首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
语言影响人们的思维和认知,是人与人、国与国之间交流和沟通的媒介,也是安全研究的重要维度。特定的话语可塑造威胁身份,叙述危机故事,对言语对象制造话语障碍,形成话语压力,建构话语危机,影响相关政策,使特定问题安全化,并影响安全程度的高低,导致不同的安全政策,甚至助推战争。中国在近三十年来一直面临来自西方世界的话语压力,在国际舆论场中经常陷入不利境地,有时由于某个话题成为舆论焦点,遭遇话语危机,如“中国威胁论”“中国强硬论”“中国威胁南海航行自由”“中国威胁世界秩序”以及中美“修昔底德陷阱”等。中国成为世界第二大经济体后日益成为世界关注的焦点,中国亟须研究和应对话语压力和话语危机。中国需要加大世界发声力度,提高话语主动性和自觉性;加大中国文化理念的国际宣传,重塑中国话语的国际语境;努力提升国际话语权;避免话语与行为的盲目自大,避免不必要的话语攻击和误解、有针对性地做好美国关于中国话语的改善工作。只有这样,才能够减少话语障碍和话语压力,有效缓解和化解话语危机。这是为中国塑造良好外部环境、提升中国国际形象、使中国与世界的互动更加顺畅的重要条件。  相似文献   

2.
3.
ABSTRACT

This article provides a study of how the Malaysian state defines and redefines “terror” as the nature of militancy changes from the Communist insurgency to present day’s Islamist jihadism. Tracing such definitional changes, the article demonstrates how the portrait of a terrorist not only is inherently political (and at certain junctures, politicised), but also reflects the changing nature of the state. While able to ethnicise and externalise the Communist Terrorists (CTs), the rise of Islamist militancy forced the Malaysian state to shelve the term “terrorist” in favour of religious “deviancy” until the advent of the “war on terror”. Advancing along a state-driven Islamisation project, the discursive ideal that is the “Islamic state”, was securitised (1980–2001), normalised (2001–2013), and resecuritised (2014–2016) as a balancing act not only to neutralise the security threat but also to augment the state’s “Islamic” credentials for domestic political gains. Following the emergence of the Islamic State (IS), I argue that the Malaysian state is now embroiled in an “Islamic state versus Islamic State” dilemma, where in the face of a far enemy it cannot decisively eliminate, the state has no choice but to defend itself as a sovereign nation-state as well as an “Islamic” one, further problematising Islam in discourses of security and violence.  相似文献   

4.
Employing a discourse analytic approach, this paper examines the silence on state terrorism within the broader terrorism studies literature. An analysis of this literature reveals that state terrorism is noticeable mainly for its absence as a subject of systematic academic study. Following the textual analysis, the main finding – the silence on state terrorism within terrorism studies – is subjected to both a first- and second-order critique. A first-order or immanent critique uses a discourse's internal contradictions, mistakes and misconceptions to criticise it on its own terms. In this case, the absence of state terrorism is criticised for its illogical actor-based definition of terrorism, its politically biased research focus, and its failure to acknowledge the empirical evidence of the extent and nature of state terrorism. A second-order critique entails reflecting on the broader political and ethical consequences of the representations enabled by the discourse. It is argued that the absence of state terrorism from academic discourse functions to promote particular kinds of state hegemonic projects, construct a legitimising public discourse for foreign and domestic policy, and deflect attention from the terroristic practices of states. The exposure and destabilisation of this dominant narrative also opens up critical space for the articulation of alternative and potentially emancipatory forms of knowledge and practice.  相似文献   

5.
6.
Labelling the ‘other’ is one of the most relevant aspects in an armed conflict context. Summarising what the opponent is in one single expression is a strong rhetorical tool in any belligerent discourse. The use of the ‘terrorist’ label assumes a particularly powerful role in such a construction. Employing Ole Wæver's layered discursive structure, this article aims to study the discursive practices and political consequences associated with the use of such labels. The political implications of using the ‘terrorist’ label in regards to the Kurdistan Workers' Party (PKK) in Turkish politics will be analysed as an illustrative case study. The period under analysis extends from April 2007 to January 2008, corresponding to the escalation of a security discourse that led to the (brief) Turkish military incursion in northern Iraq in the winter of 2007–2008. The political exposure and intense usage of the ‘terrorist’ label in this period makes it particularly ripe for understanding the political discursive context that shapes Turkey's policies towards this protracted conflict. The focus on this period also sheds light on the political reasons underlying the intractability of this conflict.  相似文献   

7.
    
Looking back at the beginnings of academic research on terrorism just over 40 years ago, it is extraordinary to see that what was once a marginal subject for social science has developed into a full-fledged program of “terrorism studies.” In fact, recently a sociologist considered the subject of sufficient importance to write a doctoral dissertation and then a book on the “social construction” of the field (Stampnitzky 2013). This essay highlights some examples of the contributions scholars from different disciplines have made to understanding terrorism. There is no consensus on any general theoretical laws of terrorism (there is no equivalent of a democratic peace theory, for example), but researchers have defined key concepts and deepened explanations of cause, effect, and process.What follows identifies four interrelated areas of explanatory inquiry into terrorism that have emerged over years of research: the effectiveness of terrorism as a strategy of opposition, the determinants and consequences of counterterrorism policies, how campaigns or waves of terrorism end, and how analysis of terrorism can be situated in a broader theoretical framework rather than treated as a phenomenon sui generis. Particular emphasis is placed on studies that are comparative and/or that situate the specific case of terrorism in a general theoretical perspective.  相似文献   

8.
《国际相互影响》2012,38(5):621-645
We examine whether refugee flows increase transnational terrorism in states to which refugees flee. Recent studies find that refugee flows contribute to the spread of interstate and civil war, but to a far lesser extent have studies examined how refugee flows could lead to other forms of political violence. We discuss two ways in which refugee flows can lead to transnational terrorism: how conditions in camps contribute to the radicalization of refugees; and how poorly host states treat refugees. We then conduct empirical tests using data on worldwide international refugee flows and transnational terrorism. Specifically, we model the effect of refugee flows on transnational terror attacks within a directed dyad framework to account for characteristics of origin and host states. Using a rare-events logit model, along with count models to check robustness, we find that refugee flows significantly increase the likelihood and counts of transnational terrorist attacks that occur in the host country, even when controlling for other variables. Given the prominence of refugee flows and populations worldwide, the results suggest that states with significant refugee populations and the international community at large should take measures to address the conditions in refugee camps, as well as the treatment of refugees by host states in order to prevent transnational terrorism.  相似文献   

9.
ABSTRACT

How does violence become understood as terrorism? In this article, we show how a narrative approach to the study of violent events offers a conceptually productive way to understand the process of “seeing” an event as a terrorist act, one that explicitly integrates the phenomenology of violence. While the collective practice of defining terrorism in academia and the policy arena has struggled to produce a universal definition, we identify a set of “common sense” characteristics. We argue that if the framing of violent events prominently features these characteristics as discursive anchors, this primes processes of sensemaking toward interpreting violence as terrorism. While terrorism markers are often articulated as being pragmatic and apolitical indicators of terrorist acts, we show that they are indeed at the core of political contests over historical and physical facts about violent events. The narrative approach we develop in this article underscores that intuitive leanings toward interpreting violence as terrorism are a sign of political agency precisely because they are produced through the stories political agents tell.  相似文献   

10.
ABSTRACT

The international security community is increasingly concerned about the nexus between indiscriminate terrorism and the proliferation of nuclear technology and materials. Many nuclear terrorism threat assessments focus primarily on terrorist motivations to employ an atomic bomb, the availability of nuclear know-how and technology, and the opportunity for clandestine organisations to acquire fissile material. Scholars and experts, however, often neglect to elaborate on the challenges for terrorist organisations in organising and implementing the construction and detonation of a crude atomic bomb. This will most likely be a complex project. This article will therefore explore the organisation of such an endeavour. To be precise, we will highlight the impact of the organisational design of the terrorist group. The organisational design determines the division of tasks and how coordination is achieved among these tasks. It therefore has a strong impact on the functioning of any organisation, especially an innovative and complex terrorism project. Building on a case study of Los Alamos, we inductively infer that terrorist organisations face an inherent effectiveness-efficiency trade-off in designing a nuclear armament project.  相似文献   

11.
International security cooperation usually takes one of two forms. A classical collective security organization is designed to promote international security through regulating the behavior of its member states. A defensive security organization is designed to protect a group of states from threats emanating from a challenging state or group of states. Both forms of security cooperation bind states to act in concert with respect to threats presented by other states. The emergence of non-state actors such as terrorist or extremist organizations challenges traditional forms of collective security. Threats from political extremism, terrorism, and outlaw organizations have grown in visibility during the past decade in the countries of Eurasia. The terrorist attacks of September 11 and the ensuing global war on terrorism have given added impetus to the Eurasian inter-state cooperation in confronting non-traditional threats and challenges from non-state actors. Bearing in mind the theory of collective security, this article analyzes threats posed by non-state actors with respect to Eurasian collective security organizations including the Shanghai Cooperation Organization, the Conference on Interaction and Confidence Building Measures, and the CIS Collective Security Treaty Organization. The article concludes that the effectiveness of these organizations at achieving stated objectives depends upon their capacity to adopt new criteria of effectiveness.  相似文献   

12.
Abstract

In 2010, the EU agreed its third five year programme for internal security, with the Stockholm Programme building on pre-existing arrangements from Tampere and The Hague. This article seeks, firstly, to highlight the nature of the problem that has confronted the EU in the area of internal security, by exploring a range of thematic concerns regarding both the institutional and conceptual construction of the EU's internal security regime, from the lack of an effective statistical analysis into the nature of the problem confronting the member states to the continued fragmentation of the European level as a practical venue for policy-making. Having considered the consequences of these continuing structural flaws, in terms of both the EU's wider credibility and legitimacy as an actor in this key security field, the second half of the article proceeds to critically appraise the solutions contained both within the 2010 Stockholm Programme and the Treaty of Lisbon. Having considered both, it will be argued that, at best, the ‘Stockholm solution' simply papers over pre-existing cracks, leaving the EU with a continued credibility gap in this important and developing area of co-operation.  相似文献   

13.
    
The existing literature in the terrorism field does not address the absence of terrorism scholarship in developing countries. This article focuses on this intellectual gap using the case of Pakistan. It argues that most decolonised states, including Pakistan, are yet to grasp the complexities of traditional approaches to the study of terrorism, let alone its critical dimensions. The article explores some of the prevailing conditions in developing countries, specifically decolonised states such as Pakistan, which prevent the development of a robust academic discourse on terrorism and the development of a strong field of study. It suggests that the main barriers that account for this shortfall include the state’s legitimacy deficit, a flawed education system that nurtures fictions as truth and inhibits knowledge production, the institutionalised role of conspiracy theories in national politics and the multiplicity of terrorism discourses among government and sociopolitical entities. The conclusion highlights a number of reasons that might help to explain this persistent condition and offers a few policy recommendations.  相似文献   

14.
    
This article attempts to problematise the disparate levels of attention paid to similar violences globally, whereby violence against women in the developing world is seen as a security concern to the West, and yet violence against women in the West is minimised or ignored. It will do this, first, by demonstrating that everyday violences, better known as everyday terrorism, in the West are subjugated knowledges within Terrorism Studies. To demonstrate this, Half the Sky, Sex and World Peace and The Better Angels of Our Nature serve as exemplar texts that reflect Western exceptionalism and non-Western savagery, particularly within Muslim societies, and deflect from everyday terrorism within the West. This reifies the West as an exceptional saviour and the non-West as a problematic savage. This article looks to flip that reification on its head by recognising that everyday terrorism happens everywhere and is not bound to non-Western identities.  相似文献   

15.
    
Abstract

The first activation of the European Union’s “Mutual Assistance Clause”, following the 13 November 2015 terrorist attacks in Paris, demonstrated that this article can be used very flexibly, not just to help defend French territory but also its expeditionary operations. But if flexibility is an asset, improvisation is not. In order to maximise the potential of the clause, the role of the EU institutions needs to be clarified, in addition to that of the member states, and new capacities must be created at the EU level, notably in intelligence and planning.  相似文献   

16.
作为恐怖组织常用的一种行动模式,自杀性恐怖主义在历史上就长期存在,尤其是九一一事件的发生,更使得自杀性恐怖主义成为恐怖组织在恐怖袭击中惯用的一种手段。相比其他形式的恐怖袭击,自杀性恐怖主义具有简单、廉价、机动性强、引起的社会恐慌大以及造成的人员伤亡严重等特征。自杀性恐怖主义在世界多地都已经发生过,被各种类型的恐怖组织广泛使用,针对的对象多样化,并且具有相对固定的行动流程。目前学术界从个体、组织、社会、文化和环境等方面对于自杀性恐怖主义的产生原因进行了分析。从个体的角度来看,一个人是否愿意进行自杀性恐怖袭击,最为重要的是当事人的理性计算,即个人通过自杀性恐怖袭击获得的好处是否能为自己带来更大的个人收益、是否可以增进家庭的福利、是否可以增加所在共同体的利益。在未来的反恐与应对中,国际社会可以通过增强重要设备的科技含量、增加双方对话与谈判的可能性、加强公共外交的力度、增进各国间的相互合作等方式以应对自杀性恐怖主义威胁。  相似文献   

17.
    
This article on drone strikes in Pakistan offers a distinctive empirical case study for critical scholarship of counterterrorism. By asking how cosmopolitanism has developed through UK news discourse, it also provides a constructivist contribution to the literature on drones. I argue that UK news discourse is not cosmopolitan because it focuses on risk and places the Other beyond comprehension. US–UK networked counterterrorism operations have complicated accountability, and while a drive for certainty promoted more scrutiny of policy, news media outlets, academics and activists turned to statistical and visual genres of communication that have inhibited understanding of the Other.  相似文献   

18.
Montreal's Summer Olympics in 1976 was a turning point in Olympic history: it was the Games' first highly visible security operation. It was also a transformative moment in the history of security planning in Canada: preparations for the games contributed to shifting the Security Services' focus from communism towards domestic and international terrorism. The following article documents, for the first time, the scope of this operation. It is based on five years of requests and appeals under the federal Access to Information Act, which led to the release of over fifty thousand pages of Royal Canadian Mounted Police documents. I argue that security for the Montreal Olympics was based largely on imagined threats. In addition, I argue that security costs for the Montreal Olympics were high but modest as compared to the overall budget. Nonetheless, Montreal set a precedent for high security costs that have since become the standard for hosting the Olympics. Finally, I argue that the Montreal Olympics had long-term implications for policing in Canada. The scale of the operation produced new resources and inter-agency links that were only made possible as a result of hosting the games.  相似文献   

19.
    
The structural problems characterising Mali interlocked with the dynamics of crisis triggered by the war in Libya in 2011, causing the collapse of one of the few African democracies. The Tuareg rebellion of 2012, the coup d’état and the Islamist takeover of Northern Mali were the three key phases of this crisis, which pushed France – the former colonial patron – to intervene military. After analysing the major local actors involved in the crisis, the article critically analyses the engagement of the EU in the crisis.  相似文献   

20.
Within a theoretical and methodological framework based on critical discourse analysis and the principle of the objective, and using recordings from a civil case concerning an inheritance dispute, this article explores how a mediator in China employed various discursive strategies to foster conflict resolution and construct a dual role. On the one hand, he tried to maintain an impartial stance, but on the other he violated neutrality by acting selectively against one party. I suggest that the mediator, influenced by social ideology and/or his own interests, appears to be “neutral” but is sometimes “biased,” resulting in the performance of dual roles that combine the functions of problem solver, judge, and mediator. This finding facilitates greater understanding of what Chinese mediation is and how it operates.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号