran’s nuclear program and the stages of its development in addition to its regional and international implications. It clarifies the relations between the main regional powers and Iran, and their development, internal and external factors affecting them, and their impact on the positions of the forces on Iran's nuclear program.</p> <p>Moreover, the book highlights the dangers of the nuclear proliferation and related international treaties. In addition to the military, security, and economic effects of nuclear proliferation on the situation in the region, and the extent of the implications of this proliferation on the balance of powers in the Middle East.</p> <p>The book consists of four chapters.</p> <p>The first chapter deals with the theoretical and methodological framework of the study; by identifying the problem of the study, its questions, objectives, importance, methodology, terminology, and concepts.</p> <p>The second chapter expounds the nuclear proliferation and the international efforts to encircle it through the following:</p> <p>. Military, political, economic, environmental, and health risks of the nuclear proliferation.</p> <p>. International and regional efforts to encircle the nuclear proliferation.</p> <p>The third chapter reviews the stages of the emergence of Iran’s nuclear program through the following:</p> <p>. First stage: (Emergence) 1957 – 1979.</p> <p>. Second Stage: (The stage of deliberateness and rearrangements) 1979 - 1989.</p> <p>. Third Stage: (The stage of acceleration and development) 1989-2002.</p> <p>. Fourth Stage: (The stage of internationalization and evasion) 2002 - 2016.</p> <p>The fourth chapter presents the dimensions of Iran’s nuclear program through the following:</p> <p>. Regional dimensions of Iran's nuclear program.</p> <p>. International dimensions of Iran's nuclear program.</p> <p>At the end, the book presents the conclusion, findings and recommendations.</p> <p>Among the findings, the following stands prominent:</p> <p>The continued crisis of Iran’s nuclear program is a time bomb that is liable to explode at any time.</p> Abdulfattah Ali Alrashdan, Rana Abdulaziz Alkhammash (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/164 Fri, 01 Dec 2017 00:00:00 +0300 Security Media and its Role in the Fight Against Drugs https://nup.nauss.edu.sa/index.php/sr/catalog/book/165 <p>This book addresses the effectiveness of the roles played by security media in adopting a preventive strategy in the fight against drugs in the Arab Maghreb States. It conducts an exploratory study that compares the reality of security media bodies in these countries (Tunisia, Algeria, Morocco).</p> <p>The book highlights the dangers of the spread of the drug trafficking crime across the continents considering that some Arab Maghreb States are transit countries. It clarifies the efforts rendered by these countries in the tracking and prevention of this crime.</p> <p>The book consists of six chapters.</p> <p>The first chapter deals with the theoretical background of the study.</p> <p>The second chapter reviews the mechanisms of recruiting the security media and the collective action in the fight against drugs (the Tunisian case).</p> <p>The third chapter deals with the crime of drugs in Algeria and the reality of its prevention with reference to the collective role and security media.</p> <p>The fourth chapter presents the fight against drugs experience in the Kingdom of Morocco: Constraints, reality and the role of security media.</p> <p>The fifth chapter includes a survey of the views of security experts and police officers on the role of security media in the fight against drugs in the Arab Maghreb States.</p> <p>The sixth chapter expounds the development of security media in the fight against drugs in the Arab Maghreb States.</p> <p>At the end, the book presents conclusion, findings, and recommendations.</p> <p>Within the findings, the book highlights the need to train media personnel in the Maghreb States for the purpose of building common media contents within the media efforts in the fight against drugs.</p> <p>The most salient of recommendations is the need to form a specialized joint working group to conduct an integrated study on the reality and future of security media in the Maghreb States.</p> Buhnia Ahmad Kawi (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/165 Thu, 30 Nov 2017 00:00:00 +0300 The Criminal Penalty and Precautionary Measures in the Kingdom of Saudi Arabia https://nup.nauss.edu.sa/index.php/sr/catalog/book/166 <p>This book discusses the criminal penalty and precautionary measures in the Kingdom of Saudi Arabia. It demonstrates that Islamic Sharia is at the forefront of Saudi criminal policy and positive laws. The principles of Islamic Sharia are the main source for Saudi criminal policy and positive laws. Accordingly, comprehensive national security can be realized by maintaining all private and public interests.</p> <p>The book also sheds light upon the pioneering role played by the Kingdom of Saudi Arabia in applying the Islamic Sharia provisions. It values the Kingdom’s efforts for promulgating many laws that include punitive rules based on the Islamic Sharia legislations and provisions. Furthermore, the book indicates that the Kingdom of Saudi Arabia has applied the precautionary measures theory to substitute penalties in some cases, or to accompany them in other cases.</p> <p>The book includes seven chapters.</p> <p>The first chapter presents the study problem and describes its dimensions. It identifies the study problem, questions, and objectives. Moreover, it sheds light upon previous relevant studies, and highlights the study approach and plan.</p> <p>The second chapter explores the definition and objectives of the penalty.</p> <p>The third chapter reviews the types of the penalty which include corporal punishment, custodial penalties, financial penalties, and moral penalties.</p> <p>The fourth chapter discusses the accumulation of penalties. It clarifies that there are moral and material accumulation of penalties.</p> <p>The fifth chapter shows the circumstances affecting the penalty. It expounds the circumstances excluding, relieving, or aggravating the penalty.</p> <p>The sixth chapter describes the penalty termination and rehabilitation.</p> <p>The seventh chapter explains the precautionary measures. It presents the cases and sections of precautionary measures and combining the penalty with a precautionary measure.</p> <p>Lastly, the book shows a conclusive section, findings, and recommendations.</p> Nehad Farouk Abbas (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/166 Wed, 15 Nov 2017 00:00:00 +0300 Security Media and Rumors Through Social Networks https://nup.nauss.edu.sa/index.php/sr/catalog/book/168 <p>This book addresses the role of security media in confronting rumors through social media. It seeks to put up a vision on how to face the negative repercussions of the spread of rumors and lies on the security and stability of the society, especially in light of the exploitation of rumors promoters of the amazing development in the fields of communications and information which have become available to everyone. Rumors promoters spread their rumors besides false and tendentious news that target the security and cohesion of the society. This leads to destabilization and impeding development and progress.</p> <p>Moreover, the book observes the changes that affected rumors in the information age, and the consequent expansion of the use of electronic media.</p> <p>The book comprises four chapters.</p> <p>The first chapter addresses the methodological framework of the study. It identifies the problem of the study, its questions, objectives, importance, limits, and the conceptual and professional framework.</p> <p>The second chapter highlights the theoretical framework and previous studies through the following: social media in different societies, the nature and roles of security media, rumors and their characteristics and types, and previous studies.</p> <p>The third chapter reviews the field study and discusses its findings.</p> <p>The fourth chapter offers a proposed strategy to confront rumors by relying on the theory of future trends which seeks to present a forward-looking vision.</p> <p>Finally, the book presents the conclusion, findings, and recommendations.</p> <p>Among the numerous findings of the study, the following stand prominent: new mass media has reshaped the communication work map in contemporary societies through its characteristics, such as the global spread, access speed, interaction, multimedia, and low cost.</p> <p>The book offers multiple recommendations, the most salient is the need for raising awareness on the dangers of rumors through official and non-official social institutions.</p> Muhammed Sadeq Ismael (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/168 Sun, 01 Oct 2017 00:00:00 +0300 The Cybercrimes in the Arab Legislations and Conventions https://nup.nauss.edu.sa/index.php/sr/catalog/book/169 <p>The book discusses the compatibility of Arab criminal legislations dealing with cybercrime with the international and regional trends regarding the same issue. It defines the general frame of incrimination and the type of penalties stipulated in each legislation.</p> <p>In addition, the book indicates that periodical reviews for legislations combating cybercrime are very important.</p> <p>The book includes six chapters.</p> <p>The first chapter presents the study methodological frame.</p> <p>The second chapter discusses the protected interests and their role in developing the criminal policy of cybercrime by:</p> <p>. Defining interests and ways of protection stipulated in criminal legislations.</p> <p>. Exploring Emirati criminal legislations and the development of protected interests in the fields of information technology.</p> <p>The third chapter demonstrates the crimes committed in the information technology environments. These crimes include:</p> <p>. Unauthorized access to information technology.</p> <p>. Violations against electronic documents and e-payment cards.</p> <p>. Deactivation and impediment of information technology tools.</p> <p>The fourth chapter explores the crimes committed by using information technology. The examples of these crimes are:</p> <p>. Utilizing information technology in violating private interests.</p> <p>. Violation of public interest by using information technology.</p> <p>The fifth chapter shows the provisions of jurisdiction and penalties related to cybercrime. It demonstrates:</p> <p>. The incrimination rules of cybercrime.</p> <p>. The provisions governing penalties on cybercrime.</p> <p>The sixth chapter includes findings and recommendations.</p> <p>The most salient of the findings is that the analytical comparative examination of Arab criminal legislations concerning combating cybercrime shows some similarities and differences.</p> <p>Among its recommendations, the following is the most important: the negative consequences affecting the electronic devices and systems and communications networks, and the damages harming users because of the three different forms of unauthorized access should be considered an aggravating circumstance for applying the unauthorized access penalty.</p> Emam Hassanin Atallah (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/169 Fri, 01 Sep 2017 00:00:00 +0300 Academic Classifications of the Inmates of Correctional Institutions Between the Requirements of Security and Human Rights https://nup.nauss.edu.sa/index.php/sr/catalog/book/170 <p>This book expounds the academic classifications of the inmates of correctional institutions. Pursuant to this issue, it identifies the following points through an evaluation study on the provisions of Algerian law and a comparison to Tunisian law: identification of the classification methods, mechanism, applications, and obstacles. In addition to the importance of these classifications with regard to respecting human rights and achieving security in its comprehensive sense.</p> <p>The book presents several specialized topics based on analysis of the social security situations in any society. This is to conceptualize a security penal system based on a future vision for a safe human life.</p> <p>The book incorporates six chapters.</p> <p>First chapter expounds the research problems and its dimensions.</p> <p>Second chapter highlights the theoretical framework and previous studies.</p> <p>Third chapter focuses on the system of academic classification for the inmates of correctional institutions and human rights.</p> <p>Fourth chapter expounds the system of academic classification for inmates of correctional institution and requirement of achieving security.</p> <p>Fifth chapter illustrates the classification system for the inmates of correctional institutions in Algeria.</p> <p>Sixth chapter includes the conclusion, findings, recommendations, and suggestions.</p> <p>Among its findings, the most salient is that the success of the classification process necessitates following-up inmates, within their categories, to ensure that the classification is correct.</p> <p>In the recommendations, the book stresses that the legal classification on the basis of the sentenced period should be cancelled, since it doesn't reflect the criminal gravity of the offender.</p> Rokaya Awashriyya, Dalila Mbarki, Masika Ramadany (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/170 Tue, 01 Aug 2017 00:00:00 +0300 Electronic Court https://nup.nauss.edu.sa/index.php/sr/catalog/book/171 <p>This book expounds the electronic court and relevant computerization of litigation. Also, it highlights the replacement of the fully paper-based judicial procedures by applying the electronic means established in the registration of lawsuit and its proceedings, along with files saving and judgements. Moreover, the book outlines the electronic-based litigation in civil cases, including the legalization of these procedures and comparison between them and the traditional litigation procedures. This book gives examples of the international electronic court applications in United States of America, United Arab Emirates, and the Kingdom of Saudi Arabia.</p> <p>The book incorporates six chapters.</p> <p>First chapter expounds the research problem and its dimensions.</p> <p>Second chapter highlights the nature and legitimacy of the electronic court. Pursuant to this subject, following issues are included: inception and concept of courts, the concept and components of the electronic court, and the legalization of electronic court and its relative guarantees.&nbsp;</p> <p>Third chapter offers comparison between the traditional and electronic methods of filing lawsuits. Following points are presented: the nature of electronic lawsuit, electronic lawsuit procedures, and the electronic lawsuit minutes and records.&nbsp;&nbsp;</p> <p>Fourth chapter expounds comparison between the traditional and electronic methods of authentication. Following issues are amplified: the electronic testimony, electronic signature, and the electronic judicial council.</p> <p>Fifth chapter highlights the international application of electronic court. Details are as under:</p> <p>. Electronic court in the American judicial system.</p> <p>. Electronic court in the UAE judicial system.</p> <p>. Electronic court in the Saudi judicial system.</p> <p>Sixth chapter comprises the conclusion, findings, recommendations, and suggestions.</p> <p>Among the most important recommendations, the book recommends establishing a national e-litigation body, with independent legal personality, to adopt practices, programs, and all legal sector staff. This is in accordance with the requirements of electronic litigation in all its variables.</p> Abdul-Aziz bin Saad Alghanim (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/171 Thu, 01 Jun 2017 00:00:00 +0300 Security Media Within the Context of the Security Variables https://nup.nauss.edu.sa/index.php/sr/catalog/book/172 <p>This book expounds the role of security media, in all of its forms, in addressing the security variables emerging in the Arab region. Recently, Arab countries have witnessed events that have affected their security stability. The latter requires that all security bodies should be ready to respond to such events which emerged by several political, economic, technological, and cultural changes. Media, in general, and security media, in particular, are on top of such media agencies. Since there is a direct relationship between media and citizens, who represent an important link and element of the security agencies in countering some of the destructive phenomena.&nbsp;&nbsp;&nbsp;</p> <p>The book seeks to pursue the following objectives:</p> <p>. Identify the role of security media in countering the phenomenon of terrorism and intellectual extremism.</p> <p>. Expose the role of security media in countering organized crime and the crime of money laundering.</p> <p>. Present the role of security media in dealing with protests.</p> <p>. Indicate the role of security media in resolving the refugee problem.</p> <p>. Highlight the role of security media in addressing posts on social media (Facebook, Twitter) relative to security issues.</p> <p>The book is incorporated in five chapters.</p> <p>First chapter includes an introduction to the study.&nbsp;</p> <p>Second chapter expounds the theoretical background of the study. Various points are identified, including the nature of security media, means of communication and forms of production in security media, and security media strategy.</p> <p>Third chapter comprises the methodological framework of the study. &nbsp;</p> <p>Fourth chapter expounds presentation and analysis of the study data and discussion of its findings.</p> <p>Fifth chapter includes findings and recommendations.</p> <p>Among its findings, the book stresses the importance of enhancing cooperation between the security media and various mass media by making use of their available capabilities to achieve the objectives associated with security media.</p> Rania Abdel-Naim Al-Ishran, Juman Hamed Al-Dahamesheh, Abduruhman Fahad Alajmi (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/172 Mon, 01 May 2017 00:00:00 +0300 International Guarantees on Providing Fair Criminal Trial https://nup.nauss.edu.sa/index.php/sr/catalog/book/173 <p>This book expounds procedural, and objective guarantees necessary to provide fair criminal trials. It exposes the comparative viewpoints of both Saudi law and Egyptian legislation on such guarantees.</p> <p>The book comprises three chapters.</p> <p>First chapter details the nature of guarantees on fair criminal trials in both man-made legislations and Islamic Sharia.</p> <p>Second chapter provides discourse on procedural guarantees to ensure fair criminal trials in law and Islamic Sharia through:</p> <p>. Guarantee of legal procedures in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to silence in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to a defense in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to seek assistance of interpreter in man-made law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to attend and be informed on accusation directed against him in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to present witnesses, interrogation, and discussion of evidences on dispute in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to fair and expeditious trial in law and Islamic Sharia.</p> <p>. Guarantee the right of the accused to file appeal in law and Islamic Sharia.</p> <p>Third chapter presents discussion on objective guarantees for conducting expeditious trials in law and Islamic Sharia through:</p> <p>. Objective legal guarantee in law and Islamic Sharia.</p> <p>. Guarantee of judicial independence in law and Islamic Sharia.</p> <p>. Guarantee of causative factors contributing to judicial ruling in law and Islamic Sharia.</p> <p>. Guarantee of equality before judiciary in law and Islamic Sharia</p> <p>. Guarantee of inadmissibility of penalizing the accused more than once in law and Islamic Sharia.</p> <p>The book stresses the need to observe the guarantees of fair criminal trials through studies based on original sources.</p> Waheed Bin Saeed Al-Wadei (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/173 Sat, 01 Apr 2017 00:00:00 +0300 Organizational Thought During Modernism and Post-Modernism Phases https://nup.nauss.edu.sa/index.php/sr/catalog/book/174 <p>This book presents the reflections of modernism philosophy as projected by the pioneers of conventional organizational thought.</p> <p>It comprises six chapters.</p> <p>The first chapter highlights modernism and its related topics. It elaborates the following issues:</p> <p>. Characteristics of modernism.</p> <p>. Prominent scholars, modernism philosophers and their achievements.</p> <p>. A view of modernism philosophy and its motivations.</p> <p>Chapter two provides presentation on philosophy in the postmodernism era, its motivations, and intellectuals. It expounds the following:</p> <p>. Origin and development.</p> <p>. Nature and motivations.</p> <p>. Epistemological characteristics in the postmodernism era.</p> <p>. Postmodernism intellectuals</p> <p>. Important intellectual trends of postmodernism era.</p> <p>Chapter third discusses modernism and postmodernism: comparisons and criticism through the following:</p> <p>. Similarities between modernism and postmodernism.</p> <p>. Divergences between modernism and postmodernism.</p> <p>. Important points of criticism directed against modernism.</p> <p>. Criticism to postmodernism.</p> <p>Chapter four elaborates organizational thought in the&nbsp; context of modernism through the following:</p> <p>. Motivations of administrative modernism and its characteristics.</p> <p>. Prominent pioneers of organizational modernism.</p> <p>Chapter five discusses organizational motivations in the postmodernism thought and their exponents. Following issues are expounded:</p> <p>. When did organizational motivations in the postmodernism era start?</p> <p>. Views and trends.</p> <p>. Prominent pioneers of organizational postmodernism.</p> <p>. Features of organization in the context of modernism and postmodernism motivations.</p> <p>Chapter six offers presentation on questions and judgments on the human being, philosophy, and organizations. Following topics are elaborated:</p> <p>. Questions related to the human being with regard to philosophers and scholars.</p> <p>. Summaries related to philosophers of modernism and postmodernism.</p> <p>. Judgments on organizations in postmodernism</p> <p>. Features of future organizations in the context of postmodernism</p> <p>. Summary and recommendations.</p> <p>In its recommendations, the book suggests that followers of different religions, schools of thought, and eastern philosophies should explore an approach on building civilization based on originality.</p> Amir Khudhair Al-Kubaisi (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/174 Wed, 01 Mar 2017 00:00:00 +0300 Evaluating the Methods of DNA Extraction from Nails Samples https://nup.nauss.edu.sa/index.php/sr/catalog/book/175 <p>This book deals with DNA extraction from nails samples. This extraction is of great importance. It provides analytical data on DNA in multiple criminal fields. The latter permits the examiner the opportunity to obtain an adequate amount of DNA to achieve this purpose.</p> <p>The book comprises five chapters.</p> <p>Chapter one includes an introduction to the study. It elaborates questions, objectives, and importance of the study.</p> <p>The second chapter expounds the theoretical background of the study through the following:</p> <p>. Theoretical framework.</p> <p>. Previous studies.</p> <p>The third chapter reviews the methodological procedures of the study. It includes the following: location of the study; study samples; collection of standard samples; design of empirical processes; DNA extraction of nails samples; dissolving nails in sodium hydroxide solution of (2mM) concentration; quantification of DNA; multiplication of extracted DNA; and display of genetic traits.</p> <p>The fourth chapter presents and analyses the study data and offers its findings. It includes the following: study of the effects of age; nails polish; extraction methods on the Loci without protocol amendments; extraction method on Loci after nails dissolution.</p> <p>Chapter five includes findings and recommendations.</p> <p>Among the most important findings, the following are prominent:</p> <p>. Nails from biological samples can provide a good source of DNA.</p> <p>. Organic extraction enables obtaining a larger amount of DNA.</p> <p>Among the recommendations of the study, the following are salient:</p> <p>. Reliance should be on the organic method of extraction to obtain DNA from nails especially in the event of its meager amount of provision.</p> <p>. Using sodium hydroxide in the extraction of DNA from nail samples should be avoided, if the quantity of nails sample is very limited. This is due to its negative effect on the amount of extracted DNA.</p> Tahani Mansi Al-Onazi (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/175 Wed, 01 Mar 2017 00:00:00 +0300 Alternative Punishments in Juveniles Cases https://nup.nauss.edu.sa/index.php/sr/catalog/book/176 <p style="direction: ltr;">This book deals with the concept of alternative punishments on juveniles, and sheds light on its legitimate and regular original sources.</p> <p style="direction: ltr;">The book comprises five chapters.</p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">The first chapter discusses the problem of the study, its questions, objectives, significance, limits, methodology, concepts, terminology, and previous studies.</span></p> <p style="direction: ltr;"><span style="font-size: 0.875rem;">The second chapter deals with freedom-depriving punishments, alternative punishments, and juvenile cases. Following points are amplified:</span></p> <p style="direction: ltr;">. Advantages and disadvantages of freedom-depriving punishments.</p> <p style="direction: ltr;">. The nature of alternative punishments.</p> <p style="direction: ltr;">. The nature of juvenile cases and the application of freedom-depriving punishments.</p> <p style="direction: ltr;">The third chapter expounds the application of alternative punishments on juveniles. Following issues are expounded: justifications for the application of alternative punishments on juveniles, the controls of its application, the specificity of female juveniles in the application of such penalties.</p> <p style="direction: ltr;">The fourth chapter deals with the reality of the use of alternative punishments in juvenile cases. Following subheadings are explained:</p> <p style="direction: ltr;">. Types of alternative punishments on juveniles.</p> <p style="direction: ltr;">. The application of alternative punishments on juveniles in the Kingdom of Saudi Arabia.</p> <p style="direction: ltr;">. The reality of alternative punishments on juveniles in the GCC States.</p> <p style="direction: ltr;">. The activation of alternative punishments in juvenile cases.</p> <p style="direction: ltr;">In chapter five, the author presents the conclusion, findings, and recommendations.</p> <p style="direction: ltr;">Among the most prominent findings: the damages of freedom-depriving punishments on juveniles are multiple ـــــ psychological, physical, and economic. Such damages exceed juveniles to affect the family and society. Moreover, statistics indicated no active role of prisons in reducing crime rates.</p> <p style="direction: ltr;">Among the recommendations of the study, the following are most prominent: the culture of dialogue among juveniles should be disseminated, the exchange of experiences between juvenile judges should be facilitated, and a judicial blog should be created to include all cases with alternative punishments on juveniles.</p> Muhsina Saeed Alqahtani (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/176 Wed, 01 Feb 2017 00:00:00 +0300 The Reality of Training in Some Arab Institutes and Colleges of Civil Defence https://nup.nauss.edu.sa/index.php/sr/catalog/book/177 <p>This book discusses the reality of training in some Arab colleges, and institutes of civil defense. It is a preliminary stage for subsequent research based on the findings of this study for offering shared Arab visions. Accordingly, a paradigm shift in training at civil defense bodies can be realized.</p> <p>The study seeks to highlight the variances among the Arab institutes offering a training on the civil defense fields. Moreover, it tries to achieve some objectives that focus on the nature of the training programs presented in these institutes and colleges. In addition, the study reveals the categories that benefit from such programs. It demonstrates the capacity level of the trainers, lecturers, and supervisors.</p> <p>The book includes five chapters.</p> <p>The first chapter discusses the study problem and its dimensions. It highlights the questions, objectives, significance, limits, concepts, and procedural definitions of the study</p> <p>The second chapter displays the theoretical background of the study.</p> <p>The third chapter shows the methodological procedures of this study.</p> <p>The fourth chapter offers the study data and its analysis. It discusses the study findings through:</p> <p>. Prince Al-Hussein Bin Abdullah II Academy of Civil Protection, The Hashemite Kingdom of&nbsp;Jordan.</p> <p>. The Institute of Civil Defense in UAE.</p> <p>The fifth chapter presents the abstract, findings, and recommendations.</p> <p>The study includes multiple findings, the prominent is that the practical training in Jordan and UAE is based on accident simulation and suggestive scenarios. Accordingly, the training process simulates the real environment.</p> <p>The study offers some recommendations, the most salient is that training programs for specialists in civil defense duties should be offered. These programs should be remotely directed to the trainees at the Arab colleges and institutes of civil defense.</p> Khalid bin saleem Alharbi , Ali bin Abdullah Alshehri (Author) Copyright (c) 2017 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/177 Sun, 01 Jan 2017 00:00:00 +0300 Impacts of the Security Incidents on the Psychology of Security Man and his Performance https://nup.nauss.edu.sa/index.php/sr/catalog/book/181 <p>This book discusses the impacts of security incidents, that the Arab region is passing through, on the psychology of the security man and his performance. It exposes nature of the work carried out by the security man and the incidents he faces. Such incidents are relatively affecting the psychology of security man based on his psychological and personality characteristics. Moreover, it highlights the positive or negative relationship between the security man and fellow-nationals which is based on mutual trust.</p> <p>The book includes five chapters.</p> <p>First chapter comprises an introduction to the study. In addition, it presents study problem, objectives, questions, hypotheses, significance, limits, methodology, main concepts and terms, and previous pertinent studies.</p> <p>Second chapter reviews the security incidents in Arab countries. It stresses on the need for further security cooperation among Arab countries. Arab countries have to get together in a team effort to serve the Arab security strategy. Also, it shows the security incidents that exposes security men to occupational hazards while performing their jobs. In addition, it demonstrates the positive or negative relationship between security man and fellow-nationals.</p> <p>Third chapter expounds the psychology of security man through:</p> <p>. Psychological rigidity of the security man.</p> <p>. Post-traumatic emotional and psychological stresses.</p> <p>Fourth chapter exposes the work pressure and performance of security man. Details are in order:</p> <p>. The concept of work pressure.</p> <p>. Theories of work pressure.</p> <p>. Ways to withstand pressure.</p> <p>. Psychological and social support to the security man.</p> <p>. Psychological security and the performance of the policeman.</p> <p>Fifth chapter comprises the conclusion, findings, and recommendations.</p> <p>Most important recommendation is: Psychological, behavioral, and cognitive programs by specialists should be developed. Such programs shall be applied in withstanding the pressure of occupational work for security man.</p> Khalid Ibrahim Hassan Al-Kurdi (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/181 Tue, 01 Nov 2016 00:00:00 +0300 The Terminology Used by the Arab Bodies of Criminal Justice https://nup.nauss.edu.sa/index.php/sr/catalog/book/182 <p>This book deals with the explanation of the forensic terms used in forensic sciences and relevant sciences, in terms of language, Sharia, and law. It comes in response to the need for these sciences to codify their basic terms and definitions in the style of scientific encyclopedias.</p> <p>The book combines the terms used in various criminal sciences and relevant sciences. It codified their definitions and presented comments and explanations. This shall constitute a contribution to the integration of the system of the criminal work and to keep abreast with the growth of other sciences</p> <p>The book presented the terms collected in accordance with a specific approach, details follow:</p> <p>. Arrangement of terms in alphabetical order.</p> <p>. Definition and explanation of terms based on alphabetical order.</p> <p>. Defining the criminal term in the language, Sharia, and law, whenever possible.</p> <p>. The referral method is used for some terms to avoid repetition in case the term has already been addressed in a definition of a previous term.</p> <p>. It was taken into consideration that the writing style should be easy and clear, that is why some of the quoted texts were rephrased to convey the meaning without compromising the meaning.</p> <p>. References were used in the definitions of forensic terms.</p> <p>. References of terms definitions have been indicated.</p> <p>. Contained Quranic verses and Hadiths should be authenticated.</p> <p>. Legal provisions and jurisprudential differences in some terms are avoided.</p> <p>. The legal definitions of criminal terms are based on the four schools of jurisprudence.</p> <p>. Terms have not been referred to their original pronunciation, since that some terms differ from the definition of the terms derived from them.</p> <p>. If the term is compound and derived from an original term, then it will be mentioned as an independent criminal term.</p> Khalid bin Saud Albeshr (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/182 Sun, 30 Oct 2016 00:00:00 +0300 Ways to Improvement of the Psychological Care https://nup.nauss.edu.sa/index.php/sr/catalog/book/183 <p>This book expounds a definition of the psychological care in addition to the achievement of psychological health under the global and local political, social, and familial unfavorable factors that have a relative impact on everyone. Some people can overcome such factors while some can't, but somehow, they deal with them, and others will likely become weak and fall prey to psychological diseases destroying their morale and having a treatment-resistant depression.&nbsp;&nbsp;</p> <p>The book aims to be a reference for everyone who seeks psychological care, for himself or others, both theoretical and applied. It serves workers in the psychological field, specialists in public health and psychological care, students of the various psychological and social specialties or non-specialized people.&nbsp;&nbsp;</p> <p>The book comprises nine chapters.</p> <p>First chapter expounds the psychological health care from past to present.</p> <p>Second chapter discusses the promotion of psychological care.</p> <p>Third chapter presents the definition of psychological first aid.</p> <p>Fourth chapter sheds light on the scientific history of psychological rehabilitation, its definition, services, core principles, and values.</p> <p>Fifth chapter expounds the trauma and the posttraumatic stress disorder.&nbsp;&nbsp;</p> <p>Sixth chapter expounds the psychological health and psychological support in emergencies.</p> <p>Seventh chapter expounds community mental health care according to instructions of World Psychiatric Association. It discusses the steps required for the implementation of the community-based mental healthcare and the obstacles and mistakes to be avoided.</p> <p>Eighth chapter expounds the emergency psychology in time of crises and disasters.</p> <p>Ninth chapter includes means of psychological care and ways of improvement.</p> <p>The book offers multiple recommendations, the most salient is that the subject of psychological care and health should be discussed in all public health sectors.</p> As-Sayed Fahmy Ali Mohamed (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/183 Sat, 01 Oct 2016 00:00:00 +0300 Standard Specifications for Traffic Safety https://nup.nauss.edu.sa/index.php/sr/catalog/book/185 <p>This book expounds the standard specifications for traffic safety at the Arab and international levels. Transportation is a fundamental pillar of development. Moreover, freedom of movement is the most fundamental right that is constitutionally and lawfully guaranteed in the civilized world.</p> <p>The book comprises six chapters.</p> <p>First chapter is entitled "Vehicle", it expounds the following:</p> <p>. Classification of vehicles.</p> <p>. Motor.</p> <p>. Chassis.</p> <p>. Vehicle body.</p> <p>. Other core components.</p> <p>. Some vehicle safety systems.</p> <p>. The theory of risk compensation.</p> <p>Second chapter is entitled "Roads", it expounds the following:</p> <p>. Classification of roads.</p> <p>. Determinants and regulations of road designs.</p> <p>. Design elements.</p> <p>. Traffic Engineering.</p> <p>Third chapter addresses traffic control. Details follow:</p> <p>. Priorities for the mandatory ordering of traffic lights and signals.</p> <p>. Traffic hand lights.</p> <p>. Light signals.</p> <p>. Traffic lights.</p> <p>. Ground-mounted traffic signs.</p> <p>. Traffic regulation in working areas on the road.</p> <p>Fourth chapter expounds the traffic regulations. Details follow:</p> <p>. An overview of traffic legislations and laws.</p> <p>. Penalties on traffic violations and their regulations.</p> <p>Fifth chapter is entitled "Road Accidents". Details follow:</p> <p>. Statistical information.</p> <p>. Traffic movement.</p> <p>. Basic definitions.</p> <p>. Stages of traffic accidents.</p> <p>. Causes of traffic accidents.</p> <p>. Classification of traffic procedures in road accidents.</p> <p>. Duties of the traffic officer upon receiving a tip-off about a car accident.</p> <p>This book is concluded by the sixth chapter which offers the conclusion, findings, and recommendations.</p> <p>The most salient recommendations are:</p> <p>. Standard specifications for vehicle parts should be developed. They include the performance, safety, environmental compliance, positive and inherent safety devices, and their obligation.</p> <p>. Standard specifications for road constructions and completion should be developed.</p> <p>. Tougher punishment should be imposed on drivers who don’t report car accidents they are part of.</p> Ayman Samir Al-Dhabaa (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/185 Thu, 01 Sep 2016 00:00:00 +0300 The Complementary Relationship Between Traffic Bodies and Insurance Companies https://nup.nauss.edu.sa/index.php/sr/catalog/book/146 <p>This book seeks to determine the nature of the relationship between the traffic bodies and the quality of insurance services in the Arab world. It introduces the best practices in designing and executing the complementary relationship between traffic bodies and insurance companies worldwide. In addition, the book expounds the nature of the relationship between traffic bodies and the quality of insurance services in the Kingdom of Saudi Arabia.</p> <p>The book comprises four chapters.</p> <p>First chapter expounds the study problem and dimensions, introduction to the study, study questions, study methodology, and study basic concepts.</p> <p>Second chapter addresses the theoretical framework represented in the complementary relationship between traffic bodies and insurance companies. Pursuant to this subject, the following issues are presented: authorities concerned with the traffic safety and their interrelationship, concept of complementarity in response to traffic accidents, global best practices for the complementary relationship between traffic bodies and insurance sector, some international experiences, the prominent obstacles affecting the relationship between the governmental bodies and insurance companies, and the most prominent initiatives to enhance the relationship between governmental bodies and insurance companies.</p> <p>Third chapter includes an analysis on the applied study data, which expounds citizens' views on the insurance companies services.</p> <p>Fourth chapter expounds the conclusion, findings and recommendations. In addition to a proposed action plan for the complementary relationship between traffic bodies and insurance companies.</p> <p>Among the most important findings is that the Arab world, especially the Kingdom of Saudi Arabia, has the world highest traffic accidents rates.</p> <p>Among its recommendations, the book stresses the importance of adopting traffic safety as a national concept to be disseminated among other governmental bodies concerned with traffic safety.</p> Mohamed bin Suleiman bin Manea (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/146 Tue, 30 Aug 2016 00:00:00 +0300 Safety in Tourist Facilities https://nup.nauss.edu.sa/index.php/sr/catalog/book/143 <p>This book deals with safety requirements and means of protection that should be available in tourist facilities, especially in children playgrounds at public parks and in children amusement parks in the kingdom of Saudi Arabia. The book offers some practical solutions to achieve a higher level of safety in these facilities.</p> <p>The book is divided into five chapters.</p> <p>The first chapter includes the problem of the study and its dimensions. It also includes the objectives of the study, its questions, importance, limitations, concepts, terminology, and previous studies.</p> <p>The second chapter addresses the theoretical background of the study through the following topics:</p> <p>. The concept of safety, its requirements and bodies responsible for their availability.</p> <p>. Tourism and tourist facilities.</p> <p>. Accidents at tourist facilities.</p> <p>. Application of safety at tourist facilities.</p> <p>The third chapter expounds the methodological procedures of the study.</p> <p>The fourth chapter reviews and analyzes data of the study and discusses its findings.</p> <p>Chapter five includes the conclusion, findings, and recommendations. The most salient findings are:</p> <p>. The most applied requirements in tourist facilities are that children games should be installed tightly with vertical and horizontal elements fixed in place.</p> <p>. The culture of neglect and carelessness prevails among workers in tourist facilities. These factors are considered outstanding obstacles as indicated by specialists associated with the research population.</p> <p>. The lack of strict control and strict penalties also reflect a dimensional cultural aspect.</p> <p>. Absence of a general doctor permanently near the site of amusement parks or playgrounds during operation times.</p> <p>Among the recommendations, the following are prominent:</p> <p>. Confidence should be enhanced among amusement parks visitors.</p> <p>. A fully equipped ambulance car should be available at tourist facilities.</p> <p>. Free training should be provided to all staff of tourist facilities.</p> <p>. Strict punishment should be imposed.</p> Muhammed Naser Al-Beshi (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/143 Wed, 01 Jun 2016 00:00:00 +0300 International Protection of Wild Environment from the Dangers of Pollution https://nup.nauss.edu.sa/index.php/sr/catalog/book/142 <p>This book defines the concept of wild environment and the sources of its pollution. It also identifies the protection tools of both living and non-living wild environment. In addition, it reviews the aspects of international cooperation in the field of wild environment protection by identifying the international agreements of wild environment protection.</p> <p>The book comprises four chapters.</p> <p>The first chapter identifies the concept of wild environment and the sources of the wild ecosystem pollution. It discusses the following subjects: the definition of the wild environment and environmental pollution, the importance of the wild environment and the concern of the protection of the wild environment. It also discusses the sources of wild ecosystem pollution, whether chemical, nuclear, or caused by natural sources.</p> <p>The second chapter views the wild environment protection tools, it includes the following subjects:</p> <p>. Live tools for the protection of wild environment.</p> <p>. Non-live tools for the protection of wild environment.</p> <p>The third chapter clarifies the international liability for the damages caused by infringement on the wild environment by discussing the following topics:</p> <p>. Traditional and criminal international liability for the damages resulting from infringement on the wild environment.</p> <p>. The foundations of the international liability for the damages resulting from infringement on the wild environment.</p> <p>. The effects of the international liability for the damages resulting from infringement on the wild environment.</p> <p>. The settlement of international disputes related to wild environment.</p> <p>The fourth chapter addresses the regional and international cooperation in the field of wild environment protection through the following:</p> <p>. Regional and international agreements for the protection of wild environment.</p> <p>. The role of international organizations in the protection of wild environment.</p> <p>. The Egyptian role in the protection of wild environment.</p> Abdulrahim Naser Joudeh (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/142 Sun, 01 May 2016 00:00:00 +0300 Practical and Theoretical Determinants of Preventive Security Media https://nup.nauss.edu.sa/index.php/sr/catalog/book/141 <p>This book addresses the preventive role played by the ministries of interior of few Arab countries (Egypt, the Kingdom of Saudi Arabia, and United Arab Emirates) through their websites and social media accounts, in order to supply the public with information that form security knowledge among citizens, and to assist them to deal with the potential threats and risks.</p> <p>The book comprises five chapters.</p> <p>The first chapter identifies the methodological procedures of the study through the following topics: the problem of the study, its importance, objectives, questions, previous studies, type of the study, its methodology, sample, and tools.</p> <p>The second chapter reviews the strategic determinants of preventive security media through the following:</p> <p>. The concept of preventive security media and its functions.</p> <p>. The requirements of preventive security media.</p> <p>. Preventive security media campaigns (concept, objectives, and challenges).</p> <p>The third chapter addresses the theoretical determinants of preventive security media through:</p> <p>. Intellectual perversity and disinformation (ISIS as a model).</p> <p>. Preventive security media and mental images of the security institutions.</p> <p>. Electronic preventive security media.</p> <p>The fourth chapter includes the analytical study of the websites of the ministries of interior under study, in addition to their social media accounts (Facebook, Twitter and YouTube).</p> <p>Chapter five offers the findings and recommendations of the study.</p> <p>Findings of the study:</p> <p>. The ministries of interior under study show interest in raising awareness and security knowledge among the public.</p> <p>. The ministries of interior under study are keen to build good relations with the public.</p> <p>. The ministries of interior under study strive to provide the public with new information first thing first.</p> <p>Recommendations of the study:</p> <p>. Security institutions should rely on an integrated media strategy in developing preventive security media messages.</p> <p>. Security institutions should increase the effectiveness of their websites.</p> Dr. Muhammed Saifedden Abdulrazzak (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/141 Fri, 01 Apr 2016 00:00:00 +0300 Technology of Identity Card in the Field of Civil Affairs https://nup.nauss.edu.sa/index.php/sr/catalog/book/140 <p>This book deals with the manufacturing of identity cards and the securing and protection methods against forgery and counterfeiting. Forgery and counterfeiting of identity cards have become advanced and serious crimes threatening the security and safety of the individual and the society, since that identity cards are the most important national documents for people due to their multiple uses.</p> <p>The book sheds light on the most important characteristics and secure features of identity cards.</p> <p>The book comprises six chapters.</p> <p>The first chapter discusses the methodology of the study and its use of the method of re-analyses of previous studies, research, and experiments that took place in some Arab and foreign countries. It also identifies the latest technological techniques produced by specialized companies in this field.</p> <p>The second chapter includes identity cards: nature and emergence.</p> <p>The third chapter expounds the physical components of identity cards.</p> <p>The fourth chapter reviews the protection and security components of identity cards.</p> <p>Chapter five deals with informatics components of identity cards. It reviews the means of storing personal data of the cardholder in addition to advanced technologies to produce the personal photo on the body of the card to counter fraud.</p> <p>Chapter six includes the conclusion and recommendations; the most salient of which are:</p> <p>. Means of awareness and training should be provided for the ordinary man who represents the first level of detection. This can be achieved by providing sufficient bulletins in government newspapers, and also through newscasts and TV programs.</p> <p>. Means of awareness in addition to field and practical training should be provided for police and security personnel as well as to judicial police.</p> <p>. Continuous training and being updated on new developments should be offered to forensic experts.</p> Ahmad Saad Johar (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/140 Tue, 01 Mar 2016 00:00:00 +0300 Psychological and Social Damages Caused by Illegal Immigration https://nup.nauss.edu.sa/index.php/sr/catalog/book/139 <p>This book analyzes the factors leading to psychological and social damages caused by illegal immigration. It addresses these factors in the light of the interaction processes among objective conditions surrounding the youth. The latter are characterized by psychological and social attitudes towards their original societies at the social, economic and political levels.<br>The book is divided into seven chapters.<br>The first chapter discusses the problem of the study, its main questions, objectives, and importance. It also explains the theoretical and analytical principles of this study, and the research tools used.<br>Chapter two presents scientific theories related to the psychological and social damages caused by illegal immigrations. It addresses the psychological interpretations related to psychology, social and psychological interpretations. Further, it presents economic interpretations that cover economic and employment issues on local, regional and international levels.<br>The third chapter reviews the historical development of the problem of illegal immigrations and its basic spots of spread in the world. Also, it expresses its manifestations, forms and tools used.<br>The fourth chapter analyzes the damages caused by illegal immigrations in the light of the interaction of objective conditions surrounding the youth in their original communities together with their characteristics related to their attitudes towards the issues of their countries. This is in addition to their emotions and feelings that determine the level of their association with their original countries.<br>Chapter five displays the psychological and social damage as consequences of illegal immigrations in the context networks associated with organized crime and human trafficking.<br>Chapter six includes an assessment of international and regional efforts in fighting illegal immigration.<br>The seventh chapter presents the findings of the study, its suggestions, and recommendations.</p> Ahmad Abdulaziz Al-Asfar Al-Laham (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/139 Mon, 01 Feb 2016 00:00:00 +0300 Preliminary Non-Criminal Lawsuits Requiring Adjudication in Criminal Trials https://nup.nauss.edu.sa/index.php/sr/catalog/book/138 <p>This book presents the preliminary non-criminal lawsuits requiring adjudication in criminal trials.</p> <p>It presents an exhaustive discussion in two broad chapters.</p> <p>First chapter expounds the fundamental base on which the criminal court rests its jurisdiction for adjudication in preliminary lawsuits through the following:</p> <p>. The nature of fundamental base on which the criminal court relies its competence for adjudication in preliminary or initial non-criminal lawsuits in Egyptian legislation in contrast to other legislations.</p> <p>. The reasoning of the fundamental base on which the criminal court depends its jurisdiction for adjudication in preliminary or initial non-criminal lawsuits.</p> <p>. The characteristics of the fundamental base for adjudication in preliminary or initial non-criminal lawsuits.</p> <p>. The applications of the fundamental base on which the criminal court is reliant for its jurisdiction on adjudication in preliminary or initial non-criminal lawsuits in different operative laws.</p> <p>. The scope of the fundamental base on which the criminal court rests its competence for issuing legitimacy of various by-laws and distinct administrative resolutions in preliminary or initial non-criminal lawsuits.</p> <p>Second chapter provides a presentation on the procedures employed by the criminal court in considering preliminary lawsuits. Following components are expounded:</p> <p>. The criminal court is obligated to adjudicate preliminary non-criminal lawsuits.</p> <p>. The criminal court is obligated to comply with approaches of affirmation and confirmation as spelled out in specific legislation relative to the framework of preliminary non-criminal lawsuits.</p> <p>. Verdicts released by the criminal court in preliminary non-criminal lawsuits carry legitimacy rationale.</p> <p>The book yielded numerous findings and recommendations. Among the findings, it explains that in preliminary lawsuits presented to the criminal court during the process of criminal trial the final ruling is issued commensurate to the nature of the case study.</p> <p>Among the variant recommendations, the book recommends abrogating Article (225) of the criminal procedural law.</p> Muhammad Abdul Hamid Mekki (Author) Copyright (c) 2016 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/138 Fri, 01 Jan 2016 00:00:00 +0300 Bullying Behavior among Children and Teenagers https://nup.nauss.edu.sa/index.php/sr/catalog/book/137 <p>This book addresses the behavior of bullying as a phenomenon directed from one child to another either in the same age or younger. Bullies will develop non-social and criminal behavior patterns, with alcohol and drug abuse and the use of weapons which is a learned behavior from the environment in which they live. Early intervention and spreading awareness are necessary and important factors to stop the bullying behavior, the need is urgent to educate students and bullies with appropriate methods to manage their relationships with others.</p> <p>The book reviews several forms of bullying:</p> <p>1.Physical bullying. Such as: Beating, slapping, pinching, kicking or pushing to the ground.</p> <p>2.Verbal bullying. Such as:&nbsp; Cursing, pointing, threatening, taunting, spreading false rumors or giving bad names or ethnic designation.</p> <p>3.Sexual bullying. Such as: Using sexual names, obscene language, touching or sexual threat.</p> <p>4.Emotional and psychological bullying. Such as: Harassing, threatening, intimidating, humiliating or rejecting.</p> <p>5.Social relations bullying. Such as: Preventing certain individuals from exercising certain activities by throwing them out, rejecting their friendship or spreading rumors.</p> <p>6.Properties bullying. Such as: Taking belongings of others and disposing them on their behalf or keeping or destroying them.</p> <p>The book presents several bullying reasons among children and teenagers, such as:</p> <p>. Personal reasons and factors.</p> <p>. Psychological reasons and factors.</p> <p>. Social causes and factors.</p> <p>. School causes and factors.</p> <p>. Reasons from the viewpoint of bullies and victims.</p> <p>The book comprises five chapters.</p> <p>Chapter One: Introduction to bullying behavior.</p> <p>Chapter Two: Participants in bullying behavior.</p> <p>Chapter Three: Reasons of bullying behavior.</p> <p>Chapter Four: Studies on bullying behavior among children.</p> <p>Chapter Five: Treatment programs and guidelines to deal with bullying behavior.</p> <p>The book concludes with a proposed program for rational emotional behavioral collective guidance to reduce bullying behavior among the upper elementary students through fourteen collective guidance sessions.</p> Ali Musa Al Sabhen, Mohammed Farhan Al Koudah (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/137 Mon, 01 Jul 2013 00:00:00 +0300 Security Culture: Concept and Reality https://nup.nauss.edu.sa/index.php/sr/catalog/book/136 <p>This book sheds light on the evolution taking place in the activities of human societies; this evolution caused a permanent change and continuous adaptation with the modern age technical data.</p> <p>The elements of security culture seek to reinforce the development of orientation towards the community, the citizen, the environment, and mental skills.</p> <p>Proper planning is considered the best way to disseminate security culture and to make it accessible to everyone through multiple awareness sources in a distinct cultural manner. Security culture can be disseminated by using continuous communication, where the sequence of ideas and the security measures to be delivered to the recipient are conveyed in one communicative manner. Parallel communication, on the other hand, uses any security idea and measure through several communication messages to spread the benefits whatever the means of communication and dissemination of security culture were. This issue requires the modeling of cultural elements in accordance with the prescribed form.</p> <p>The book comprises three chapters:</p> <p>. Chapter One: The Philosophy of Change and the Security Vision.</p> <p>. Chapter Two: The Cultural Orientation and the Security Orientation of the Security Culture.</p> <p>Chapter Three: The Methodological Procedures to Study the Security Culture.</p> Abdul Rahman bin Ibrahim Al Shaer (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/136 Sat, 01 Jun 2013 00:00:00 +0300 International Cooperation to Counter Organized Crime https://nup.nauss.edu.sa/index.php/sr/catalog/book/135 <p>This book sheds light on international cooperation to counter organized crime. This subject is divergent; it has extensions in history, geography, economics, sociology, psychology, criminology, international law, international criminal law, international relations, international organizations and police sciences. It stresses the importance of countering organized crime being of great danger to countries and the entire international community.</p> <p>Organized crime exploits the changes and developments in the political, economic, scientific, and technological fields, in addition to global openness and free markets, and even the deprivation of poor social classes and the wealth of rich people and the weakness of some political regimes and nations in its quest to make money and profit.</p> <p>The book yielded the following recommendations:</p> <p>1.Means of criminal cooperation between countries in the form of international laws and national legislations should be integrated.</p> <p>2.The volume of treaties related to international cooperation between countries and law enforcement bodies should be increased.</p> <p>3.New ways of cooperation between countries related to activating the mechanisms of implementation of conventions should be created.</p> <p>4.Education and training programs for judges and law enforcement officials in the field of international criminal law should be intensified.</p> <p>5.Technical assistance, information, expertise, data, documents, and research between countries in the fields of countering organized crime should be exchanged.</p> <p>6.Efforts for the unification of criminal legislations should be coordinated.</p> <p>7.Field cooperation and queries between countries to unveil organized crime networks should be incorporated.</p> <p>8.Bilateral, regional, and global cooperation in the criminal field should be increased.</p> <p>9.Competent personnel in the field of combating organized crime should be selected. Effective executive bodies and professional field teams should be established.</p> <p>The book comprises two chapters.</p> <p>Chapter One: The Phenomenon of Organized Crime.</p> <p>Chapter Two: The Role of International Cooperation in Countering Organized Crime.</p> Mukhtar Hussain Shbaili (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/135 Wed, 01 May 2013 00:00:00 +0300 Security Interrogation https://nup.nauss.edu.sa/index.php/sr/catalog/book/134 <p>This book sheds light on security interrogation. Security interrogation is considered as one of the most important procedures of the interrogation process.</p> <p>It explained that interrogation is of sensitive nature, it is permanently in doubt and is continuous in terms of the methods used by the security services in conducting it and the authenticity of resulting confession, which places it is always under the spotlight and public analysis. Many countries, including the Kingdom of Saudi Arabia, paid much care to this procedure in accordance with its importance, as not to expose the questioned whether he was an accused or a suspect to physical or moral coercion, in addition to the inadmissibility to prevent healing or rescuing the injured with the intention to complete the investigations and not to question the accused in handcuffs. Interrogation is an art and a science, and is a conflict between two wills. The first is the will of the investigator who strives to discover the truth and make it recognized by the confession of the accused. The second is the will of the accused who works hard to discharge himself and to avoid threat of punishment.</p> <p>It is clear that interrogation is not merely questions and answers, it is an art, study, experience and a conflict between truth and fiction, and between truth and delusion. Interrogation depends on experience and expertise more than on personal preparation. It is the duty of the interrogator at the beginning of his career to develop his skills by studying ways and methods adopted by successful investigators.</p> <p>The book comprises five chapters.</p> <p>Chapter One: The Nature of Security Interrogation.</p> <p>Chapter Two: The Rules of Security Interrogation.</p> <p>Chapter Three: The Characteristics of the Interrogator, and Interrogation Flaws.</p> <p>Chapter Four: Security Interrogation in Cybercrime.</p> <p>Chapter Five: Applied Aspects of Security Interrogation.</p> Ahmad Abdullah Al Saeed (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/134 Mon, 01 Apr 2013 00:00:00 +0300 Legal and Security Dimensions of the Relationship of the Arab States and the International Criminal Court https://nup.nauss.edu.sa/index.php/sr/catalog/book/133 <p>This book aims to introduce the permanent International Criminal Court (ICC), and to track the efforts that preceded its foundation in addition to its relationship with the Security Council and the national judiciary. It sheds light on the variation and consistency in the stance of Arab states on the International Criminal Court and the collection and analysis of information in order to figure out the legal dimensions, and to monitor new applications of the Court and their impact on the relationship of the Arab states with the Court.</p> <p>The book comprises six chapters.</p> <p>Chapter One: The problem of the study and its dimensions.</p> <p>Chapter Two: An Introduction to the International Criminal Court.</p> <p>Chapter Three: The relationship between the International Criminal Court and national judicial systems.</p> <p>Chapter Four: Towards building an integrated Arab stance on the International Criminal Court.</p> <p>Chapter Five: A visualization of the future relationship between the Arab states and the International Criminal Court.</p> <p>Chapter Six: Conclusion, findings and recommendations.</p> <p>The study reached numerous recommendations; the following are salient:</p> <p>. A unified Arab stance should be taken on the signing of Rome Statute of the International Criminal Court.</p> <p>. Stress should be placed on the presence of Arab states representatives in the Assembly of States Parties to the International Criminal Court, this presence will contribute to achieve multiple benefits for the attendance<strong>.</strong></p> <p>. International crimes committed in the Arab territories should be investigated, and perpetrators should be punished, tolerance or failure to do so will result in the transfer of jurisdiction to the Court.</p> <p>. A draft of Arab model law for crimes that fall within the jurisdiction of the International Criminal Court should be activated to achieve compatibility with the Statute of the Court.</p> Muhammed bin Hassan Al Harthi (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/133 Fri, 01 Mar 2013 00:00:00 +0300 Immigrant Rights and Obligations in International Private Law https://nup.nauss.edu.sa/index.php/sr/catalog/book/132 <p>This book sheds light on international immigration, especially manpower immigration, as it is considered a necessity for both sending countries "exporting countries" and receiving countries "importing countries".</p> <p>The book seeks to enrich the legal knowledge in the field of determining the legal status of international immigrants in relation to their rights and duties. In addition, it clarifies the position of comparative jurisprudence and some judicial and legal comparative applications in determining the legal status of international immigrants.</p> <p>The book aims to achieve several objectives:</p> <p>. Identify international immigrants and to distinguish them from other individuals.</p> <p>. Clarify the nature of international immigration.</p> <p>. Clarify immigrant’s rights in the country of origin.</p> <p>. Clarify immigrant’s obligations in the country of origin.</p> <p>. Identify immigrant’s rights in the country of immigration.</p> <p>. Identify immigrant’s obligations in the country of immigration.</p> <p>The book comprises a preview, two chapters, and a conclusion. The preview addresses the preliminary identification of international immigrants, the first chapter addresses the rights and obligations of the immigrant in the country of origin, the second chapter addresses the rights and obligations of the immigrant in the country of immigration, while the conclusion presents the findings and recommendations of this study.</p> Muhammed Al Sayed Arafah (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/132 Fri, 01 Feb 2013 00:00:00 +0300 Non-traditional Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/131 <p>This book addresses the subject of non-traditional security, this subject has become a new concept that is connected to the life of the human being, achieving non-traditional security has become a basic demand for the human being in order to preserve his life. Both concepts, traditional and non-traditional security, have become a basic demand for the human being.</p> <p>The book includes old and new security concepts, such as: health and environmental security and the personal security of citizens.</p> <p>The book aims to achieve the following objectives:</p> <p>1.Increase knowledge of new security concepts, also called non-traditional security, and to define its terms in order to identify its most important topics.</p> <p>2.Create deep understanding of such security issues which are believed to be generated from external threats.</p> <p>3.Stress the importance of maintaining close relations with neighboring countries which will achieve stability and cooperation in countering new and cross-border crimes.</p> <p>4.Activate the roles and activities of the regional cooperative organizations starting from their positive role in reducing cross-border crimes and securing state borders against external threats.</p> <p>The book comprises eleven chapters.</p> <p>Chapter One: Traditional Security.</p> <p>Chapter Two: Non-Traditional Security.</p> <p>Chapter Three: Health Security.</p> <p>Chapter Four: Environmental Security.</p> <p>Chapter Five: Job Security.</p> <p>Chapter Six: Personal Security.</p> <p>Chapter Seven: Cultural Security.</p> <p>Chapter Eight: Political Security.</p> <p>Chapter Nine: Community Security.</p> <p>Chapter Ten: Legal Security.</p> <p>Chapter Eleven: Methods of Confrontation.</p> Mohammed Jamal Mazloum (Author) Copyright (c) 2013 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/131 Sat, 01 Dec 2012 00:00:00 +0300 Strategic Leadership and its Role in Developing Organizational Culture https://nup.nauss.edu.sa/index.php/sr/catalog/book/130 <p>This book addresses the role of strategic leadership in the development of organizations, this role serves to achieve the objectives of these organizations and to grant them the ability to ensure development, growth, and adaptation to contemporary events and environmental variables.</p> <p>The study aims to clarify the role of leadership in the development of organizational culture and the positive outcome of qualifying this leadership in the security services in general, and the General Directorate of Passports and the General Directorate of Civil Defense in particular.</p> <p>The book comprises five chapters.</p> <p>Chapter I: Introduction to the study.</p> <p>Chapter II: The theoretical framework and previous studies.</p> <p>Chapter III: The methodological framework of the study.</p> <p>Chapter IV: Presentation of the field study data, analysis, and interpretation.</p> <p>Chapter V: Summary of the study and the most important findings and recommendations.</p> <p>The study yielded the following recommendations:</p> <p>. Executive departments in the General Directorate of Passports and the General Directorate of Civil Defense should be granted larger area of ​​decentralization to ensure their training on the roles of strategic leadership.</p> <p>. Work should be directed towards a special system of material and moral incentives.</p> <p>. The values ​​of justice and equality should be supported, and focus should be on self-managed work teams.</p> <p>. More attention should be paid to plans and strategies required for the implementation of strategic leadership preparation programs.</p> <p>. The General Directorate of Passports and the Directorate General of Civil Defense with should be provided with advanced communication systems and access to databases needed to provide the staff of these two departments with necessary information at any time.</p> <p>. Security leadership in general, and strategic leadership in particular, should be urged to encourage subordinates to launch innovative initiatives and to exercise creative approaches in solving security problems.</p> Saleh bin Saad Al Murabaa (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/130 Mon, 01 Oct 2012 00:00:00 +0300 Drugs, its Effects and Ways of Safe Disposal https://nup.nauss.edu.sa/index.php/sr/catalog/book/129 <p>This book addresses the phenomenon of drugs addiction which spread out over time in many human societies with different political, social, and economic systems. Drugs addiction has become a huge problem with multiple effects on the addict and his society.</p> <p>Drugs addiction has the following effects:</p> <p>1.Harmful health and financial effects on the addict, which will affect his activity and contribution in society and life.</p> <p>2.Damage will be caused to the family of the addict.</p> <p>3.An important portion of time and effort of the society's energy will be dedicated to the sake of care, protection and treatment of addiction harms.</p> <p>People are described as addicts when they pass the stage of organic and psychological dependence. This stage is characterized by the following clinical symptoms:</p> <p>1.The inability of the addict to give up his intakes of drugs for hours or days due to his inner compulsive need.</p> <p>2.The tendency to increase the dose of this substance.</p> <p>3.The appearance of multiple psychological effects when abstaining from taking these drugs, such effects are: anxiety, tension, depression, lack of concentration and lack of relief.</p> <p>4.The appearance of some organic and physical complications when abstaining from taking drugs, such complications are: headache, quivering in upper and lower sides and face and tongue, sweating, fainting and gradual deterioration in personal functions such as: organic functions, mental functions, behavior, health and ways of communication.</p> <p>The book comprises seven chapters as follows.</p> <p>First chapter addresses the definitions and concepts of drugs and addiction.</p> <p>Second chapter reviews opiates.</p> <p>Third chapter sheds light on Hemp "Cannabis".</p> <p>Fourth chapter explores steroids.</p> <p>Fifth chapter incorporates lysergic acid diethylamide (LSD).</p> <p>Sixth chapter is about sedatives and hypnotics.</p> <p>While the seventh chapter discusses drug detection time.</p> Mahmoud Al Sayed Ali (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/129 Sat, 01 Sep 2012 00:00:00 +0300 Norms of Forensic Medicine and Toxicology: Security Personnel and Law https://nup.nauss.edu.sa/index.php/sr/catalog/book/128 <p>This book discusses forensic medicine. The latter has emerged as a distinct medical discipline specializes in recruiting medical expertise on solving medical- oriented problems required by investigatory and judicial authorities. To express in simple words, it refers to the host of problems that carry medical relevance within the broad context of legal framework. Such problems are presented in judicial courts for trials. Also, such problems become foci of study by students of law and security personnel. Forensic Medicine, as a distinct field of study, thus carry crucial significance. It is central to the careers pursued by select specialist ـــــ lawyers, public prosecutors, investigators, and criminal researchers.</p> <p>The subject of forensic medicine is amply discussed in two sections of the book.</p> <p>First section deals with forensic pathology. It includes causes of death, identification on the type of death whether natural or abnormal.</p> <p>Second section deals with clinical forensic medicine. Included in the context are the following important issues:</p> <p>. Sexual abusive transgressions comprising both males and females.</p> <p>. Determination of injuries and the relative percentage of disability among the wounded in the event of physical assaults.</p> <p>. Assessment of age factor.</p> <p>. The evaluation of relative mental validity of the individual.</p> <p>The book comprises eleven chapters. First chapter provides an overview of the crime scene. Second chapter discusses cognition. Third chapter presents details on death. Fourth chapter expresses views on wounds. Chapter five provides discourse on firearms and their consequent impacts. Chapter six explores asphyxiation. Chapter seven devotes presentation on fires and burns. Chapter eight unfolds issues related to sexual offences and abortions of pregnant woman. Chapter nine provides ethical code of medical practitioners. Chapter ten discusses forgery of handwriting. Chapter eleven provides illumination on toxicology and its relative significance in medical criminal applications.</p> Raja M. Abdul Mabud (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/128 Mon, 30 Jul 2012 00:00:00 +0300 Countering Mechanisms for Policing Crimes of Domestic Violence https://nup.nauss.edu.sa/index.php/sr/catalog/book/127 <p>This book deals with domestic violence. The first incidence of domestic violence occurred with the murder of Abel at the hands of his brother, Cain. In the recent decades, the phenomenon of domestic violence has witnessed constant rise, steady increase in average and multiplicity of its forms. Specialists and scholars at the national and international levels are showing mounting concerns in this phenomenon.</p> <p>This study explores the conducive policing mechanisms to counter domestic violence commensurate to the distinctive nature of the contending parties. This exploration will be sought by identifying the following:</p> <p>. Conducive policing countering mechanisms against domestic violence</p> <p>. Conducive policing countering mechanisms to control domestic violence</p> <p>. Conducive policing mechanisms promoting cooperation between the police and the citizens reinforcing police endeavors to ensure protection against domestic violence</p> <p>. Obstacles hindering police efforts in ensuring protection against domestic violence</p> <p>The book is divided into three chapters. First chapter explains study problem and dimensions. Second chapter discusses the theoretical background and previous pertinent literature. Third chapter provides&nbsp; a summation, findings, and recommendations.</p> <p>Among the various recommendations, the following are outstanding:</p> <p>. A work team should be formed to carry out assignments related to ensure protection against domestic violence. This team should comprise social workers, psychologists, specialists in public and human relations, physicians, and police personnel.</p> <p>. Investigation team fully cognizant on the nature of domestic violence should be formed. It should comprise elements from police, social workers, psychologists, forensic experts, and forensic physicians. This investigatory team should be presided by an experienced police officials. Female members must accompany this team.</p> <p>. A working cooperation should exist between civil and</p> <p>government institutions. Universities and schools should play positive roles.</p> <p>. Toll free numbers and internet websites should be provided to offer advisory services to the victims of domestic violence.</p> Hassan M. Abido (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/127 Sun, 01 Jul 2012 00:00:00 +0300 Supremacy of Polymer Banknotes: A Comparative Study between Paper and Polymer Banknotes https://nup.nauss.edu.sa/index.php/sr/catalog/book/126 <p>This book presents a comparative study of twin types of banknotes ـــــ paper and polymer. In undertaking this study, the author has made several experiments. The detail is provided in twenty-six chapters.</p> <p>Chapter one provides an introductory discourse. The study explains the difference between paper as piece of cotton and polymer. Chapter two deals with the pulping process from the trees and transforming the wood into a fibrous mass. Third chapter discusses the manufacturing process. Chapter four demonstrates the initial commencement of polymer processing. It explains that banknotes are made of dual axis polypropylene. Chapter five presents the security features in banknotes through four components ـــــ the substrate features, the ink features the design features, and security in machine readable features. Chapter six reviews the subject of hygiene. It discusses the possibility of germs and microorganisms to accumulate on the paper notes. Polymer banknotes are cleaner because of their non-porous basic material. Chapter seven discusses the environmental impacts of polymeric banknotes. The disposal of Polymer banknotes causes no environmental problems, and they can be easily recycled into other useful plastic products. Chapter eight provides a presentation of chemical and physical analysis of papers and polymer banknotes. Raw material, composition and weight are included in the presentation. Chapter nine reviews the mechanical properties of paper and polymer banknotes in terms of multiple factors ـــــ tensile strength and breaking length, burst strength, tear resistance and tear initiation, and folding endurance.</p> <p>Chapter ten deals with aging of banknotes. This is done through the study of the effect of temperature. Chapter eleven offers a thermal analysis of banknotes against temperature effects. In chapters twelve through twenty-six, a group of tests on two types of banknotes are conducted and their results were compared.</p> Ahmed Saad Goher (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/126 Sat, 30 Jun 2012 00:00:00 +0300 Application of DNA Fingerprinting in Solving Forensic Cases https://nup.nauss.edu.sa/index.php/sr/catalog/book/125 <p>Based upon DNA fingerprint applications, this book provides its relative role in solving criminal cases. Also, it shows its role in determining filiation and the identification of the dead body. It is important to assert that DNA fingerprint applications represent the best approach in criminal forensic research laboratories.</p> <p>The book incorporates its discussions in eight chapters. Chapter one presents the basics of biological and genetic DNA by explaining chromosome structure, genes, and the human genome. Second chapter deals with the mitochondria. Third chapter discusses the genetic diseases. It&nbsp; explains that such diseases are caused by genetic factors as a result of chromosomal abnormalities or defects in the synthetic construction of genes. Chapter four deals with the principles of DNA fingerprints. Focus is laid on the issue of identity and the relationship of issues related to parenting and affinity. Chapter five reviews the DNA analysis in the service of forensic science through the extraction&nbsp; of DNA from blood, hair, cigarette butts, and other biological effects. Chapter six deals with DNA databases and their importance. In Chapter seven, the study reviews DNA fingerprint applications and explains their importance in resolving the dilemma erupting at the ambiguity of a host of criminal cases. Chapter eight discusses the assessment of the DNA evidence in forensic medicine. Arab Republic of Egypt is opted as case study. Recurrence mechanisms rates at each hereditary sites were calculated. This was based in the results of genetic fingerprints. Later values of the likelihood congruence and symmetry rations of each hereditary imprint were estimated. At the end, the control strength of specific genetic were determined.</p> Ahmed M. Refaat (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/125 Fri, 01 Jun 2012 00:00:00 +0300 Drugs Trafficking https://nup.nauss.edu.sa/index.php/sr/catalog/book/121 <p>This book expounds on the phenomenon of drug trafficking, promotion, and addiction. This phenomenon is well known since thousands of years.</p> <p>The importance of the study stems from the fact that drugs represent one of the sources that pose threat to the most precious asset in the world ـــــ human life. Also, it casts perilous impact on mankind. We express with intense regret the despite concerted endeavors at various levels ـــــ local, regional and international ـــــ drugs problem is constantly on rise. It shows no substantial decline. Based on such considerations, the Naif Arab University for Security Sciences, has embarked on conducting this study at the Studies and Research Center to explore the latest developments pertinent to drug trafficking in the Arab region.</p> <p>The book seeks to achieve the following objectives:&nbsp;</p> <p>. Identify the new types of drugs and the producing countries.</p> <p>. Explore the latest trends in the illicit drug trafficking at the Arab and global levels.</p> <p>. Determine the economic, social, and security risks associated with illicit drug trafficking.</p> <p>The book is divided into four chapters. First chapter discusses the variant types of drugs and their cultivation places. Second chapter exposes the trends of illicit drugs trafficking at the world level. Third chapter deals with the illicit trafficking of psychotropic substances. Fourth chapter reveals the impact of relevant developments on combating drugs and the impact of illicit drugs trafficking.</p> <p>The researcher, in its conclusive passages, offers some suggestions. Among the latter, the following are noteworthy:</p> <p>. Endeavors to counter illicit drugs trafficking should invariably continue by relevant security agencies to &nbsp;combat illicit drugs trafficking.</p> <p>. Mutual security agreements should be entered with other countries in the broad area of drugs control. Pertinent information should also be exchanged.</p> Muhammad Jamal Mazloum (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/121 Fri, 30 Mar 2012 00:00:00 +0300 Reasons for Drugs Abuse in the Arab Society https://nup.nauss.edu.sa/index.php/sr/catalog/book/120 <p>This book discusses the abuse of drugs and psychotropic substances in the Arab society. Key decision- makers are watching the development with utmost concern. This is reflected at bi-dimensional level &nbsp;ـــــstate and society. Regrettably, however, the drugs abuse is on constant rise. To counter its dissemination, many endeavors are in the way. Most modern means and most sophisticated devices are also used for this purpose. In addition, huge sums of money are expended in retraining the on-going rise of this phenomenon. Last but not the least are the contributions of non- official elements associated with private sectors. A tri- partite approach &nbsp;ـــــguidance, awareness and counseling &nbsp;ـــــ is employed. Despite all such strides, it is indeed deplorable to state that no tangible solution is achieved.</p> <p>The study provides an analysis of the problem under treatment with variant angles based on the perception of various formative factors &nbsp;ـــــfamily; school; community groups; and communication channels.</p> <p>The book comprises five chapters. Chapter one deals with the theoretical and methodological framework of the subject under hand. Chapter two expounds the phenomenon related to the abuse of drugs and psychotropic substances. Chapter three incorporates the factors that contribute to drugs abuse in contemporary Arab studies. Chapter four provides analytical frameworks explaining deviation and abuse of drugs and psychotropic substances. Chapter five provides conclusive observation on combating the abuse of drugs and psychotropic substances and treatment of drugs addicts.</p> Ahmed A. Al- Asfar (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/120 Thu, 01 Mar 2012 00:00:00 +0300 Constructing Security Model on Combating Cyber Crimes and its Relative Effectiveness https://nup.nauss.edu.sa/index.php/sr/catalog/book/119 <p>This book sheds light on the importance of information and data, their nature, constituents, counting, classification, tabulation and analysis in order to be effectively utilized in countering cybercrime in the modern age. Social and economic transformations have accompanied the increased use of computer as a tool of information storage, process, and retrieval. Therefore, the idea of constructing security model to combat cybercrime in general and in the Kingdom of Saudi Arabia in particular seems vital.</p> <p>The book seeks to achieve the following objectives:</p> <p>. Identify the grounds for combating cybercrime.</p> <p>. Specify the dimensions pertaining to combating cybercrime.</p> <p>. Demonstrate the essential components concerning the combat of cybercrime.</p> <p>. Generate mechanisms to combat cybercrime.</p> <p>The book comprises five chapters.</p> <p>The first chapter is an introduction to the study.</p> <p>The second chapter expands on theoretical framework. The third chapter presents methodological procedures. The fourth chapter incorporates a presentation and analysis of study data and findings. The fifth chapter offers a summary of the study and the recommendations. Among the latter, the most constructive are in order:</p> <p>. The suggestive model should be both conceded and applied, at gradual stages, to combat cybercrime.</p> <p>. Personnel associated with combating cybercrime need to gain conducive academic rehabilitative competence. Also, security personnel should be given human and material reinforcement and momentum.</p> <p>. Importance should be assigned to the establishment of specialized units at police stations and departments of the Bureau of Investigation and Public Prosecution to combat cybercrime.</p> <p>. Equal importance should be assigned to the forging of cooperation mechanism between community members and pertinent government personnel associated with combating of cybercrime.</p> <p>. International cooperation on combating cybercrime should be promoted.</p> <p>. A national strategy should be developed. All pertinent personnel on combating cybercrime should participate.</p> Turki Abdul Rehman Al-Mowaichir (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/119 Mon, 27 Feb 2012 00:00:00 +0300 Drugs and psychotropic substances: strategies and measures jurisdictions https://nup.nauss.edu.sa/index.php/sr/catalog/book/118 <p>This book reviews drug control strategies and their implementation measures.</p> <p>The book comprises four chapters.</p> <p>The first chapter discusses the following:</p> <p>. The historical development for drug control in the Arab world.</p> <p>. Arab drug control strategy.</p> <p>. Results of the implementation of the international drug control strategy.</p> <p>The second chapter views the dangers and harms of drugs through the following:</p> <p>. Organized crime and drugs.</p> <p>. The concept of transnational organized crime.</p> <p>. Illicit drugs trafficking syndicates.</p> <p>. Criminal organizations and organized crime.</p> <p>. Practical collaborative applications for combating organized crime.</p> <p>. Illicit drug trafficking and corruption.</p> <p>. Corruption penalty in Islamic Sharia.</p> <p>. The correlation between crime and corruption</p> <p>. Fight against corruption.</p> <p>. Economic and social effects of drug trafficking and abuse.</p> <p>The third chapter addresses the national jurisdiction via United Nations and confronting failure, and the international system of criminal justice.</p> <p>The fourth chapter discusses the international jurisdiction (International Criminal Court) through the following:</p> <p>. Causes for the establishment of the International Criminal Court.</p> <p>. The nature of the International Criminal Court.</p> <p>. Crimes within the jurisdiction of the Court:</p> <p>-Crime of genocide.</p> <p>-Crimes against humanity.</p> <p>-War crimes.</p> <p>-Crime of aggression.</p> Mohammad Fathi Eid (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/118 Wed, 01 Feb 2012 00:00:00 +0300 Fingerprints science and personality verification https://nup.nauss.edu.sa/index.php/sr/catalog/book/117 <p>This book is a completion of the book: "Origin and Evolution of Personality Verification Systems" published by the University in 2007. The book addresses the study of fingerprints of papillary lines and defines fingerprint as the traces of those salient lines (Ridges) parallel to the deep and low lines (Furrows) that leave traces on any object they touch, whether smooth or rough surfaces. Therefore, fingerprints are the prints left by fingertips, palms, and&nbsp; toes upon contacting polished surfaces or paper documents.</p> <p>Fingerprints are of three patterns:</p> <p>. Whorls: consists of overlapping circles or whorls and exist on one finger or more.</p> <p>. Arches: consists of a group of overlapping arches.</p> <p>. Loops: consists of open loops following each other.</p> <p>Fingerprints are distributed on four groups of lines and curves that define their identity and shape, namely :</p> <p>. Regular arches group which forms (5%).</p> <p>. Loops group which forms (20%).</p> <p>. Whorls group which forms (70%).</p> <p>. Compound fingerprints group carrying more than one of the previous forms and forms (5%).</p> <p>The book comprises an introduction, two chapters, and a conclusion.</p> <p>The first chapter discusses the following topics:</p> <p>. The beginning of the formation of papillary lines.</p> <p>. Fingerprints science.</p> <p>. Various forms of the characteristics of papillary lines.</p> <p>. Basics of fingerprints science.</p> <p>. Types of fingerprints.</p> <p>The second chapter views the following topics:</p> <p>. Classification and preservation methods, including:</p> <p>-The definition of classification.</p> <p>-Classification cards models.</p> <p>. Decimal cards sorting and saving system.</p> <p>. Individual fingerprint at the accident scene, including:</p> <p>-Individual fingerprint system.</p> <p>-Classification of individual fingerprint in whorls.</p> <p>-Individual classification of compound, abnormal and&nbsp; cracked forms.</p> <p>The conclusion of the book illustrates various types of confession.</p> Abdullah bin Mohammad Al-Youssef (Author) Copyright (c) 2012 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/117 Mon, 30 Jan 2012 00:00:00 +0300 Personal Identification Techniques Facing Security Challenges https://nup.nauss.edu.sa/index.php/sr/catalog/book/188 <p>"This book deals with personal identification techniques facing security challenges by trying to answer the following question:<br>How effective are the modern techniques for personal identification facing contemporary security challenges to verify the following objectives:<br>• Identifying the most important contemporary security challenges facing the Kingdom of Saudi Arabia which require personal identification.<br>• Identifying areas where modern techniques are used for personal identification facing contemporary security challenges.<br>• Knowing the security implications of using modem personal identification techniques.<br>• Identifying obstacles that prevent using personal identification techniques.<br>• Illustrating statistically indication differences according to respondents’ views of the modern techniques of personal identification facing contemporary security challenges depending on the different personal and functional variables.<br>The theme of the book is displayed through five chapters:<br>The first chapter shows the problem of the study, and its questions, objectives, relevance, limits, concepts, and terminology.<br>The second chapter shows the theoretical background of the study in terms of:<br>• Contemporary security challenges.<br>• Personal identification techniques.<br>• The implications of using modern techniques in personal identifications.<br>• Obstacles that prevent the use of personal identifications techniques facing contemporary challenges.<br>The third chapter presents the methodological procedures of the study, while the fourth chapter discusses the study of data- presentation and analysis and discusses the results.<br>The fifth chapter is specified to show the summary of the results, and the recommendations of the study, the most important of them are:<br>• Providing border oulets and passport departments with personal identification techniques.<br>• Conducting advanced training courses for workers in personal identification techniques.<br>• personal identification techniques suppliers to train a group of passport employees on the use of those devices.<br>• Put in writing a procedural manual that shows the steps of using personal identification techniques, and the penalties imposed for the misuse done by employees."</p> Awad bin Mohammad Galab Al- Wathnani (Author) Copyright (c) 2011 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/188 Sat, 01 Oct 2011 00:00:00 +0300 Dictionary of Disaster and Emergency Terminology https://nup.nauss.edu.sa/index.php/sr/catalog/book/116 <p style="direction: ltr;">This dictionary deals with disaster and emergency terminology used in English and their meanings in Arabic. The dictionary is arranged according to English letters from (A) to (Z).</p> <p style="direction: ltr;">This dictionary includes /1164/ terms distributed to English letters.</p> Ibrahim H. El- Tikaina (Author) Copyright (c) 2011 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/116 Thu, 01 Sep 2011 00:00:00 +0300 Effectiveness of the Methods Used to Prove Electronic Forgery Crime https://nup.nauss.edu.sa/index.php/sr/catalog/book/115 <p>This book deals with the effectiveness of methods used to prove the electronic forgery crime in light of the spread of information technology crimes.</p> <p>The book seeks to achieve the following objectives:</p> <p>. Identify the characteristics of electronic forgery crime.</p> <p>. Identify the means used in committing the electronic forgery crime.</p> <p>. Identify the forms of electronic forgery crime in electronic government departments.</p> <p>The book comprises five chapters.</p> <p>The first chapter presents the introduction, problem, questions, objectives, importance, limits, terminology, and concepts of the study.</p> <p>The second chapter highlights the theoretical framework and previous studies.</p> <p>The third chapter reviews the methodology of the study and its statistical procedures and methods.</p> <p>The fourth chapter offers data of the study and discusses its results.</p> <p>The fifth chapter presents the conclusion, findings, and recommendations of the study which are highlighted as follows:</p> <p>. Urge courts and judicial authorities to admit digital and electronic evidences as evidence in electronic forgery crimes.</p> <p>. Enroll criminal and technical investigation personnel in advanced computer training courses.</p> <p>. Provide authorities competent to investigate electronic forgery crime with human, technical, and financial potentials to detect electronic evidence and to present them as irrefutable and proved evidence.</p> <p>. Spread electronic culture among community members and acquaint them with the seriousness of disclosing information online and random browsing.</p> <p>. Develop an integrated strategy for protecting information systems within security devices.</p> <p>. Urge companies working in the field of information systems to produce software for the tracking and retrieval of information.</p> <p>. Engage information system experts to increase the capabilities of personnel to counter forgery and detect electronic forgery.</p> <p>. Double penalties on the misuse or commitment of electronic forgery.</p> <p>. Avoid using pirated software.</p> <p>. Develop a written procedural manual including the steps for using information systems in the security services.</p> Abdullah bin Saud Mohammad Al Sarani (Author) Copyright (c) 2011 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/115 Fri, 01 Jul 2011 00:00:00 +0300 Drugs and Psychotropic Substances: Abuse Causes and Confrontation Methods https://nup.nauss.edu.sa/index.php/sr/catalog/book/112 <p>This books addresses the problem of drugs which is not limited to a certain sector of society as it has become a problem from which all sectors of society are suffering. The book poses the following main questions: What are the main causes of drug abuse? And what are the methods to confront this phenomenon? The following questions were derived from the main question:</p> <p>. What are the effects of drugs and psychotropic substances on human life?</p> <p>. What are the main causes of drug abuse?</p> <p>. What are the main methods of drugs control?</p> <p>In this sense, the book aims to achieve the following objectives:</p> <p>. Identify the concept of drugs and psychotropic substances.</p> <p>. Identify the types of drugs and psychotropic substances.</p> <p>. Identify the effects of drugs and psychotropic substances on health, psychological, social and economic aspects.</p> <p>. Clarify the main causes of drug abuse in the light of the development of psychological, social and biological studies and research.</p> <p>This book comprises six chapters.</p> <p>The first chapter addresses the problem of the study, its dimensions, objectives, importance, method, features, concepts, and terminology.</p> <p>The second chapter reviews the effects resulting from drug abuse through Health, psychological, social, and economic effects</p> <p>The third chapter sheds light on theories interpreting drug addiction by reviewing the following theories:</p> <p>. Psychological theories.</p> <p>. Social theories.</p> <p>. Interpreting drug abuse in the light of Psychiatry.</p> <p>. Pharmacological theories.</p> <p>While the fourth chapter addresses the psychological and social causes for drug addiction.</p> <p>The fifth chapter presents the following countering methods:</p> <p>. The preventive method.</p> <p>. The therapeutic method.</p> <p>. The developmental method.</p> <p>Finally, the sixth chapter deals with the relapse of drug abusers and methods of confrontation through:</p> <p>. The relapse phenomenon (return to addiction).</p> <p>. Reasons behind relapse.</p> <p>. Methods to confront relapse.</p> Abdul Elah A. Al Musharraf, Riyad A. Al Jawadi (Author) Copyright (c) 2011 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/112 Tue, 01 Mar 2011 00:00:00 +0300 Reflections of Using Genetic Material and their Potential Impact on National Security https://nup.nauss.edu.sa/index.php/sr/catalog/book/111 <p>This book deals with the reflections of using genetic material and their potential impact on national security after the discovery of the genetic material (DNA).</p> <p>The book aims to achieve the following objectives:</p> <p>. Identify the positive and negative reflections of the use of genetic material on the areas of criminal security.</p> <p>. Identify the positive and negative reflections of the use of genetic material on other areas of national security .</p> <p>. View the potential use of genetic material in bioterrorism.</p> <p>. Determine the adequacy of the current efforts rendered by international organizations for the protection of international and national security from the negative reflections of the use of genetic material and its applications to identify their shortcomings and try to access the most appropriate means to increase the effectiveness of the procedures for the protection of the national and international security of these reflections.</p> <p>. Detect the statistically significant differences in the view of civilians and military specialists in genetic material on the reflections of using genetic material and their potential impact on national security.</p> <p>This book includes six chapters</p> <p>Chapter one presents introduction to the study in terms of its subject, problems, importance,&nbsp; objectives, questions, terminology, and concepts.</p> <p>Chapter two presents the theoretical framework of the study in terms of:</p> <p>. Genetic material and its applications.</p> <p>. Human genetic databases of security use.</p> <p>. Bioterrorism.</p> <p>. National security.</p> <p>. The international efforts exerted to protect international and national security from the negative reflections resulting from the use of genetic material and its applications.</p> <p>Chapter three reviews previous studies.</p> <p>Chapter four expounds methodology and procedures of the study.</p> <p>&nbsp;Chapter five displays, analyzes, and interprets the study in light of its findings.</p> <p>Chapter six sheds light on the summary, findings, and &nbsp;recommendations of the study.</p> Hamad bin Abdullah Al - Sweilem (Author) Copyright (c) 2011 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/111 Sat, 01 Jan 2011 00:00:00 +0300 The Human Rights and Criminal Justice https://nup.nauss.edu.sa/index.php/sr/catalog/book/110 <p>This book deals with the concept of human rights. This concept becomes explicit within the context of many international declarations, documents, statements and conventions in the wake of many complaints expressing the violations of human rights.</p> <p>The book includes six chapters and a conclusion.</p> <p>The first chapter deals with “Human Rights and their Relationship with Criminal Justice". Following topics are expanded:</p> <p>. The concept of right and its apportionment.</p> <p>. The human being from the Islamic perspective.</p> <p>. Sources of human rights.</p> <p>. Criminal justice and its relationship with human rights.</p> <p>The second chapter sheds light on “The Protection of Human Rights in Islam”. Two topics are provided as follow:</p> <p>. The distinctive characteristics of human rights in Islam.</p> <p>. Exemplary models on the protection of human rights in Islam.</p> <p>The third chapter highlights human rights in the declarations and covenants. The following topics are amplified:</p> <p>. Attention to human rights and their apportionments.</p> <p>. The declarations and documents in Islam versus Western approaches.</p> <p>The fourth chapter explores “Human Rights Pertinent to Criminal Procedures”. Details follow:</p> <p>. The protection of human rights related to criminal procedures in Sharia and Arab legislations.</p> <p>. The origination of human rights related to procedures applicable to other laws and legislations</p> <p>The fifth chapter focuses on "Rights of the Accused". Details follow:</p> <p>. The guarantee of rights connected with the accusation proof.</p> <p>. Rights related to the accused personality.</p> <p>. The rights of the accused in soliciting assistance of attorney in criminal procedural processes.</p> <p>The sixth chapter reviews the rights of the victim from bi-dimensional standpoints:</p> <p>First: The rights of the victim in Islamic Sharia.</p> <p>Second: The rights of victims in international laws and agreements.</p> <p>In its conclusion, the book offered the findings and recommendations of the study.</p> Muhammad Abdellah Weld Muhammaden (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/110 Wed, 01 Dec 2010 00:00:00 +0300 English for Security Purposes: An Anthology with language Teaching Exercises https://nup.nauss.edu.sa/index.php/sr/catalog/book/109 <p style="direction: ltr;">This book includes select passages in English for average level English language students. It aims at presenting English language texts and terminologies used by the security men in Arab countries, Interpol, Narcotics Control Departments, and the International Court.</p> <p style="direction: ltr;">The book includes select subjects associated with combating human trafficking, commitment of crimes, violence against children and women, terrorism, money laundering, and genocides.</p> <p style="direction: ltr;">Each passage includes a number of linguistic activities for identifying the meanings of words and structures of the passage. In addition, it contains an analysis of the rules of sentence structures, parts of speech, and conjugation of verbs. </p> <p style="direction: ltr;">The book reflects the significance of learning and teaching English since it has become the most widely spoken language of the world. English is the modern-day language. It is the language of science, technology, scientific research, economy, e-trade, aviation, computer, tourism, and travel.</p> <p style="direction: ltr;">Accordingly, the book seeks to facilitate the teaching of English language as it meets the dominant needs of the daily life. It is the most widely used language at world-wide scale. Anyone who knows English can easily interact with others, affecting them and get affected by others in the practical, cultural and living domains.</p> <p style="direction: ltr;">The book abides by the new trends in teaching foreign languages. It utilizes global language policies associated with teaching foreign languages, the successful local and global experiments in teaching foreign languages, the relationship between teaching foreign languages and the local languages for cultural purposes, the impact of learning foreign languages on culture, and selecting the easiest methods for learning English language for security purposes to achieve the objectives of the targeted audience.</p> Fouad Abd-Rabo Abdul-Hadi, Saad Ibrahim Mandisha, Samir Mustafa Mahmoud (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/109 Mon, 01 Nov 2010 00:00:00 +0300 League of Arab States and Resolving Arab Disputes https://nup.nauss.edu.sa/index.php/sr/catalog/book/108 <p>This book deals with the League of Arab States being a reference institution for the Arab nation. It addresses the active and positive role expected to be played by the League in resolving disputes among member states and in contributing to the establishment of a stable environment, as is the case with other regional organizations. It starts from the main question of the study: Is the failure of the League of Arab States in resolving Arab disputes caused by poor performance of the League or is it due to other structural organizational reasons?</p> <p>The book aims to achieve the following objectives:</p> <p>. Identify the nature and forms of Arab disputes.</p> <p>. Clarify the most important means employed by the League of Arab States in peacefully resolving Arab disputes.</p> <p>. Identify the required conditions to make the decisions of the Council of the League of Arab States in force and binding in resolving disputes.</p> <p>. Clarify the most important trends that noted the need to amend the Charter of the League of Arab States in order to respond to the development of this age in resolving crises and the settlement of Arab disputes.</p> <p>The book comprises an introductory chapter, four chapters, findings, and recommendations.</p> <p>The introductory chapter presents the problem of the study, its questions, objectives, importance, and terminology.</p> <p>The first chapter discusses the objectives and principles of the League of Arab States and the challenges it faces.</p> <p>The second chapter deals with the structure of the League and its solidarity role.</p> <p>While the third chapter addresses the policy of the League.</p> <p>The fourth chapter views the political approach of the League.</p> <p>Then the book offers the findings and recommendations of the study.</p> Ghaleb bin Ghallab Al Otaibi (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/108 Fri, 01 Oct 2010 00:00:00 +0300 The Skills of Investigating the Crimes Associated with Currency Counterfeit https://nup.nauss.edu.sa/index.php/sr/catalog/book/187 <p>The present book deals with the crimes related to currency counterfeit. These crimes are considered technical crimes featured with the continuous development. Further, these are associated with the technological and scientific development. Such features of advancement and development are characterizing the print means, computer systems and communication tools in the modern age.</p> <p>The present book seeks to achieve the following objectives:</p> <ul> <li>The identification on the crimes associated with currency counterfeit in the context of their development. Following points will be explained:</li> </ul> <p>o The nature, bases and the means and methods of their commission;</p> <p>o Their causes and consequential impacts;</p> <p>o The efforts and assisting tools aiming to protect the currency from counterfeit;</p> <ul> <li>Identification on the skills of the criminal investigator related to the crimes of currency counterfeit;</li> <li>Determination of the effective skills of the criminal investigator for neutralizing the crimes of currency counterfeit; and</li> <li>Realization of the factors effective in the skills of the criminal investigator regarding the crimes of currency counterfeit.</li> </ul> <p>The present book includes three chapters. The first chapter deals with the theoretical framework of the current research study. Also, it records previous pertinent studies. The second chapter presents the methodological framework of the present research study. Lastly, the third chapter yields the research findings and their analytical interpretations. The book offers, in its conclusive section, the recommendations. The most decisive are as follow:</p> <ul> <li>Attention should be assigned on the acquisition of all personal, administrative, human and technical skills by the criminal investigator in the field of currency counterfeit. Also, such skills should be developed to perform works successfully;</li> <li>The provision of solutions for settling the dispute that may arise between many areas of jurisdiction should be incorporated. Such dispute has a negative impact on the performance of the criminal investigator relative to the crimes of currency counterfeit;</li> </ul> <p>&nbsp;</p> Abdullah bin Saud Alsrani (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/187 Wed, 01 Sep 2010 00:00:00 +0300 The Control on Precursors and Chemicals Used for Manufacturing Narcotics https://nup.nauss.edu.sa/index.php/sr/catalog/book/107 <p>This book includes research and studies presented in the scientific seminar under the title “The Control on Precursors and Chemicals Used for Manufacturing Narcotics”. The seminar was organized by the University at its headquarter in Riyadh during the period 23 - 25/12/2002. These research and studies are:</p> <p>. The Role of Chemical Industries in Limiting the Use of Precursors and Chemicals in the Illicit Manufacturing of Narcotics By Prof. Abdel-Rahman Abdullah Al-Warthan. The research deals with the concept of the narcotic substance and the kinds of narcotics.</p> <p>. The Role of Forensic Laboratories in the Control on Precursors and Chemicals Used for the Illicit Production of Narcotics By Brig. Gen. Mamdouh bin Gloy Alsherifi. This research provides the definition of precursors and the precautions necessary for controlling its use.</p> <p>. The Role of Central Authority of Pharmaceutical Affairs in the Control on Precursors and Chemicals Used for Manufacturing Narcotics By Pharmacist Qasim Yahya Al-Maharesh. The research demonstrates the origin of the United Nations Convention against Illicit Traffic in Narcotics and Psychotropic Substances.</p> <p>. The Precursors and Chemicals Used for Manufacturing Narcotics and Psychotropic Substances By Dr. Omar Al-Sheikh Al-Asam. The present research offers the definition of narcotic substance and the types of narcotics and psychotropic substances.</p> <p>. The Local, Arab, and International Efforts to Control the Precursors and Chemicals Traffic Used for the Illicit Manufacturing of Narcotics By Major General Dr. Ali Ahmad Ragheb. The research presents the general framework of the international cooperation for fighting narcotics.</p> <p>. The United Nations Role in Controlling the Precursors and Chemicals By Major General Dr. Mohammad Fathy Eid. This research expounds the international convention for combating narcotics and the international legal rules governing such control.</p> Abdel-Rahman Abdullah Al-Warthan, Mamdouh bin Gloy Alsherifi, Qasim Yahya Al-Maharesh, Omar Al-Sheikh Al-Asam, Ali Ahmad Ragheb, Mohammad Fathy Eid (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/107 Tue, 01 Jun 2010 00:00:00 +0300 The Administrative and Security Training: A Contemporary Vision for the 21st Century https://nup.nauss.edu.sa/index.php/sr/catalog/book/106 <p>This book sheds light on the administrative and security training that is assigned to managers, planners, and designers of the training programs in addition to trainers, evaluators, and developers who are responsible for training and education for various professional categories.</p> <p>The book illustrates all steps and mechanisms of training as a promising industry.</p> <p>The book contains eight chapters.</p> <p>The first chapter discusses training and its nature. It discusses:</p> <p>. The importance of the training according to its parties.</p> <p>. The importance of the training according to its objectives.</p> <p>. Types of the training.</p> <p>. Training during work.</p> <p>. Training outside work.</p> <p>The second chapter expounds administrative training and its nature it discusses:</p> <p>. Justifications for the administrative training.</p> <p>. Justifications for governmental administrative training.</p> <p>. Dimensions of governmental administrative training.</p> <p>. The most conspicuous Arab training centers and institutes.</p> <p>. The most significant administrative training programs.</p> <p>The third chapter deals with security training. It discusses:</p> <p>. The nature of security training and its scope.</p> <p>. The objectives of security training.</p> <p>. The types of security training.</p> <p>. The features of security training.</p> <p>. The principles of security training.</p> <p>. The most important contemporary programs of security training.</p> <p>. The obstacles and problematic issues of security training, and a model for a security training program.</p> <p>The fourth chapter defines the training requirements.</p> <p>The fifth chapter presents a discourse on designing training programs.</p> <p>The sixth chapter illustrates the following topics:</p> <p>. The implementation of training courses.</p> <p>. The executive tasks of training, methods and ways.</p> <p>. Selection and comparison criteria between training methods.</p> <p>The seventh chapter provides discussion on the assessment of the training results.</p> <p>The eighth chapter deals with:</p> <p>. Development of the training industry.</p> <p>. Justifications and causative factors for development.</p> <p>. Reasons for the training industry.</p> <p>. Future attitudes for training industry development.</p> <p>. Suggested programs for training industry development.</p> Amer Khudhair Al-Kubaisi (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/106 Sat, 01 May 2010 00:00:00 +0300 The International Contributions on Combating Human Traffic (The Second Part) https://nup.nauss.edu.sa/index.php/sr/catalog/book/105 <p>This book is the second part of the scientific publication entitled "The International Contributions on Combating Human Trafficking". The book contains the following research:</p> <p>. The Position of Islamic Education Toward Trafficking in Women and Children and Human Organs Transmission By Dr. Mohammad Fadul Almurad. This research deals with the issue of trafficking in children and women and the position of Islamic Sharia towards it.</p> <p>. Incrimination of Women Trafficking and their Exploitation in the Islamic Sharia By Dr. Muhammed Abdellah Weld Muhammden. This research expounds four sections that show the position of Islamic Sharia toward women trafficking and exploitation.</p> <p>. The Position of Islamic Sharia Toward Human Organs Transmission By Dr. Mohamad Al-Medni Busaq. The research discusses the Islamic position toward transmission of the human organs.</p> <p>. Arab Models on Countering Trafficking in Persons. This research shows the Arab model law to counter the crimes related to trafficking in persons.</p> <p>. Preliminary Project on the Human Rights Declaration of the Cooperation Council for the Arab States of the Gulf.</p> <p>. The Unified Draft legislation on Combating Trafficking in Person for the Cooperation Council States. The research shows the draft prepared by a panel of specialized experts.</p> <p>. A Discussion on Trafficking in Persons for the Purpose of Prostitution: Sexual Exploitation or Personal Choice and a Demand Issue. This research is prepared by the Commission on the Status of Women (CSW) operating under the supervision of the United Nations Economic and Social Council (ECOSOC) in its forty ninth session.</p> <p>.Trafficking in Children (Children Recruitment in the Armed Struggles, Prostitution, Sexual Tourism, Illegal Adoption).</p> <p>. Trafficking in Persons for the Purpose of Forced Labor within the framework of the International Labor Conference.</p> Mohammad Yahya Matar and a Group of Experts and Specialists (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/105 Thu, 01 Apr 2010 00:00:00 +0300 The International Contributions on Combating Human Traffic (The First Part) https://nup.nauss.edu.sa/index.php/sr/catalog/book/104 <p>This book deals in its first part with the various kinds of human trafficking especially after its recent catastrophic spread. It seeks to raise awareness on the dangers of this phenomenon and to focus on the contributions of Arab countries to enact legislations, regulations, and laws to reduce its negative effects. Further, it highlights the role played by the religious and media institutions to disseminate awareness and edification on combating human trafficking.</p> <p>The book discusses various issues related to human trafficking from an international perspective including forced labor, female migrants exploitation, sale of children for the purpose of illegal adoption, etc.</p> <p>The book provides an example that may be considered a focal point for discussing a comprehensive issue involving legislations on combating human trafficking. As such, this book may be regarded to as a comprehensive scientific source reference in the field of combating human trafficking and as a proof for Arab and international efforts on prohibiting this crime.</p> <p>The book contains the following research:</p> <p>. Human Trafficking: An Overview By Prof. Mohammad Yahya Matar. This research addresses the trends focusing on the victims of human trafficking in accordance with the norms of the international law.</p> <p>. Combating Crimes on Human Trafficking in the International Agreements and the National Law of the United Arab Emirates By Adviser Adel Maged.</p> <p>. Combating Human Trafficking: The National Legislative Framework in the Kingdom of Saudi Arabia By Dr. Nasser Bin Ragih Al-Shehrany. This research deals with the position of Islamic Sharia on trafficking in persons. It also defines the trafficking in persons and joining of the kingdom to the international agreement with direct relevance to the human trafficking, and the international instruments with indirect relevance to the human trafficking.</p> Mohammad Yahya Matar and a Group of Experts and Specialists (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/104 Mon, 01 Mar 2010 00:00:00 +0300 Women Crimes: The Social Factors Leading to the Commission of Crimes by Women https://nup.nauss.edu.sa/index.php/sr/catalog/book/103 <p>This book discusses the social factors leading to the commission of crime by women in the Saudi society. Such factors are as follow:</p> <p>. Family disintegration. Most studies affirm that family has a great impact on the behaviors of its members, positively or negatively.</p> <p>. The perversion cases inside the family, especially among family members who embody the model for &nbsp;females.</p> <p>. The low economic standard of living which means poverty and personal incapability to meet the minimum requirements of life.</p> <p>. Bad company.</p> <p>. The low level of education among family members</p> <p>. Leisure time.</p> <p>. The neighborhood.</p> <p>The book contains six chapters.</p> <p>The first chapter discusses the methodological framework of the research, its subject, importance, objectives, questions, concepts, approach, and tools.</p> <p>The second chapter deals with the theories interpreting the criminal behaviors.</p> <p>The third chapter focuses on the previous studies.</p> <p>The fourth chapter sheds light on the correctional institutions through the role of jails, the historic vision of the prisoners treatment, the legal enactments regulating the administration of the prisons, and the role of the reformative institutions.</p> <p>The fifth chapter describes women crimes within the religious context.</p> <p>The six chapter demonstrates the social factors leading to the commission of crimes by women.</p> <p>The book concludes with the most important findings and recommendations of the study. The following are outstanding:</p> <p>. Further scientific research on the social factors leading to the commission of crimes by women should be conducted.</p> <p>. Concerned bodies should facilitate researchers missions inside the reformative institutions.</p> <p>. Awareness programs through different mass media should be raised.</p> <p>. The number of women clubs in working-class neighborhoods should be established on increasing scale.</p> <p>. Procedures of reformative institutions related to the period of penalty expiration for female inmates whom parents refuse to accept should be reconsidered.</p> Basma Bint Abdallah Al-Sennary (Author) Copyright (c) 2010 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/103 Mon, 01 Feb 2010 00:00:00 +0300 Combating Non-Traditional Disasters https://nup.nauss.edu.sa/index.php/sr/catalog/book/102 <p>This book discusses disasters and crises in terms of their hyper-acceleration and serious consequences. It highlights the process of their management which is overwhelmed with concern of the fellow-nationals and the nation itself. It also sheds light on all issues relative to disasters and the modern techniques to counter them.</p> <p>Book objectives are:</p> <p>. Identify the nature and concept of disasters in general.</p> <p>. Identify non-traditional disasters and their concept in particular.</p> <p>. Recognize rescue and evacuation techniques.</p> <p>. Identify nuclear, biological and chemical hazards.</p> <p>. Recognize the requirements of counter plans against non-traditional disasters.</p> <p>. Recognize modern techniques used in countering disasters in general, and non-traditional disasters in particular.</p> <p>. Identify procedures of prevention against non-traditional disasters.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p> <p>The book comprises an introduction and five chapters.</p> <p>The introduction presents an introductory discourse to the study, its problem, importance, objectives, questions, terminologies, and concepts.</p> <p>The first chapter deals with disasters and their characteristics from national and international perspectives.</p> <p>The second chapter deals with the management of disasters through the following topics:</p> <p>. Principles of disaster management.</p> <p>. Challenges related to disaster management in the Arab world.</p> <p>. The nature of challenges relevant to disaster management.</p> <p>. Basic components of disaster management.</p> <p>. Stages of the disaster management plan.</p> <p>The third chapter discusses the stages of countering disasters.</p> <p>The fourth chapter deals with non-traditional disasters in terms of:</p> <p>. Management of non-traditional disasters.</p> <p>. Early usage of the concept.</p> <p>. Development of usage.</p> <p>. Divisions and components.</p> <p>. The debate over weapons of mass destruction.</p> <p>. Atomic waste as a national and international problem.</p> <p>. Models of disasters caused by nuclear reactors.</p> <p>. Plan for monitoring and countering nuclear and radioactive threats.</p> <p>. Prevention against weapons of mass destruction.</p> <p>The fifth chapter deals with terrorism and weapons of mass destruction.</p> Abbas Abu-Shama Abdulmahmoud (Author) Copyright (c) 2009 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/102 Fri, 01 May 2009 00:00:00 +0300 Human Security: The Concept and its Application in the Arab and International Real Life https://nup.nauss.edu.sa/index.php/sr/catalog/book/101 <p>This book deals with the concept of human security by focusing on the evolution of the concept in the bi-dimensional context – academic and applied. Also, it studies the evolution of the concept of human security in the post-cold war era and identifies the most significant and important factors that contribute to the emergence of this concept. Lastly, it discusses various definitions of the concept.</p> <p>The book discusses the debate about the concept of human security and its various dimensions, in addition to the number of apprehensions that stem from using the concept as a pretext to interfere in the affairs of the region.</p> <p>The book contains six chapters.</p> <p>The first chapter deals with the historical context of the concept of human security.</p> <p>The second chapter identified human security concept.</p> <p>The third chapter deals with the conceptual map and intellectual ingredients of the concept of human security.</p> <p>The fourth chapter addresses the concept of human security at the Arab level.</p> <p>The fifth chapter highlights the applications of the concept of human security: visions of states, through the following:</p> <p>.The development dimension of the concept of human security "the Japanese vision"</p> <p>.The political dimension of the concept of human security "the Canadian vision”</p> <p>The sixth chapter deals with the applications of the concept of human security through the following:</p> <p>.Visions of regional and international organizations</p> <p>. Visions of the United Nations</p> <p>. Visons of the EU</p> <p>. Visions of the ASEAN</p> <p>. The African initiative for human security</p> <p>The book concludes that despite the serious attempts to study human security, this concept is still in the formative process. There is no definite agreement on the various dimensions that form this concept. Also, most of the definitions provided to the concept are comprehensive.</p> Khadija Arafa Muhammad Amin (Author) Copyright (c) 2009 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/101 Wed, 01 Apr 2009 00:00:00 +0300 Future Gains of Criminal Penalties from A Reformative Perspective https://nup.nauss.edu.sa/index.php/sr/catalog/book/99 <p>This book deals with the future gains of criminal penalties from a reformative perspective. It highlights the importance of criminal penalties in reforming the criminal and combating crime. It is not confined to the criminal himself. Rather, the whole community is in a war against crime. In substance, the penalty is necessary, but it doesn't benefit anything, especially for past criminal acts. It doesn't get things back to what it was before the criminal act. Therefore, its importance relates to its future impact.</p> <p>The book stresses that future gains of penalties can't be achieved while looking backward as the criminal act is ended. While looking at the future in the proper framework, the penalty becomes more homogenous with the reformative programs. Therefore, the question and objective of this research is to determine the potentiality of the criminal penalty in achieving the future gain of the penalty.</p> <p>The book contains an introduction and three chapters. First chapter deals with the theoretical framework of the study. It addresses several subjects such as changing the punishment philosophy, explanatory theories of crime and punishment in society, the interpretation of crime and punishment in the Islamic Sharia. Finally, it deals with rational punishment theories; sociology of judiciary; evolution of judiciary, its development and the protection of its independency; preparation of judiciary and its specializations; preparation of the procedures of litigation, sociology of courts and evaluating its efficacy.</p> <p>Second chapter highlights previous studies relevant to this research.</p> <p>Third chapter deals within the framework of the study and the methodological procedures of the research, in addition to research findings and their interpretation.</p> Midoah Bin Muhammad Al Midoah (Author) Copyright (c) 2009 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/99 Sun, 01 Feb 2009 00:00:00 +0300 Traffic Safety https://nup.nauss.edu.sa/index.php/sr/catalog/book/98 <p style="direction: ltr;">This book deals with the important topic of traffic safety in relation to traffic and transport; the effectiveness of road systems; preventive plans; and monitoring and violations fines payment programs.</p> <p style="direction: ltr;">The objectives of the book are summarized as follows:</p> <p style="direction: ltr;">. Identification on the nature of accidents and its social and economic reflections.</p> <p style="direction: ltr;">. Review the registered preventive initiatives and ensuring its vital aspects.</p> <p style="direction: ltr;">. Exploring new ways to develop preventive strategies within the context of the international developments.</p> <p style="direction: ltr;">. Identification on the mechanisms and organizations for the sake of establishing tangible institutional organization. </p> <p style="direction: ltr;">The book provides a deep analytical insight into the traffic actual situation. It stresses keenness on issuing guidelines and initiatives in chronological context. It addresses that preventive project in the field of traffic safety is a kind of communication that underlies the foundations of future programs. Also, it gains benefit from lessons learned from pertinent experiences of the last three or four decades.</p> <p style="direction: ltr;">The book contains four chapters.</p> <p style="direction: ltr;">First chapter deals with the research problem, importance, objectives, questions, approach, and concepts.</p> <p style="direction: ltr;">Second chapter deals with the development of traffic system and its reflections on safety.</p> <p style="direction: ltr;">Third chapter deals with traffic safety. It reviews the following topics:</p> <p style="direction: ltr;">. Summary of the international experiments.</p> <p style="direction: ltr;">. A reading into the European experiments.</p> <p style="direction: ltr;">. A reading into the Arab experiments.</p> <p style="direction: ltr;">. The contributions of regional and international organizations. </p> <p style="direction: ltr;">Fourth chapter deals with recent trends:</p> <p style="direction: ltr;">. Institutional organization.</p> <p style="direction: ltr;">. Traffic strategies.</p> <p style="direction: ltr;">. Scientific research.</p> <p style="direction: ltr;">. Traffic communication.</p> <p style="direction: ltr;">The offers a number of recommendations, the most salient are:</p> <p style="direction: ltr;">. Institutional organization level.</p> <p style="direction: ltr;">. Knowledge development level.</p> <p style="direction: ltr;">. Academic research level.</p> <p style="direction: ltr;">. Behavior development level.</p> <p style="direction: ltr;">. Legislation and traffic control level.</p> <p style="direction: ltr;">. Roads network level.</p> <p style="direction: ltr;">. Vehicle level.</p> <p style="direction: ltr;">. Ambulance development level.</p> Mohsen Al-Ajmi Eissa (Author) Copyright (c) 2009 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/98 Thu, 01 Jan 2009 00:00:00 +0300 Fraud-Related and Organized Crimes https://nup.nauss.edu.sa/index.php/sr/catalog/book/96 <p>This book sheds light on the studies and research presented at the scientific symposium "The Relationship Between Fraud-Related and Organized Crime", organized by the University in cooperation with Mansoura University in Egypt during the period 18-20/6/2007. Topics of the symposium are:</p> <p>. Fraud-related: Its Identity and Characteristics by Prof. Ahmed Abo Khatwa. This research deals with elements and characteristics associated with fraud.</p> <p>. Techniques of fraud and their means by Prof. Reda Almazaghny. This research deals with ways and means of organized fraud.</p> <p>. Organized Crime: Its nature, characteristics and constituent by Prof. Ahmed Zaher. This research deals with the nature and characteristics of organized crime.</p> <p>. Nature of the Relationship Between Fraud-Related and Organized Crimes by Prof. Ghannam Alghannam. This research deals with the relationship between fraud-related and organized crime.</p> <p>. The Role of Criminal Legislation in Prevention Organized Fraud by Prof. Mostafa Bitar. The objective of this research is to visualize a criminal policy able to prevent organized fraud.</p> <p>. Means of Combating Fraud in Organized Crime by Prof. Ali Hamad. This research deals with the concept of organized crime, the concept of fraud, and ways of ensuring protection against both fraud-related and organized crime.</p> <p>The book presented the recommendations offered during the symposium. These are as under:</p> <p>. Ensure the importance of determining a specific definition of organized crime in order to determine sanctions regulations and laws should be assured.</p> <p>. Arab countries are called to review regulations "laws" related to fighting fraud and organized crime.</p> <p>. Arab countries should criminalize the membership of organized crime gangs as a distinct crime.</p> <p>. It is imperative to increase penalties on fraud committed by criminal organizations.</p> <p>. It is of great importance to improve the performance of Arab security bodies.</p> Ahmed Abo Khatwa, Reda Almazaghny, Ahmed Zaher, Ghannam Alghannam, Mostafa Bitar, Ali Hamad (Author) Copyright (c) 2008 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/96 Tue, 01 Apr 2008 00:00:00 +0300 Nature of Money Laundering and Its Relationship to the Prevalence of Drugs https://nup.nauss.edu.sa/index.php/sr/catalog/book/95 <p>This book deals with the money laundering phenomenon and its accompanying serious effects on economic activities, especially in the context of globalization and its negative consequences on all communities. The drug problem exacerbated on its various dimensions: production, smuggling, illicit trading and money laundering.</p> <p>The book consists of four chapters.</p> <p>First chapter deals with the problem of drugs on the regional and international levels. It concludes changes occurring the drug problem and factors explaining international smuggling and its methods.</p> <p>Second chapter deals with the danger of money laundering and its role in enhancing the spread of drugs. Also, it provides special attention on nature of money laundering crimes and the role of money laundering in the prevalence of drugs.</p> <p>Third chapter deals with the technical means of laundering money gained from drug crimes. Both – conventional and modern – are manipulated.</p> <p>Fourth chapter deals with the criminal policy in confronting money laundering obtained from drugs-related crimes: it explains multiple issues; the international response to money laundering, efforts of regional powers to confront money laundering; and the national strategies to control money laundering.</p> <p>The book, in its conclusive section, offers some recommendations, the most salient are:</p> <p>. Arab countries should establish comprehensive internal systems for the protection and supervision of banks and non-banking financial institutions. This is in addition to natural or legal persons who engage professional or commercial activities.</p> <p>. Feasible measures should be implemented to detect and monitor cash movement and negotiable instruments across extra-territorial boundaries with measures of securities that ensure proper use of information without impeding the movement of the project capital in any way.</p> <p>. In establishing regulatory and supervisory systems it is important to follow the guidance of the relevant initiatives taken by regional, interregional and multilateral institutions.</p> Adel Hassan El-Sayed (Author) Copyright (c) 2008 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/95 Sat, 01 Mar 2008 00:00:00 +0300 The Illegal Immigration and the Crime https://nup.nauss.edu.sa/index.php/sr/catalog/book/94 <p>This book discusses illegal immigration in multiple contents: its volume, standards, flows, characteristics, and consequent repercussions.</p> <p>This book presents four chapters.</p> <p>First chapter deals with concepts and terminologies of immigration, legal and illegal immigration, the relationship between asylum and immigration, international immigration and its motives.</p> <p>Second chapter discusses illegal immigration and its characteristics included in the presentation are its flows from Maghreb countries as the crossing point for illegal immigrants from Africa to Europe, Turkey as the crossing point for illegal immigration from the Middle East and Eastern Europe to Western Europe, &nbsp;Egypt as the&nbsp; crossing point for illegal immigration from Africa to Europe and America.</p> <p>Third chapter discusses illegal immigration and its crime from a global perspective.</p> <p>Fourth chapter deals with the mechanisms for countering illegal immigration.</p> <p>The book produced a number of recommendations. The most salient are:</p> <p>. There should be bilateral labor agreements between the labor-exporting countries and the labor-importing countries according to the law of supply and demand in the international labor market. Also, secure humanitarian frameworks should be made available. These frameworks should organize, satisfy the immigration requirements and achieve the high levels of immigration interests both the exporting and importing countries.</p> <p>. It should be considered imperative to implement the development programs creating job livelihood opportunities within the labor-exporting countries.&nbsp;</p> <p>. Research studies should be conducted, focusing on the inclusion of immigration as key element within the national strategic plans for the comprehensive development. By so doing, the poverty will be minimized, and job opportunities will be provided. Upon the formulation of immigration policies and programs, the real partnership between the governments on one part and the private sector and civil society organizations on the other part can be utilized. Also, the government capabilities for addressing the immigration-related problems should be strengthened.</p> Osman Al Hassan Mohamed Nour , Yasser Awad El-Karim Al-Mubarak (Author) Copyright (c) 2008 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/94 Tue, 01 Jan 2008 00:00:00 +0300 The Violence Among The University Youth https://nup.nauss.edu.sa/index.php/sr/catalog/book/93 <p>This book discusses violence among university youth and its relationship with some psychological and social variables. Such relationship reveals that most influential variables represent causative determinants.</p> <p>The book aims to reveal the background of university youth violence. It also points out the motivational psychology underlying this violent behavior. In addition, verification of&nbsp; correlation between violence in its various dimensions on the one hand, and the alienation and the socio-economic are verified variables on the other hand.</p> <p>As such the importance of this book that it discusses one of the important research topics either in theory or in practice is candid. In theory, opinions of&nbsp; the various schools of thought differ widely on interpreting the violence. The book, therefore, sheds light on theoretical frameworks and concepts used. This provides benefit from the theoretical aspect.</p> <p>In practice, findings of many researches and studies reveal that the university youth violence is associated with a number of psychological variables such as: negative self-esteem; lack of personal efficiency; pessimistic outlook on life; and feeling of loneliness; alienation; frustration; and despair.&nbsp;&nbsp;</p> <p>The book includes five chapters.</p> <p>First chapter discusses study problem, objectives, significance, terminology, and scope.</p> <p>Second chapter focuses on the theoretical framework, concepts used, concept of violence, study presumptions, study methodology, study procedures, study population and sample.</p> <p>Third chapter discusses the scales used in the study: scale of university youth violence, scale of alienation, social and economic status form, and scale of family education.</p> <p>Fourth chapter presents study findings and their interpretations as follow: findings associated with motivates towards violence, findings associated with the relationship between violence and the study variables, and findings associated with the possible expectations of variables leading to violence.</p> <p>Fifth chapter provides a suggestive project for addressing and eliminating the violent behaviors of teenagers and youths.</p> Tahani Mohamed Osman Munib, Azza Mohamed Suleiman (Author) Copyright (c) 2007 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/93 Sun, 01 Jul 2007 00:00:00 +0300 Arabic Security Training and Its Reality and Development Perspectives: An Analytical Study of the Experiences and Trends https://nup.nauss.edu.sa/index.php/sr/catalog/book/92 <p>This book deals with the Arabic security training and its development perspectives. The author surveyed the reality of the security training throughout the Arab world without any commitment to the regional scale. This study is based on the information officially authenticated and based on the experiences of the Arab countries. Also, the study includes the field analysis of opinions of the Arab training institutions. This is oriented to regulate&nbsp; the reality of the training and to examine the future perceptions necessary for its development.</p> <p>The study comprises six chapters.</p> <p>First chapter includes introductory backgrounds: purposes, importance; questions; methodology; determinants; and structure.</p> <p>Second chapter expounds the theoretical framework of security training, its importance, types and main stages, and includes a summary of previous studies.</p> <p>Third chapter focuses on the Arab experiences and achievements associated with infrastructures and training programs.</p> <p>Fourth chapter presents research findings of the field study and its related statistical analyses.</p> <p>Fifth chapter provides the experiment of Naif Arab University for Security Sciences in the field of security training.</p> <p>Sixth chapter incorporates findings and recommendations of the study.</p> <p>The book yielded some recommendations. Most important are:</p> <p>. Security training leaderships should be aware that the security training is a means not an end itself.</p> <p>. Security training institutes should connect their training programs with the types of problems that should be resolved.</p> <p>. Security institutes, centers and academies should pay attention for the specialized and qualitative training to counter specific crimes and problems.</p> <p>. Security institutes, centers and academies should develop a service system for the staff of individuals and officers.</p> <p>. Arab security institutes, centers and academies should exchange evidences and training plans and remove obstacles between the Arab training centers. University civilian training&nbsp; centers and specialized colleges should have&nbsp; copies of such materials.</p> Amer Khudhir Hamid El-Kubaisi (Author) Copyright (c) 2007 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/92 Sun, 01 Apr 2007 00:00:00 +0300 International Economic and Financial Crimes and Methods of Their Encounters https://nup.nauss.edu.sa/index.php/sr/catalog/book/90 <p>The present book deals with the subject of International Financial and Economic Crimes and Methods of Encounter.</p> <p>It offers a scientific study on international financial and economic crimes and their repercussions linked with international, regional and national contributions in the form of mechanisms and tools to combat such crimes.</p> <p>Such crimes carry gigantic importance – social and political – in the modern age, it should be comprehensible that such crimes have a potential threat to the world security. It should also be understood that such crimes cast grave impact on the modern world. This, in particular, is noteworthy in the wake of important developments – globalization; scientific advances; technological progress; sapid communication; and geopolitical changes. All such developments have tended to dismantle gradually the traditional structures. Also, such developments have given an international orientation towards liberal and free economy with standards and stable economic values.</p> <p>The book comprised an introduction and four chapters.</p> <p>First chapter deals with the dangers stemming from international economic and financial crimes and their consequent repercussions, where two topics are elaborated, the nature of international economic and financial crimes and the damages and repercussions springing from international economic and financial crimes.</p> <p>Chapter two presents the forms of international economic and financial crimes and the factors accounting for their dissemination. This presentation is provided under the following sections:</p> <p>. Important forms and manifestation of international economic and financial crimes.</p> <p>. Factors leading to the dissemination of international economic and financial crimes.</p> <p>Chapter three focuses on the international counter measures to combat economic and financial crimes.</p> <p>Chapter four highlights the methods and mechanisms utilized in combating international economic and financial crimes through the following:</p> <p>. Means and methods of combating economic and financial crimes.</p> <p>. Agencies combating such crimes.</p> Mukhtar H. Shabili (Author) Copyright (c) 2007 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/90 Mon, 01 Jan 2007 00:00:00 +0300 Forgery and Plagiarism in Arabic Manuscripts https://nup.nauss.edu.sa/index.php/sr/catalog/book/84 <p>This book addresses forgery and plagiarism in Arab manuscripts. It uncovers the reality of some manuscripts with forged titles, authors names, and dates of transcription. Forgery may be performed intentionally or by mistakes committed by transcribers. Also, forgery may originate from transcribers misreading, misuse by paper manufacturers and others.</p> <p>The book includes five chapters.</p> <p>First chapter deals with forgery, counterfeit, and plagiarism through the following:</p> <p>. Definition of forgery, counterfeit, and plagiarism.</p> <p>. Objectives and importance of the study.</p> <p>. Previous studies.</p> <p>. Methodology of the study.</p> <p>Second chapter addresses causes, motivations, and detection of forgery, counterfeit and plagiarism through the following:</p> <p>. Types and kinds of counterfeit and forgery.</p> <p>. Forgery and counterfeit methods.</p> <p>. Causes and motivations of forgery and counterfeit.</p> <p>. Factors assisting in the detection of counterfeit.</p> <p>Third chapter shows the places of forgery and counterfeit in manuscripts through discussing the scientific content and physical features of Arabic transcripts.</p> <p>Fourth chapter focuses on the perpetrators of the crimes of forgery, counterfeit, and plagiarism. Namely, authors, paper manufacturers, transcribers, recipients, owners, bookbinders, merchants of manuscripts, verifiers, and publishers.</p> <p>Fifth chapter expounds the issue of literary thefts and plagiarism.</p> <p>The book offers some recommendations, these are as follow:</p> <p>. The physical features of Arabic transcripts and their scientific content should be carefully examined before possession, investigation, or indexing.</p> <p>. Addresses, names of authors, and dates of transcription should be verified.</p> <p>. Transcripts should be carefully investigated and indexed with scientific, accurate and detailed means.</p> <p>. The subject of Arabic transcript should be taught in the universities concerned with the heritage.</p> <p>. Publishing houses should avoid any manipulation with the titles of transcripts and should not publish manuscripts under commercial names.</p> <p>. Specific controls should be set for the verification and publication of transcripts.</p> Abed Suliman Al-Mashwakhi (Author) Copyright (c) 2001 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/84 Fri, 01 Jun 2001 00:00:00 +0300 The criminal Justice Systems in Arab Countries: Stages Prior to Judiciary Proceedings https://nup.nauss.edu.sa/index.php/sr/catalog/book/83 <p>This book expounds the subjects of "The Criminal Justice Systems in Arab Countries: Stages Prior to Judiciary Proceedings". This is in light of social, economic and political variables recently experienced by the states of the region. The latter necessitates reconsidering the judiciary systems regulating the justice that is based on, legislative rules, customary rules, habits, traditions, or religious-fundamentalist rules that agree with the social and economic renaissance.</p> <p>The findings of this book depend on the views of police officers, prosecutors, personnel of penal institutions, and relevant persons.</p> <p>This book comprises three chapters.</p> <p>First chapter discusses the subject of procedural systems in Arab countries. Details follow:</p> <p>. Jordanian Rules of Penal Trials Code.</p> <p>. Bahraini Rules of Penal Trials Code.</p> <p>. Emirati Rules of Penal Trials Code.</p> <p>. Tunisian Penal Procedures Magazine.</p> <p>. Algerian Code of Criminal Procedure.</p> <p>. Guide to the Saudi Criminal Procedure.</p> <p>. Sudanese Code of Criminal Procedure 1991.</p> <p>. Syrian Rules of Penal Trials Code.</p> <p>. Somali Code of Criminal Procedure.</p> <p>. Iraqi Rules of Penal Trials Code.</p> <p>. Qatari Code of Criminal Procedure.</p> <p>. Kuwaiti Code of Criminal Procedure.</p> <p>. Lebanese Rules of Penal Trials Code.</p> <p>. Libyan Code of Criminal Procedure.</p> <p>. Egyptian Code of Criminal Procedure.</p> <p>. Moroccan Code of Criminal Procedure.</p> <p>. Mauritanian Code of Criminal Procedure.</p> <p>. Yemeni Code of Criminal Procedure.</p> <p>Second chapter expounds the effectiveness of the procedural systems of criminal justice. Details follow:</p> <p>. Content of the effectiveness of criminal justice systems.</p> <p>. Contemporary problems of criminal justice.</p> <p>. Future prospects of criminal justice.</p> <p>. UN standard minimum rules for the administration of criminal justice.</p> <p>Third chapter focuses on the criminal justice and the procedures prior to the trial. Details are as under:</p> <p>. Required justice in the Arab society.</p> <p>. Security bodies in Arab countries.</p> Mohamed Ibrahim Zayd (Author) Copyright (c) 2001 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/83 Sun, 01 Apr 2001 00:00:00 +0300 The Criminal Justice Systems in Arab Countries: Investigation and Judicial Proceedings https://nup.nauss.edu.sa/index.php/sr/catalog/book/82 <p>This book expounds the subject of "Criminal Justice Systems in Arab Countries: Investigation and Judicial Proceedings". This is in quest of the relative justice, the protection of rights and the criminal procedure policy achieved by the Arab regimes. It investigates complaints like justice can't be achieved, and penal institutions can't accommodate prisoners.</p> <p>The book comprises six chapters.</p> <p>First chapter discusses the role of security bodies in the actions prior to the trial. Details follow:</p> <p>. Accusatory system and the roles of Police and Public Prosecution.</p> <p>. The comparative legislative amendments and the primary investigation bodies.</p> <p>. Characteristics of the sample in the actions prior to the trial.</p> <p>Second chapter expounds the mechanism of the criminal justice and criminal investigation. Details are as under:</p> <p>. The manner of picking and choosing the Public Prosecution in Arab countries.</p> <p>. Investigation authority and referral authority in Arab legislations.</p> <p>. The characteristics of sample in criminal investigation.</p> <p>Third chapter focuses on the right of defense and the accused guarantees in criminal cases. Details follow:</p> <p>. Rights of the accused in the criminal proceedings.</p> <p>. Right of defense in the Arab judicial system.</p> <p>. Sample characteristics associated with the right of defense and the accused guarantees.</p> <p>Fourth chapter expounds the judicial system in Arab countries. Details follow:</p> <p>. Organizational structure of judiciary bodies.</p> <p>. New patterns of control in regulating the criminal justice.</p> <p>. The characteristics of sample in the judiciary system.</p> <p>Fifth chapter discusses the issuance of criminal judgments. Details follow:</p> <p>. Issuance of the criminal judgments in comparative systems and Arab legislations.</p> <p>. Mechanism of issuing the criminal judgments.</p> <p>. The characteristics of sample in issuing criminal judgments.</p> <p>Sixth chapter expounds the appeal against the criminal judgments.</p> Mohamed Ibrahim Zayd (Author) Copyright (c) 2001 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/82 Thu, 01 Mar 2001 00:00:00 +0300 Voluntary Work for Inmates in the Correctional Facilities https://nup.nauss.edu.sa/index.php/sr/catalog/book/80 <p>The present book discusses the voluntary work for inmates in correctional facilities in Arab countries. This is in an attempt to rehabilitate the inmates and to integrate them into community as normal members feeling responsible for their community.</p> <p>This book comprises six chapters.</p> <p>First chapter discusses the problem, significance, objectives, methodology, and concept of the study.</p> <p>Second chapter expounds the inmates or the correctional facilities. Details follow:</p> <p>. Prison or correctional facilities.</p> <p>. Development of prison over ages.</p> <p>. Imprisonment or the punishment with the deprivation of liberty.</p> <p>. Development of the punishment with deprivation of liberty.</p> <p>. Objections to the imprisonment.</p> <p>. Imprisonments in Islam.</p> <p>Third chapter discusses work in prisons. Details follow:</p> <p>. Quakers sect and the operation of inmates.</p> <p>. The relationship between the operation of inmates and the UN rules for handling inmates.</p> <p>. Employment and forced labor within the correctional facilities.</p> <p>. Employment and the forced labor for inmates.</p> <p>. Work in prions from the Islamic perceptive.</p> <p>Fourth chapter discusses the voluntary work for inmates in the correctional facilities. Details follow:</p> <p>. UN and the minimum rules for the treatment of offenders and the work of inmates in correctional facilities.</p> <p>. Motives of voluntary work for inmates in the correctional facilities.</p> <p>. Terms and controls of the voluntary work for inmates.</p> <p>. Patterns of voluntary work for inmates in correctional facilities.</p> <p>. Voluntary work of inmates in France, Britain and China.</p> <p>. Projects operating the inmates in the correctional facilities with the participation of the private sector in Saudi Arabia.&nbsp;</p> <p>Fifth chapter expounds the US experience. Details follow:</p> <p>. Voluntary work in the US Prisons.</p> <p>. Contract system.</p> <p>. Terms of voluntary work for inmates.</p> <p>. Samples of US voluntary work for inmates.</p> <p>Sixth chapter discusses the obstacles to the voluntary work for inmates.</p> Ahsen Mubarak Talib (Author) Copyright (c) 2000 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/80 Thu, 01 Jun 2000 00:00:00 +0300 Management: The Basics and their Applications in the Economic and Security Activities https://nup.nauss.edu.sa/index.php/sr/catalog/book/79 <p>The present book expounds the management basics and their applications in economic and security activities. It aims to provide a general framework for the managerial and scientific concepts. Also, it points out and analyzes the circumstances surrounding the implementation of project and affecting its proficiency. Moreover, it focuses on the managerial problems and circumstances in Arab societies as possible.</p> <p>This book comprises nine chapters.</p> <p>First chapter discusses management and institution through the following:</p> <p>. The emergence and growing importance of management studies.</p> <p>. Studies and schools of management as well as the job of manager.</p> <p>Second chapter expounds planning as follows:</p> <p>. Planning principles.</p> <p>. Objectives and policies.</p> <p>. Decision-making.</p> <p>Third chapter focuses on the organization. Details as under:</p> <p>. The division of aspects of the activity.</p> <p>. Delegation of authority.</p> <p>. Management regulations.</p> <p>Fourth chapter expounds administrative development.</p> <p>Fifth chapter discusses the subject of coordination and its relative importance.</p> <p>Sixth chapter expounds guidance. Details follow:</p> <p>. The significance of guidance.</p> <p>. The patterns and problems of leadership; basic qualities of successful leadership; and the problems of leadership in Arab societies.</p> <p>. Morale: confidence; motivation; flexibility; and the positive and negative incentives.</p> <p>. Contact: Causes of contacts; manner of contact; characteristics of contact; problems of contact; security activity; communications; public relations; and advertisement.</p> <p>Seventh chapter expounds control. Details follow:</p> <p>. Methods and standards of control as well as the efficient performance.</p> <p>. The security performance evaluation.</p> <p>Eighth chapter discusses the functions of the project. Details follow:</p> <p>. Financial administration.</p> <p>. Purchase and storage.</p> <p>. Personnel.</p> <p>. Production or operations.</p> <p>. Transportation and marketing.</p> <p>Ninth chapter expounds the basic factors regulating the performance of project. Details follow:</p> <p>. Circumstances surrounding the implementation of the project.</p> <p>. Capital.</p> <p>. Project site.</p> <p>. Production factors.</p> <p>. Objectives and policies.</p> Saad El-Din Eshmawi (Author) Copyright (c) 2000 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/79 Mon, 01 May 2000 00:00:00 +0300 Security Media and Crime Prevention https://nup.nauss.edu.sa/index.php/sr/catalog/book/78 <p>The present book expounds security media, aiming to point out the concept, determinants, dimensions, and role of security media in safeguarding Arab societies against crime. This is in addition to the participation in founding and extending&nbsp; the philosophy of security media which is based on two pillars:</p> <p>. Providing social and cultural service for audience.</p> <p>. It is a significant method for urging the target audience&nbsp; to participate in achieving the objectives of security institutions, as well as achieving peace and security in Arab countries.</p> <p>The present book comprises seven chapters.</p> <p>First chapter expounds the scientific framework for the security media.</p> <p>Second chapter discusses the relationship between media and security.</p> <p>Third chapter focuses on the crime and the foreign media. It focuses on human and crime, interpretation of the criminal behavior, the attitude of Islamic <em>sharia</em>&nbsp; towards crime, the role of Islam in dealing with the criminal behavior, and the mass media and deviance.</p> <p>Fourth chapter discusses the security media and the political systems. Details follow:</p> <p>. Definition of politics and the political systems.</p> <p>. Moderation of Islam.</p> <p>. The functions of the political systems in contemporary society.</p> <p>. Political systems analysis approach.</p> <p>. The relation between politics and security.</p> <p>. The challenges of contemporary political systems.</p> <p>. Comprehensive security.</p> <p>Fifth chapter focuses on the characteristics of security media and the public opinion, as well as the role of security media in the prevention of crime.</p> <p>Sixth chapter expounds the security media and the contemporary challenges represented in the challenges to scientific research in the security area, psychological war, misleading advertising, rumors, bribery, environmental pollution, terrorism, drugs, and traffic accidents.</p> <p>Seventh chapter discusses the security media and the expansion of social values.</p> Ali bin Fayez Al-Jehni (Author) Copyright (c) 2000 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/78 Sat, 01 Apr 2000 00:00:00 +0300 Forensic Medicine in Criminal Investigations https://nup.nauss.edu.sa/index.php/sr/catalog/book/76 <p>This book addresses forensic medicine in criminal investigations. It highlights the important role played by forensic medicine in criminal investigations related to judicial medical cases, in the light of the new developments of information and skills in this domain. It starts from the importance of the basics and principles of forensic science in criminal investigations. Further, it relies on the importance of the official medicine knowledge possessed by the research and criminal investigation teams and the skills to benefit from this knowledge in criminal investigations. The book comprises four chapters. The first chapter discusses the following topics: . Definition of forensic medicine. . Fields of forensic medicine. . The relationship between the coroner, the investigator and other experts. . The role of the criminal investigator. . The role of the coroner. . The role of technical experts. . Examination of the scene where the corpse was found. . Corpse examination. . Forensic medical report. The second chapter expounds the role of corpse examination in crime detection through the following: . Is this human actually dead (death)? . When did death occur (postmortem changes)? . What is the cause of death? . Who is this person (cognition)? . Is this place the real scene? . Type of incident. The third chapter addresses the physical effects and their role in the criminal conviction in terms of: . The essence of physical effects and their types. . The role of physical effects in crime detection and criminal conviction.. DNA "DNA fingerprint" and its importance. The fourth chapter discusses toxins and their importance from forensic medicine view in terms of: . Toxicity in general. . Ethyl alcohol toxicity. . Gas toxins. . Some common types of toxins.</p> Ibrahim Sadeq Al-Jundi (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/76 Tue, 01 Feb 2000 00:00:00 +0300 Arab Media Security Work: Problems and Solutions https://nup.nauss.edu.sa/index.php/sr/catalog/book/75 <p>The present book sheds light on the problems facing Arab media work and proposed solutions. It seeks to develop the joint Arab media security policies. The book comprises five chapters. First chapter expounds the study background and its importance. Second chapter expounds the security media work (concepts and objectives). Third chapter expounds the Arab media work (beginning and development). Fourth chapter expounds the problems of Arab security media. Fifth chapter expounds the problems of security media work in view of the academics, media personnel and staff of security area. The book yielded numerous recommendations to confront the problems facing Arab security media. Most salient are: . The Prominent Arab media institutions shall be encouraged and supported materially and morally. The latter shall result in promoting the prominent Arab media work. . The significance of security media message necessitates the drafting of security works by participants of specialized media figures, together with the security officials. Also, professional filmmakers should contribute to conveying the security media message to the Arab audiences with a scientific manner characterized by influence and stimulation beyond the traditional manners. . There should be a reliable body or department affiliated with the Arab League to develop the polices and strategies appropriate for Arab countries in the security media area. However, the office of the Arab media security may play this role after getting more political, administrative and executive powers. . The training and qualification of the Arab human resources in the security media area should accelerated so as to have qualified personnel able to recover the status of Arab security media. . The Arab media plurality is one of the most prominent problem in the process of Arab security media work which necessitates unifying the formula of the security media work with all its forms.</p> Abdul-Rahman bin Mohamed Asiri (Author) Copyright (c) 2000 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/75 Sat, 01 Jan 2000 00:00:00 +0300 Security Information https://nup.nauss.edu.sa/index.php/sr/catalog/book/74 <p>This book deals with security information being the fundamental center of the police work. It stresses its importance as an abstract fact in the works of the Arab security bodies. The book discusses the nature of the security information in general and identifies its characteristics which are of interest to the security body. It also reveals its different qualities ـــــ political, social, and economic. Furthermore, it clarifies methods of registration, classification and counting. The book comprises seven chapters. Chapter one addresses the following: . The nature of the information. . The definition of information. . The elements of information. Chapter two addresses the following: . Psychological dimensions of information. . The nerve ability. . Instinctive motives. . Power of memory and observation. . Perception ability. . Awareness and intelligence degree. Chapter three addresses the following: . Conditions of security information authenticity. . Conditions of information objectivity. . Integrity of information. . Validity and reliability of information. . Effectiveness of information. . Consideration of information predictability. Chapter four addresses the following: . Analysis of security information. . Analysis of security information as a method for academic research. . Types of security information analysis. . Phases of the information security analysis process. Chapter five discusses the main fields of security information such as: criminal security, political security, economic security and social security. Chapter six addresses the following:</p> <p>. Registration of criminal information.</p> <p>. The historical development of criminal registration.</p> <p>. The nature of information criminal registration.</p> <p>. Technical rules of criminal registration.</p> <p>. The role of criminal registration in the criminal search process.</p> <p>Chapter seven addresses the following: . Counting of criminal information.</p> <p>. Definition of criminal counting.</p> <p>. Counting sources.</p> <p>. The importance of criminal counting in criminal investigation works.</p> <p>. Errors affecting the integrity of criminal counting.</p> Muhammad Farouq Abdulhamid Kamel (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/74 Wed, 01 Sep 1999 00:00:00 +0300 Media and Crises https://nup.nauss.edu.sa/index.php/sr/catalog/book/73 <p>This book deals with media and crises. It draws a methodological media framework for the purpose of responding to crises. The book comprises three chapters. The first chapter introduces a definition of the concept of crisis, and the reasons researchers disagree on the definition of this concept in addition to types of crises. It also addresses crises management. The second chapter incorporates the role of media in countering crises through the following topics: . Media and crisis. . A proposed perception to manage media during the crisis. . Countering hostile campaigns and rumors. The third chapter studies the case of the American media during the second Gulf War crisis, it studied the following topics: . American media attributes during the second Gulf War. . Subjecting the media dimension of the conflict to the military and political dimensions. . The Americanization of media speech pertinent to the war. . Confirming the technological nature of the war. . The use of photos in the coverage of the war. . Media Coverage: General observations.</p> Adeeb Khadour (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/73 Sun, 01 Aug 1999 00:00:00 +0300 Border Guard Duties in Arab Countries https://nup.nauss.edu.sa/index.php/sr/catalog/book/72 <p>The present book comprises studies and research presented to the scientific seminar organized by the University during the period 14-16/6/1999 under the title "Functions and Duties of Border Guards and Coast Guards in Arab Countries". Details follow: .The Security Importance of International Borders (Legal Aspect) by Dr. Mohamed Alsayed Arafa. This research addresses the concept, importance, and territorial scope of international borders. . The Security Importance of International Borders (Geographical Aspect) by Prof. Mohamed Mahmoud Alseryiani. This research reviews the geographical point of view on the subject of international borders; development of political borders concept; and patterns of political borders. . The Concept of Political Borders and Borders Guard in Islam by prof. Alsayed Albeshri Mohamed. This research addresses the development of the political border concept. . International Borders between Demarcation and Placement by Dr. Taha bin Othman Alfaraa. This research explores the concept of international borders, stages of development of the international borders, the concept of nation and State, classification of international borders, functions of international borders, and placement of international borders. . Functions and Duties of the Border Guards and Coast Guards by Dr. Ibrahim Mohamed Alfiki. This research reviews the geographic factors impacting State borders This book offers the recommendation of this seminar. Details follow: . Naif Arab University for Security Sciences is called to include borders related issues in its work programs through the convention of training courses, seminars and lectures. . There should be media programs aiming to educate Arab people with the duties and role of the border guards and coasts guards in the social security protection. .There should be coordination and exchange of expertise and information among the security bodies specialized in guarding the Arab borders.. The Arab agreements in the area of free movement of people and goods should be activated.</p> Mohamed Alsayed Arafa, Mohamed Mahmoud Al-Seryiani, Alsayed Al-Beshri Mohamed, Taha bin Othman Al-Faraa, Ibrahim Mohamed Al-Fiki (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/72 Thu, 01 Jul 1999 00:00:00 +0300 Patterns of Crimes in the Arab World https://nup.nauss.edu.sa/index.php/sr/catalog/book/71 <p>This book explores the patterns of crimes in the Arab world attempting to reveal the differences related to the phenomenon of crime, and to identify its forms and classify its new patterns. This is to discuss such phenomenon and to provide the suitable plans for combating it. The book comprises five chapters. First chapter expounds the research subject; the research problem; the significance of this research; and the objectives and questions of this research. Second chapter expounds the theoretical framework and previous studies. Third chapter expoundsـــــ the research methodology; the research community; the research tools; and the research areas. Fourth chapter expounds the methods of classifying the crime patterns. Fifth chapter expounds the findings and their discussions. The present book offers the following recommendations: . The problem of crime statistics in Arab countries should be handled with reference toـــــ the crime elements. . Manner of collecting such statistics; and the efficiency of those providing such the statistics. . The mission of researchers to get access to the information and data associated with crime and criminals should be eased, especially the researchers of Naif Arab University for Security Sciences who write researches scheduled by the conferences of Arab police leaders and the Arab Interior Ministers Council. . The Security academic research should focus on the current security problems. Also, it should anticipate the criminal phenomena in order to handle them before affecting the Arab societies. There should be unified Arab system for collecting the statistics and criminal information of Arab countries in a centralized database, provided that the mission of all Arab security bodies, to get access to such system with utilizing its information, should be eased. Such database should be kept in the Naif Arab University for Security Sciences. Such system should be fed according to the proposed scenario.</p> Mohamed Al-Amin Al-Bushra (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/71 Tue, 01 Jun 1999 00:00:00 +0300 Priorities for Developing the Arab Security Media https://nup.nauss.edu.sa/index.php/sr/catalog/book/70 <p>The present book expounds the development of the Arab security media in an attempt to the theoretical rooting of a modern Arab security media coping with the modern datum and facts. The book comprises four chapters. First chapter expounds the specialized media. Second chapter expounds the security media. Third chapter expounds the reality of Arab security media. .Lack of definite philosophy underlying the Arab security media. .Lack of a realistic strategy for the Arab security media . Media policies. . The relative absence of plans and programs. . The general framework of the security media concept and its theory. . Security media or security public relations. . The reality of Arab police bodies. . The relationship between the Arab security bodies and the Arab media. . The general framework of the security media staff. . The problem of the security media coverage. . The Arab official care for the security media. Fourth chapter expounds the priorities for developing the Arab security media. Details follow: . The definite concepts. . Developing the strategy for Arab security media. . Identification of the policies of Arab security media. . Identification of the functions and missions. . Identification of the objectives. . A new organizational form. . Developing a new form of the security media system. . A new reference framework. . The pursuit of changing the concept of police bodies. . A new content of the relationship between the police bodies and the mass media. . The definite separation between the security media and the public relation. . Unit of standards and measurements. . Development of a comprehensive plan for overcoming the difficulties of the coverage of the Arab security media. . Qualifying new Arab security media personnel.Development of the Arab and national security media legislations.</p> Adib Kaddour (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/70 Sat, 01 May 1999 00:00:00 +0300 Arab Security Cooperation and Security Challenges https://nup.nauss.edu.sa/index.php/sr/catalog/book/69 <p>The present book expounds the "Arab Security Cooperation and Security Challenges". It seeks to point out the development stages of the Arab security cooperation and its different mechanisms. This aims at facing the security challenges with a high level of efficiency based on description, analysis, presentation and documentation provided by a number of studies, researches, articles, reports and official documents. The latter shall make them an important reference to such subject. This book comprises six chapters. Details follow: First chapter expounds the mechanisms of the Arab security cooperation. Details follow: .The march of Arab security cooperation. . The Arab Organization for Social Defense Against Crime. . The conferences of the Arab police and security chiefs. Second chapter expounds the Council of Arab Interior Ministers and its bodies. Details follow: . Arab Interior Ministers Council. . General Secretariat of the Arab Interior Ministers Council. . Naif Arab University for Security Sciences. Third chapter expounds the tools to the Arab security cooperation. Details follow: . The strategies and security agreements. . The Arab security strategy. . The Arab strategy for combating the abuse of drugs and psychotropic substances. Fourth chapter expounds the Arab security cooperation for combating terrorism. Details follow: . The Arab strategy for combating terrorism. . The Arab agreement of combating terrorism. Fifth chapter focuses on the security challenges. Details follow: . Worsening the problem of crime. . The emergence of organized crime. . The organized crime across countries. Sixth chapter expounds the security cooperation for combating the organized crime across countries. Details follow: . The challenges to the organized crime across countries.</p> <p>The International security cooperation for combating the organized crime across countries. . The regional security cooperation for combating the organized crime across countries.</p> Muhsen Abdul-Hamid Ahmed (Author) Copyright (c) 1999 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/69 Thu, 01 Apr 1999 00:00:00 +0300 Security and Protection of Environment https://nup.nauss.edu.sa/index.php/sr/catalog/book/67 <p style="direction: ltr;">This book comprises studies and research presented to the forty-two-seminar entitled "Security and Protection of Environment" which is organized by the University during the period 14-16/10/1996 in its headquarters in Riyadh. The seminar objectives are represented in the following:</p> <p style="direction: ltr;">. Identify the problems of environment security and protection.</p> <p style="direction: ltr;">. Arab endeavors and legislations relevant to environment security and protection.</p> <p style="direction: ltr;">. Highlight the challenges and obstacles facing environment security and protection.</p> <p style="direction: ltr;">The book introduced the following studies and research:</p> <p style="direction: ltr;">. Security and Protection of Environment. Dr. Ibrahim Suleiman Alahideb.</p> <p style="direction: ltr;">. Arab Legislations Associated with Security and Protection of Environment. Dr. Mohamed Naeem Farhat.</p> <p style="direction: ltr;">. Obstacles to the Protection of Environment in Arab States. Dr. Abdulrahman Hamza Kamas.</p> <p style="direction: ltr;">. Obstacles to the Protection of Urban Environment and their Possible Solutions. Wadaa Abdullah Hamzawy.</p> <p style="direction: ltr;">. International Conventions for the Prevention of Pollution from Ships and their Applications in Saudi Arabia. Dr. Abdulaziz bin Ibrahim Al-Saab.</p> <p style="direction: ltr;">. Arab Legislations Associated with the Security of Environment and Prevention of Radioactive Pollution. Eng. Abdulrahman Mohamed Alarfaj.</p> <p style="direction: ltr;">. A Vision of the Security and Protection of Environment by Maj. Gen. Shaker Muatz Shaker.</p> <p style="direction: ltr;">. The Role of Police in Achieving Environment Security. Dr. Abdulhadi Alashri.</p> <p style="direction: ltr;">. Environmental Damage from an Islamic Perspective. Dr. Mohamed bin Abdullatif Alkabr.</p> <p style="direction: ltr;">. The Impact of Population Growth on Environment in Syria. Dr. Ahmed Al-Ashqar.</p> <p style="direction: ltr;">The book highlighted the most salient recommendations:</p> <p style="direction: ltr;">. Arab countries should attach more importance to the safety of environment and natural resources.</p> <p style="direction: ltr;">. Arab League members are called to develop economic policies to protect environment against pollution.</p> <p style="direction: ltr;">. Naif Arab University for Security Sciences is called to draft model law for the security and protection of environment.</p> <p style="direction: ltr;">. Arab countries should attach importance to human capacity building in relevant areas.</p> Ibrahim Suleiman Alahideb, Mohamed Naeem Farhat, Abdulrahman Hamza Kamas, Wadaa Abdullah Hamzawy, Abdulaziz bin Ibrahim Al-Saab, Abdulrahman Mohamed Alarfaj, Shaker Muatz Shaker, Abdulhadi Alashri, Mohamed bin Abdullatif Alkabr, Ahmed Al-Ashqar (Author) Copyright (c) 1998 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/67 Thu, 01 Jan 1998 00:00:00 +0300 Security Dictionary https://nup.nauss.edu.sa/index.php/sr/catalog/book/66 <p style="direction: ltr;">This dictionary has been developed by the University to constitute a significant contribution for covering the different concepts of security sciences and relevant terminologies. The University aims to identify and collect the basic security concepts and terminologies in this dictionary in order to enrich the theoretical and methodological aspects of security sciences. Moreover, it seeks to disseminate the foundations of research in security sciences based on unified scientific bases in the Arab countries. The University engaged 20 Arab experts to develop this dictionary, within which the (2700) terminologies in English verified by experienced specialists and covered 18 security fields. These terminologies were explained in Arabic and categorized alphabetically.</p> <p style="direction: ltr;">An elite panel of Arab scholars contributed to the development of this dictionary and the supervision on its printing and revision. They are: </p> <ul> <li style="direction: ltr;">Dr. Ibrahim Alkilani • Dr. Abdulmalik Alakhras</li> <li style="direction: ltr;">Dr. Ahmed Jadu • Dr. Fayez Orfali</li> <li style="direction: ltr;">Dr. Abu Baker Bakader • Dr. Mahjoub Altijani</li> <li style="direction: ltr;">Dr. Jalal Badr • Dr. Mohammed Ibrahim Zaid</li> <li style="direction: ltr;">Dr. Zakariya Aldwri • Dr. Mohammed Alswaidi</li> <li style="direction: ltr;">Dr. Salwa Almulla • Dr. Mohammed Aref Othman</li> <li style="direction: ltr;">Dr. Salha Sankar • Ali Orfalli</li> <li style="direction: ltr;">Lt. Gen. Yahya Almuallimi • Maj. Gen. Nashaat Albakri</li> <li style="direction: ltr;">Brig. Gen. Ahmed Alhasawna • Brig. Gen. Mohammed Ali Altarazi</li> <li style="direction: ltr;">Brig. Gen. George Asmar • Lt. Col. Matrook Alhabahba</li> </ul> <p style="direction: ltr;">Supervised by: Dr. Mohammed Alswaidi</p> <p style="direction: ltr;">Reviewed by: Dr. Ahmed Houiti</p> <p style="direction: ltr;">This dictionary is an important addition to the Arab security library and shall assist executive and training bodies in this field. Furthermore, it shall be of great benefit to researchers and students in particular.</p> Abu Baker Bakader , Jalal Badr , Zakariya Aldwri, Salwa Almulla, Salha Sankar, Abdulmalik Alakhras, Fayez Orfali, Mahjoub Altijani, Mohammed Ibrahim Zaid, Mohammed Alswaidi, Mohammed Aref Othman, Ali Orfalli, Yahya Almuallimi , Nashaat Albakri, Ahmed Alhasawna , George Asmar , Matrook Alhabahba, Mohammed Alswaidi, Ahmed Houiti (Author) Copyright (c) 2022 Naif University Press https://nup.nauss.edu.sa/index.php/sr/License https://nup.nauss.edu.sa/index.php/sr/catalog/book/66 Sat, 01 Feb 1997 00:00:00 +0300