51 research outputs found
When Terrorists Go Bad: Analyzing Terrorist Organizations’ Involvement in Drug Smuggling
The intersection of terrorism and organized crime is a central global security concern. However, the conditions that contribute to this intersection or hinder its development are widely debated. Drawing on prominent cases of ideologically driven violent nonstate actors engaged in illicit economies, some scholars argue that this intersection is a logical evolution. Other scholars, focusing on the fact that relatively few groups engage in both organized crime and terrorism, argue that ideological differences hinder this intersection. We use data on 395 terrorist organizations to analyze how organizational and environmental factors affect the likelihood of terrorist involvement in illicit drug trafficking. Our analysis shows that the degree of connectivity within networks of terrorist groups is the most significant predictor of a group engaging in drug trafficking. Further, contrary to the theorized effects of ideology, an explicit religious ideology has no significant effect while an ethnopolitical ideology actually increases the likelihood of drug trafficking
Measuring and Managing Ex Ante Transaction Costs in Public Sector Contracting
Transaction cost attributes, such as the complexity of the product being purchased, shape the risk that
government contracts will fail. When transaction cost risks are particularly strong, a common prescription is to avoid
contracting altogether or, if it is unavoidable, to spend additional resources on contract management activities. This
article presents evidence on the size and variability of governments’ ex ante transaction cost spending, using original
data from 72 contracts issued by 47 Danish local governments. Ex ante transaction costs average 2.7 percent per
contract and are relatively higher when services are more complex and lower when governments have prior contracting
experience and contracts were larger. The analyses suggest the importance of distinguishing between transaction cost
attributes and governments’ choices to spend resources in response to them. Effective management spending in the face
of transaction costs can help governments organize and capture value from contracting with private businesses
What drives successful administrative performance during crises? : lessons from refugee migration and the Covid-19 pandemic
First published online : 08 August 2020The Covid-19 pandemic affects societies worldwide, challenging not only health sectors but also public administration systems in general. Understanding why public administrations perform well in the current situation—and in times of crisis more generally—is theoretically of great importance, and identifying concrete factors driving successful administrative performance under today's extraordinary circumstances could still improve current crisis responses. This article studies patterns of sound administrative performance with a focus on networks and knowledge management within and between crises. Subsequently, it draws on empirical evidence from two recent public administration surveys conducted in Germany in order to test derived hypotheses. The results of tests for group differences and regression analyses demonstrate that administrations that were structurally prepared, learned during preceding crises, and displayed a high quality in their network cooperation with other administrations and with the civil society, on average, performed significantly better in the respective crises
Securing national e-ID infrastructures: Tor networks as a source of threats
Securing national electronic identification (e-ID) systems requires an in depth understanding of the associated threats. The trade of identity related ar- tefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in the darknet. We capture the key features of three major markets of fake IDs in Tor networks, and apply attack-defense trees to show how the security of an e-ID infrastructure is affected by this phenomenon
- …