Volume 7 ~ Issue 2, (2025)


The Complex Dynamics of Aid Beneficiaries Security in Insecure Humanitarian Environments: A 21st Century Imperative and Challenge for Humanitarian Organizations
Michael Munyaradzi Makova (PhD)
Abstract       pdf Full text PDF
The safety and security of aid beneficiaries is a contemporary humanitarian imperative and challenge. Humanitarian security risk management strategies have significantly evolved since the turn of the millennium, progressively focussing on aid beneficiaries’ safety and security, particularly in insecure humanitarian contexts. The imperative to ensure aid beneficiaries access humanitarian assistance safely and in dignity, has witnessed substantial focus by humanitarian organizations on their safety and security in insecure environments. Insecure humanitarian contexts such as armed conflict and fragile post conflict, have particular security concerns for aid beneficiaries. Aid beneficiaries, particularly forcibly displaced persons such as refugees, internally displaced persons (IDPs), asylum seekers and others face multiple security challenges peculiar to their situations. To support and complement governments and de facto authorities in some contexts, fulfilling their security obligations and responsibilities, humanitarian organizations have progressively incorporated and implemented security risk management strategies that specifically address aid beneficiaries’ security concerns to the extent possible. This is aimed at ensuring that humanitarian aid delivery supports humanitarian principles of humanity, impartiality, neutrality and independence particularly in vulnerable security environments. This paper critically explores security risk management strategies implemented by humanitarian organizations for aid beneficiaries, with particular focus on forcibly displaced persons such as refugees and internally displaced persons, in insecure humanitarian environments. Further explored are key considerations for effective aid beneficiaries’ security.

Author Keywords:-Aid beneficiaries security, security management in humanitarian operations and Security risk management strategies for aid beneficiaries



Historical Development of the Concept of the Modern(Ity)
Assoc. Prof. Dr. Ali Fuat GÖKÇE, Muhammed AKSU, Nazım FATSA
Abstract       pdf Full text PDF

-It is stated that modernity is conceptually derived from the concept of modern. The concept of modernity corresponds to the fundamental changes and transformations experienced in a particular historical process in Europe. With the 17th century, it appears as a concept used to express social organization and ways of life with the transformations and changes seen in the cultural, social and political arena in Europe. In general, the concept of modernity refers to the secularization of European societies and the taking of rational legal authorities instead of traditional authority with the meaning and importance attached to science. In other words, the origins of modernity exist in the Age of Enlightenment, drawing strength from the idea of reason and rationality. Modernity, coming to its contemporary, contemporary meanings, represents the break from the old and the new attitude. The main research question of this study is to try to examine how the concept of modernity arose in the historical process, what it means, and what kinds of historical developments it has undergone. In this study, historical research methods, descriptive research methods and document-based data analysis were performed.


Author Keywords:-Concept of Modern, Concept of Modernity, Postmodernity


Management of Traffic Problems Using 4-Phase Modeling with Time Setting Design Using Python
Ahmad Fauzi Ichsan, Bambang Suhardi, Pringgo Widyo Laksono
Abstract       pdf Full text PDF

-This research examines the application of a 4-phase traffic management model using Python-based simulation software to optimize traffic flow. The study focuses on the Sukomoro intersection in Magetan Regency, which currently operates under a 3-phase traffic light system. A comprehensive methodology is employed, incorporating traffic data analysis, simulation modeling, and performance evaluation. Findings reveal that with a total capacity of 1.800 pcu/hour and a vehicle flow (Qsmp) of 1.600 pcu/hour, the intersection operates at a saturation degree (DS) of 0.89, indicating it is nearing maximum capacity. The analysis further identifies a geometric delay (DG) of 6.23 seconds per vehicle and a traffic delay (DT) of 7 seconds per vehicle, resulting in a total delay of 13.23 seconds per vehicle. The implementation of adaptive signal control and intersection synchronization demonstrates the potential to enhance capacity by up to 25%. To optimize intersection performance, the study suggests an integrated traffic management approach, including adaptive signal control, inter-intersection synchronization, and dedicated scheduling for heavy vehicles.


Author Keywords:-Traffic Management, 4-Phase Modeling, Python Simulation, Intersection Capacity, Signal Control Optimization


Redefining Terror and Terrorism Concepts
Assoc. Prof. Dr. Ali Fuat Gökçe, PhD Muhammed AKSU
Abstract       pdf Full text PDF

-Terror and terrorism have different definitions that are similar but complementary. Although terrorism is derived from the word terror, there are some differences between them. Terror is an act of violence created by the uncontrolled masses. Terrorism, on the other hand, is the conscious and deliberate use of methods of violence to achieve a political goal. There is a specific will and a purpose. With the influence of the modern age, the facilities provided by technology, communication, and transportation have helped the spread of terrorism easily and reach global dimensions. This process reveals the changing dimensions and different approaches to terrorism at national, regional, and global levels. These different approaches emerge as a problem in understanding the concept of terrorism and when used interchangeably. From this point of view, the study aims to create a new definition by explaining the concepts of terror and terrorism and other concepts derived from them. Thus, historical and descriptive research methods will be applied, as well as document-based analysis and the result will be reached. The study's hypothesis is centred on the misuse of the concepts of terror and terrorism and their concepts.


Author Keywords:-terror, terrorism, international terrorism, global terrorism, postmodern terrorism.


Le marketing 5.0 et l'intelligence artificielle pour un management augmenté
Prof,. KhadijaTAKHDATE, Halima FOUZIR, Bouchra MANKARI
Abstract       pdf Full text PDF

-Digital transformation is impacting the way companies and organizations operate and perform. Digital technology has become the main catalyst for change. To stay at the forefront of technological advances, companies need to rethink their business strategies and be open to adopting new tools and the changes that come with them (AI, machine learning and other advanced technologies to project management). We are witnessing a resurgence of organization tools, automation and decision support tools for managers. These tools support the emergence of the concept of the “augmented manager”, who must develop skills and competencies linked to technology, and is the result of a collaboration between the human and the digital. In this article, we will provide some answers to the question of how to implement “augmented management” in an organization, its benefits and the solutions that can help in this process of change management.


Author Keywords:-digitalisation, marketing digital, marketing 5.0, marketing augmenté, intelligence artificielle, transformation digitale, management, changement, performances, CRM (Customer Relationship Management)


Enhancing Entrepreneurship Skills in Deaf Learners through the Flipped Project-Based Learning (F-PjBL) Model
Anyes Sedayu Pramesti, Soetarno Joyoatmojo, Gunarhadi, Dewi Kusuma Wardani
Abstract       pdf Full text PDF

-This study aims to test the Flipped Project Based Learning (F-PjBL) model in improving entrepreneurship skills in deaf students. The trial was conducted in three cycles with the subject matter of jumputan batik. The study used an observation-based assessment design conducted by three observers to assess learners' performance in each cycle. The results showed significant improvement in performance test results for both groups tested. Group 1 experienced an increase in average score from 35% in Cycle 1 to 79.17% in Cycle 3, while Group 2 increased from 39.8% to 81.68%. This increase shows that F-PjBL effectively develops deaf learners' entrepreneurial skills. The practical and project-based approach allows learners to learn through hands-on experience, overcoming barriers to access auditory information, and strengthening skills in product manufacturing, packaging and marketing. This model provides great potential for deaf learners to become independent entrepreneurs, reduce dependence on conventional employment, and increase the chances of future success. The findings support the importance of implementing learning models that suit the specific needs of deaf learners to improve the quality of education and open up economic opportunities.


Author Keywords:-Deaf, Disability, Flipped Project Based Learning, Learning Model, Student