Terrorism and Extortion

Alexander, Dean C.
February 2008
Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p56
Trade Publication
The article focuses on the issue of terrorism and extortion in transnational companies (TNCs). According to the author, companies in energy mining, agriculture or manufacturing has the possibility of facing the threat of terror and extortion payments. He adds that TNCs can attempt to lessen the risks of terror extortion by analyzing the benefits outweighing the risk of doing business in the host country, forming coalition and securing support from the government and business groups.


Related Articles

  • Dealing with terrorism.  // Management Review;Feb81, Vol. 70 Issue 2, p58 

    Discusses the need for multinational corporations to be able to deal with the threat of terrorism. Psychological ability to cope as a hostage or to remain calm in the presence of increased physical security measures; Importance of a preparedness plan for confronting terrorism; Establishment of...

  • Car Bomb Destroys South American Nestlé Plant.  // Risk Management (00355593);Mar2007, Vol. 54 Issue 3, p9 

    The article reports that a truck bomb destroyed a Nestle dairy plant in Doncello, Colombia, in January 2007. A contract engineer was wounded. Although media sources said the Revolutionary Armed Forces of Colombia (FARC) presented an extortion demand to Nestle, the company denied the accuracy of...

  • Managing International Incidents with Decentralized Security Departments. Clark, Shawn C. // Security: Solutions for Enterprise Security Leaders;Feb2013, Vol. 50 Issue 2, p48 

    The article focuses on the management of international incidents in the security departments of international corporations. It says that possessing a centralized staff is significant in communication, training, and collaboration. It adds that international security assets utilize their local,...

  • Developments in risk management. Mills, Roger // Henley Manager Update;Winter2006/2007, Vol. 18 Issue 2, p19 

    The article focuses on corporate security, which has gained an increasing importance as security risks such as terrorism, organized crime and information security are becoming more complex. A study of several multinational companies over a twelve-month period has been conducted in order for...

  • Italy's Ancien Régime. Luttwak, Edward // Society;Nov/Dec93, Vol. 31 Issue 1, p70 

    This article deals with corruption in Italy. Corruption was not the worst sin of Italy's political class. Worse than the tangenti systematic extortion practiced on would-be contractors to fill party coffers, even worse than personal money-making by every sort of corrupt practice, was the...

  • Extortionists lurk just outside corporate suite. Fleischer, Jo // Westchester County Business Journal;4/3/95, Vol. 34 Issue 14, p1 

    Focuses on corporate terrorism in companies based in New York and Connecticut. Extortion threats of violence against top executives; Security plans of companies; Statistics on executive kidnappings. INSET: How to keep the kidnappers at bay...

  • YOUR PRACTICE MAY BE A TARGET FOR FRAUD. Sofranec, Diane // Medical Economics;9/25/2012, Vol. 89 Issue 18, p53 

    The article focuses on a report released by the Association of Certified Fraud Examiners (ACFE) which shows that all businesses are susceptible to fraud including medical practices. The report is based on the data from certified fraud examiners and ACFE members who investigated workplace fraud...

  • FIPS 201 and the PIV Card for the Enterprise.  // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58 

    The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.

  • None But The Brave. McCourt, Marc // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12 

    An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics