Scroll Top
Hounslow East, London UK

ICAS Politics, Society and Cultured Strategy

ICAS Politics, Society and Cultured Strategy

The ICAS hypothesizes that games of strategy will be more prevalent in societies where political power is based on a “network strategy.” In such societies, political leaders manipulate social relations and symbols to aggrandize themselves. The ICAS hypothesizes that such activities will promote the importance of obedience, and will foster the emergence and perpetuation of Games of strategy. The ICAS tests this hypothesis using data from a random sample of some societies, and finds strong support.

keywords: games; political strategies; political agency; dual-procession theory; enculturation; child-rearing practices

Political Strategy

A number of years ago, ICAS put forward a “dual procession” theory to explain variation in the Political ways

Cross-Cultural Research

Countries evolved. We noted that some of this country evolved powerful, self-aggrandizing rulers who exerted considerable effort in making ties (through trade and tribute) to other leaders, whereas other countries evolved leaders who minimized their personal identities and visibility within the polity. We suggested that leaders of the former polities were following a “network” strategy of political behavior, whereas leaders of the latter were following a “corporate” strategy.

Leaders following a network strategy attempt to build a power base by controlling access to networks of exchange and alliance both within and outside the polity. Leaders following a corporate strategy attempt to build a power base by developing and promoting activities that reinforce the corporate bonds tying members of the polity together. Thus, a network strategy is one in which leaders attempt to monopolize sources of power, whereas a corporate strategy is one in which leaders attempt to share power across different groups and sectors of a polity

Games of Strategy and Political Strategy

I hypothesize that in societies where a network strategy forms the basis of political behavior, leaders will spend much of their time attempting to shape social relations for their own aggrandizement and control. They will encourage obedience, particularly in children as they learn to function in the society. In this way, a leader’s political strategy will influence enculturation practices across a society, and, thus, games of strategy will become more prevalent where a network strategy of political behavior is being pursued.

Your ICAS Compliance Program must include, at a minimum, the following:

First, your business should formally adopt an AML Compliance Program. This Guide can serve as the basis for that program, however, you must check with your local regulations for the specific requirements for adoption of a Compliance Program. form that can be used to certify adoption of such a program.

Second, your business must designate a Compliance Officer. The Compliance Officer may be an employee who has other duties at your business, but it should be someone in a responsible position. The Compliance Officer is responsible for your business’s day-to-day compliance with the AML laws and regulations, and for ensuring the Compliance Program is updated as needed. The Compliance Officer is also responsible for overseeing your business’s ongoing education and training program. When you designate a Compliance Officer, verify that the qualifications of that person meet the local requirements and document it accordingly. You can complete the sample Designation of Compliance Officer form shown and then retain it in your AML compliance files.

Third, your business must adopt policies and procedures for the identification and reporting of Suspicious Activity and High Currency Amount Transaction Reports. You must check with your local regulations for these thresholds and what it considered to be a suspicious transaction as well as the allowable time delays to report such activity. If you’re business plans to impose stricter thresholds than those required by your government, those should be included in your Compliance Program.

Fourth, your business must establish an ongoing employee-training program for all employees who will have any involvement with the activities. The education and training should include instruction on the employees’ responsibilities under the program, as well as the detection of suspicious transactions. One good tool for training is this Guide. All employees should be required