A Comparative Study of Financial Crimes and Criminal Networks in the United States

Total Page:16

File Type:pdf, Size:1020Kb

A Comparative Study of Financial Crimes and Criminal Networks in the United States The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Where Political Extremists and Greedy Criminals Meet: A Comparative Study of Financial Crimes and Criminal Networks in the United States Author: Roberta Belli, LL.M., Ph.D. Document No.: 234524 Date Received: June 2011 Award Number: 2009-IJ-CX-0006 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. WHERE POLITICAL EXTREMISTS AND GREEDY CRIMINALS MEET: A COMPARATIVE STUDY OF FINANCIAL CRIMES AND CRIMINAL NETWORKS IN THE UNITED STATES by Roberta Belli A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2011 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. © 2011 Roberta Belli All Rights Reserved ii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This manuscript has been read and accepted for the Graduate Faculty in Criminal Justice in satisfaction of the dissertation requirement for the degree of Doctor of Philosophy. Joshua D. Freilich, Ph.D. ____________________________ ___________________________________ Date Chair of Examining Committee Joshua D. Freilich, Ph.D. ____________________________ ___________________________________ Date Executive Officer Kirk Dombrowski, Ph.D.____________________ Amy Adamczyk, Ph.D._______________________ James P. Lynch, Ph.D._______________________ Supervisory Committee THE CITY UNIVERSITY OF NEW YORK iii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. ABSTRACT Where political extremists and greedy criminals meet: A comparative study of financial crimes and criminal networks in the United States by Roberta Belli Advisor: Joshua D. Freilich, Ph.D. Financial crime poses a serious threat to the integrity and security of legitimate businesses and institutions, and to the safety and prosperity of private citizens and communities. Experts argue that the profile of financial offenders is extremely diversified and includes individuals who may be motivated by greed or ideology. Islamic extremists increasingly resort to typical white-collar crimes, like credit card and financial fraud, to raise funds for their missions. In the United States, the far-right movement professes its anti-government ideology by promoting and using a variety of anti-tax strategies. There is evidence that ideologically motivated individuals who engage in financial crimes benefit from interactions with profit-driven offenders and legitimate actors that provide resources for crime in the form of knowledge, skills, and suitable co-offenders. This dissertation sheds light on the nexus between political extremism and profit-driven crime by conducting a systematic study of financial crime cases involving Islamic extremists, domestic far-rightists, and their non-extremist accomplices prosecuted by federal courts in 2004. Attribute and relational data were extracted from the U.S. Extremist Crime Database (ECDB), which is the first open- source relational database that provides information on all extremist crimes, violent and non-violent, ideological and routine crimes, since 1990. A descriptive analysis was conducted comparing schemes, crimes, and techniques used by far-rightists, Islamic iv This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. extremists, and non-extremists, before moving into an in-depth social network analysis of their relational ties in co-offending, business, and family networks. The descriptive findings revealed considerable differences in the modus operandi followed by far-rightists and Islamic extremists as well as the prosecutorial strategies used against them. The subsequent exploratory and statistical network analyses, however, revealed interesting similarities, suggesting that financial schemes by political extremists occurred within similarly decentralized, self-organizing structures that facilitated exchanges between individuals acting within close-knit subsets regardless of their ideological affiliation. Meaningful interactions emerged between far-rightists and non-extremists involved in business ventures and within a tax avoidance scheme, indicating that the crime-extremism nexus was more prevalent within far-right settings compared to Islamic extremist ones. The findings were discussed in light of their implications for criminological theories, criminal justice and crime prevention policies, and methodological advances. v This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. ACKNOWLEDGMENTS I would like to express my deepest gratitude to my advisor, Dr. Joshua D. Freilich, who started mentoring me during my first year as a PhD student and encouraged me to fully explore the whole range of my research interests. Over four years ago we started talking about a possible study on financial crimes and terrorism. No longer after that we embarked on this incredible project together, and that is how the U.S. Extremist Crime Database (ECDB) - Financial Crime from an idea became reality. For believing in me and giving me the chance to create something so meaningful and ambitious, I will be forever grateful. I am greatly obliged to my examination committee: Dr. Dombrowski, who sparked my interest in social network analysis and offered invaluable feedback and guidance; Dr. Adamczyk, who agreed to join this project at the last minute without hesitation; and Dr. Lynch, whose challenging questions undoubtedly contributed to make this a more rigorous empirical study. I must also thank the National Institute of Justice (NIJ), the National Consortium for the Study of Terrorism and Responses to Terrorism (START), and the U.S. Department of Homeland Security (DHS) for funding this research. This dissertation would have not been possible without the amazing team of research assistants who worked on the ECDB: William, Catherine, Ashmini, Yvette, Rebecca, Kevin, Tarra, Celinet, Johnny, and many others. I met a few colleagues at work, and I found many good friends. Thank you for all your help and support. vi This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. I owe everything to my family back in Italy and here in the United States. ǯǣ Ǩ. Even when the road ahead was not clear, you never stopped encouraging me and giving me the strength to pursue my dreams. I am who I am today because of who you are. SimǡDzdz ǣhave been a great friend, amazing listener and supporter throughout my life. Thank you to the best brother any big sister could wish for. Soon there will be not one, but three doctors in the family. Fabio: thank you for your love, support, patience and understanding. You made me laugh when I needed it most, and comforted me when I was almost ready to give up. I took each and every word you said at heart and look where it brought me. ǣ ǯ ǯ sanity. Grazie Gigi! My grandparents, here and in the afterlife: nonna Beppa e nonna Natalia, nonno Livio e nonno Silvio. We have come a long way from that sunny mountain region of ours. My experience as a doctoral student at John Jay College would have not been the same withouth the many talented and inspiring people whom I shared with all the good and bad moments: Besiki, Meredith, Andrea, Crystal, Anna, Younoh, Gipsy. Thank you! To all the wonderful people I met since I moved to New York City, who helped me in so many ways, knowingly or unknowingly. You are too many to mention, but you all have a special place in my
Recommended publications
  • Effect of Pyramid Schemes to the Economy of the Country - Case of Tanzania
    International Journal of Humanities and Management Sciences (IJHMS) Volume 5, Issue 1 (2017) ISSN 2320–4044 (Online) Effect of pyramid schemes to the Economy of the Country - Case of Tanzania Theobald Francis Kipilimba come up with appropriate laws and mechanisms that will stop Abstract— Pyramid scheme, in their various forms, are not a those unscrupulous people praying on unsuspecting new thing in the world, however, they have reared their ugly individuals. Help supervisory institutions formulate menacing heads‘ in the Tanzanians society only recently. Before the appropriate policies that will require all investment plans to Development entrepreneurship Community Initiative (DECI) debacle be documented, filed and thoroughly scrutinized and come up other schemes such as Women Empowering, woman had already with the ways to recover assets of the culprits and use them to racked havoc in the society.This study intended to evaluate the extent compensate the victims of get rich quick schemes. to which Tanzanians knew about the pyramid schemes operating in the world, their participation in these schemes and their general feelings towards the scammers, our judicial system and the course II. BASIC VIEW OF PYRAMID SCHEME action they are likely to take in the event they are scammed. Results Pyramid scheme is a fraudulent moneymaking scheme in show that most Tanzanians are very naïve when it comes to pyramid which people are recruited to make payments to others above schemes, with very scant knowledge about these schemes. Many do them in a hierocracy while expecting to receive payments not know if they have participated in these schemes but in those instances that they had, they suffered huge financial losses.
    [Show full text]
  • 5892 Cisco Category: Standards Track August 2010 ISSN: 2070-1721
    Internet Engineering Task Force (IETF) P. Faltstrom, Ed. Request for Comments: 5892 Cisco Category: Standards Track August 2010 ISSN: 2070-1721 The Unicode Code Points and Internationalized Domain Names for Applications (IDNA) Abstract This document specifies rules for deciding whether a code point, considered in isolation or in context, is a candidate for inclusion in an Internationalized Domain Name (IDN). It is part of the specification of Internationalizing Domain Names in Applications 2008 (IDNA2008). Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5892. Copyright Notice Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • KARELIAN in RUSSIA ELDIA Case-Specific Report
    Studies in European Language Diversity 26 KARELIAN IN RUSSIA ELDIA Case-Specific Report Heini KARJALAINEN, Ulriikka PUURA, Riho GRÜNTHAL, Svetlana KOVALEVA Mainz Wien Helsinki Tartu Mariehamn Oulu Maribor Studies in European Language Diversity is a peer-reviewed online publication series of the research project ELDIA, serving as an outlet for preliminary research findings, individual case studies, background and spin-off research. Editor-in-Chief Johanna Laakso (Wien) Editorial Board Kari Djerf (Helsinki), Riho Grünthal (Helsinki), Anna Kolláth (Maribor), Helle Metslang (Tartu), Karl Pajusalu (Tartu), Anneli Sarhimaa (Mainz), Sia Spiliopoulou Åkermark (Mariehamn), Helena Sulkala (Oulu), Reetta Toivanen (Helsinki) Publisher Research consortium ELDIA c/o Prof. Dr. Anneli Sarhimaa Northern European and Baltic Languages and Cultures (SNEB) Johannes Gutenberg-Universität Mainz Jakob-Welder-Weg 18 (Philosophicum) D-55099 Mainz, Germany Contact: [email protected] © 2013 European Language Diversity for All (ELDIA) Cover design: Minna Pelkonen & Hajnalka Berényi-Kiss ELDIA is an international research project funded by the European Commission. The views expressed in the Studies in European Language Diversity are the sole responsibility of the author(s) and do not necessarily reflect the views of the European Commission. All contents of the Studies in European Language Diversity are subject to the Austrian copyright law. The contents may be used exclusively for private, non- commercial purposes. Regarding any further uses of the Studies
    [Show full text]
  • Kyrillische Schrift Für Den Computer
    Hanna-Chris Gast Kyrillische Schrift für den Computer Benennung der Buchstaben, Vergleich der Transkriptionen in Bibliotheken und Standesämtern, Auflistung der Unicodes sowie Tastaturbelegung für Windows XP Inhalt Seite Vorwort ................................................................................................................................................ 2 1 Kyrillische Schriftzeichen mit Benennung................................................................................... 3 1.1 Die Buchstaben im Russischen mit Schreibschrift und Aussprache.................................. 3 1.2 Kyrillische Schriftzeichen anderer slawischer Sprachen.................................................... 9 1.3 Veraltete kyrillische Schriftzeichen .................................................................................... 10 1.4 Die gebräuchlichen Sonderzeichen ..................................................................................... 11 2 Transliterationen und Transkriptionen (Umschriften) .......................................................... 13 2.1 Begriffe zum Thema Transkription/Transliteration/Umschrift ...................................... 13 2.2 Normen und Vorschriften für Bibliotheken und Standesämter....................................... 15 2.3 Tabellarische Übersicht der Umschriften aus dem Russischen ....................................... 21 2.4 Transliterationen veralteter kyrillischer Buchstaben ....................................................... 25 2.5 Transliterationen bei anderen slawischen
    [Show full text]
  • Proper Thesis Statement Examples
    Proper Thesis Statement Examples recruitOrientated some Wilmer clog Teutonise pluralised windily? ignominiously Envious or andapprizings upbound ingenuously Janos platinise: when Mariluwhich Hughis mirthless. is heteromerous Is Shelton enough? inelaborate or android when Although they are consuming far between master topic, why you state a great thesis Though uniforms are rigorous to conventional community voluntary and unity, educational institutions should we force students to scramble them. Some of these theories are more likely to be valid than others. The statement acts as a guide did the argument captured in the toll of summary article. The proper structure aims at least of? Bail out which is still others educate about your thesis topics you are expected and your paper, copy and assert your object. Reddit on the right or learn more versatile and ethical behavior with proper thesis statement of using to argue the topic and to the body. Now students can moderate whether because it correct data back not. Comfort the afflicted and contrary the comfortable. Reading an example thesis statement is. Build the statement in a way it seems you are answering a question. Your paper and that they do that you do i was this sentence that producing a proper evaluation which reasonable republican citizens with proper thesis statement examples? The introductory part. Use are five years to improve it is never ordered an online ads of your thesis statement plays, never had that. Not everyone is going to agree with the points that you make or your argument as a whole. The main purpose of making Washington, DC to be a capital is a fact all the administrative buildings are situated there.
    [Show full text]
  • Evaluating Services and Systems Interventions
    Evaluating Services and Systems Interventions LEARNING AND GROWING THROUGH EVALUATION MODULE 5 2021 Updates National Center for Environmental Health Division of Environmental Health Science and Practice MODULE 5 TABLE OF CONTENTS Page Chapter 1 Evaluating Services and Systems Interventions ............................. 1-1 Step 1 – Engage Stakeholders ............................................................................................................... 1-6 Step 2 – Describe the Intervention ........................................................................................................ 1-7 Step 3 – Focus the Evaluation Design................................................................................................... 1-8 Step 4 – Gather Credible Evidence ..................................................................................................... 1-13 Step 5 – Justify Conclusions ............................................................................................................... 1-16 Step 6 – Ensure Use of Evaluation Findings and Share Lessons Learned .......................................... 1-18 Applying the Program Evaluation Standards Throughout the Evaluation.......................................... 1-19 LIST OF TABLES Table 1.1 Intervention Evaluation Question Types – Process Questions.................................................. 1-9 Table 1.2 Intervention Evaluation Question Types – Outcome Questions ............................................. 1-10 LIST OF FIGURES Figure 1.1 Comprehensive
    [Show full text]
  • Political Uses of the Body; Philosophy, Aesthetics, Anthropology Orgest Azizi
    Political Uses of the Body; Philosophy, Aesthetics, Anthropology Orgest Azizi To cite this version: Orgest Azizi. Political Uses of the Body; Philosophy, Aesthetics, Anthropology: Proceedings of the Internatioanl Summer Conference, Korça (Albania), august 2014. Orgest AZIZI. Aug 2014, Korça, Albania. ZENIT EDITIONS, 2017, 9789928113740. hal-02105811 HAL Id: hal-02105811 https://hal.archives-ouvertes.fr/hal-02105811 Submitted on 21 Apr 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. PËRDORIMET POLITIKE TË TRUPIT: FILOZOFI, ESTETIKË, ANTROPOLOGJI Zenit Editions Bulevard. B. Curri, P. Agimi, Nr.1, Tiranë [email protected] Tel. +355 4 22 71 640 Përdorimet politike të trupit: filozofi, estetikë, antropologji Aktet e universitetit veror ndërkombëtar Korçë 25-30 gusht 2014 Përgatiti për botim Orgest Azizi Me mbështetjen e Ministrisë së Kulturës ISBN 978-9928-113-74-0 © i botimit: Zenit editions, 2017 Projekti grafik:Zenit Art Përmbajtja / Contenu / Contents Hyrje – Orgest Azizi ........................................................................................... 7 Le philosophe renversé – Alain Brossat ................................................................ 13 Fuqi - Puissances - Powers De la foule au corps collectif – Erinç̇ Aslanboğa .................................................. 31 Les puissances politiques du cinéma sont corporelles – Alain Naze ......................... 41 Mind the social gap. Which space for pervert bodies ? – Céline Belledent .............
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • SHIRLEY MACLAINE by PETE MARTIN the Star of Ccm-Can and the Apartment Tells of the Lucky L^Reaks That Took Her from a Broadway Chorus Line to Hollywood Stardom
    •î*V. ill rr íin-islittud fill tlic tusviTiny wig French actor ^'vcs Muniaiid, .Mnili.-y's dinner she wears in A/v6>ij/(i/, where she mas- partner above, is leading man in liernew lilm. Her querades as a Japanese entertainer. husband, Steve Parker, is the show's producer. I GALL ON SHIRLEY MACLAINE By PETE MARTIN The star of Ccm-Can and The Apartment tells of the lucky l^reaks that took her from a Broadway chorus line to Hollywood stardom, Left: Un the set of My G'm/w, now being filmed in Japan : Shirley. Japanese actress Voko Tani and director Jack Cardiff. ry and Laun'ncr llarv.-y alar ds f'llow sthool - teachers in TILO Ijitfi, to \v released ncxl month. With Frank Sinatra in Can-Can. Shirley defends their off-scrccn friendship; "There's nothing evil, or even questionable, about ¡i " In All in a Night's 11 Wit with Deap Martin. The chemistry' between Dean and me is good," she sa>'s. hirley MacLainc is tall, leggy, bosomy. Obviously, Shirley MaeLaine has become Strip. "I've got a theory about this MaeLaine, Ht'i" smile curves upward likf a sliver of what is known in Hollywood parlance as "'an buddy l)oy," he Inld mi-, lilowinii a clcud of S new moon b;il;inccd on its bottom. Othrr extremely hot property." .^s these words are eigaretie smoke from his cnoulh, ihcn sucking portions of her face which trend upward are ihe written, she has just been nominated, along it quickly back into his nostrils.
    [Show full text]
  • Huang Conservés À La Bibliothèque Nationale : Un Fichier De Jacques Bacot Et Autres Documents
    Pour servir à la numérisation des manuscrits tibétains de Dun- huang conservés à la Bibliothèque Nationale : un fichier de Jacques Bacot et autres documents Anne Chayet ien souvent, et surtout depuis que l'informatique facilite la constitu- Btion des répertoires et leur communication, les fichiers manuels ont été détruits après la publication du catalogue ou de l'ouvrage dont ils formaient la base. Le fichier présenté ici, que le tibétologue Jacques Bacot constitua sans doute après avoir établi la liste initiale des manuscrits tibé- tains de Dunhuang,1 n'aurait pas dû subsister, en principe, puisque l'inven- taire de ces manuscrits a été publié par Marcelle Lalou.2 De fait, il n'est ni complet, ni continu et les raisons de sa conservation, dans cet état, n'apparaissent pas clairement aujourd'hui.3 On peut néan- moins penser qu'il est simplement le témoin d'un travail de vérification laissé inachevé par Marcelle Lalou, dont les corrections apparaissent sur plusieurs fiches, et qu'il était destiné à disparaître dans sa totalité. Il s'agis- sait en tout cas indéniablement d'un fichier de travail, l'état inégal des fiches et le défaut de systématisation des rédactions sont éloquents à cet égard. On ne peut donc attendre une rigueur absolue des 611 fiches qu'il compte. La composition du fichier n'est homogène ni dans ses formats, ni dans ses numérotations. Il semble être la réunion de fiches provenant d'opérations différentes,4 car il serait sans doute excessif de parler de reliquat de ces op- érations. La présence de deux formats de fiches, marque vraisemblable d'une re- composition tardive du fichier, plutôt que d'un usage simultané et indiff- érent,5 n'apporte pas de réponse précise aux questions qu'on peut se poser sur son origine et sa date.
    [Show full text]
  • Building Research Collaboration Networks - an Interpersonal Perspective for Research Capacity Building
    Huang 89 Building Research Collaboration Networks - An Interpersonal Perspective for Research Capacity Building Jun Song Huang, PhD National Institute of Education, Singapore Abstract: While collaboration is increasingly recognized to be important for research, researchers’ collaboration networks are still not adequately recognized as a form of research capacity in the literature. Research is a knowledge creation activity and interpersonal research collaboration networks are important for knowledge cross-fertilization and research productivity. By referring to social network theories, this paper argues that research collaboration networks are a form of research capacity at interpersonal level. It complements capacity building at individual, organizational and inter-organizational levels. However, building research collaborations can be challenging. Three key issues are raised for discussion. First, collaboration networks have nonlinear effecton research productivity. Second, fostering heterophilous communications and maintaining degrees of heterophily can be contradicting and thus challenging. Third, building research collaboration networks proactively requires shift of research management philosophy as wellas invention of analytical tools for research management. Debates and solutions with regard to these issues may contribute to the advancement of theory and practice of research management. Keywords: Capacity Building, Research Collaboration, Social Network Theories Introduction The development of social network theories has revealed
    [Show full text]
  • En En Amendments 1
    European Parliament 2019-2024 Committee on Foreign Affairs 2019/2170(INI) 22.12.2020 AMENDMENTS 1 - 267 Draft report Isabel Santos (PE647.074v01-00) on the 2019-2020 Commission Reports on Albania (2019/2170(INI)) AM\1199417EN.docx PE648.333v01-00 EN United in diversityEN AM_Com_NonLegReport PE648.333v01-00 2/119 AM\1199417EN.docx EN Amendment 1 David Lega, Michael Gahler, Vladimír Bilčík, Isabel Wiseler-Lima, Andrey Kovatchev Motion for a resolution Citation -1 a (new) Motion for a resolution Amendment - having regard to the EU-Albania Stabilisation and Association Agreement, Or. en Amendment 2 David Lega, Michael Gahler, Vladimír Bilčík, Isabel Wiseler-Lima, Andrey Kovatchev Motion for a resolution Citation 3 a (new) Motion for a resolution Amendment - having regard to the European Council conclusions of 19-20 June 2003 and the Thessaloniki Agenda for the Western Balkans, Or. en Amendment 3 Kinga Gál, Andrea Bocskor, Andor Deli Motion for a resolution Citation 5 b (new) Motion for a resolution Amendment - having regard to the Commission communication of 29 April 2020 entitled ‘Support to the Western Balkans in tackling COVID-19 and the post- pandemic recovery’, Or. en AM\1199417EN.docx 3/119 PE648.333v01-00 EN Amendment 4 Željana Zovko Motion for a resolution Citation 9 a (new) Motion for a resolution Amendment - having regard to the Commission communication of 6 October 2020 entitled ‘An Economic and Investment Plan for the Western Balkans’ (COM(2020)0641), Or. en Amendment 5 Kinga Gál, Andrea Bocskor, Andor Deli Motion for a resolution Citation 9 a (new) Motion for a resolution Amendment - having regard to the Commission communication of 6 October 2020 entitled ‘An Economic and Investment Plan for the Western Balkans’ (COM(2020)0641), Or.
    [Show full text]