首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 262 毫秒
1.
How does arms availability affect armed conflict? What implications does increased arms availability have for the organisation of armed groups involved in war against the state? This article explores these questions by looking into the civil war in Libya and the subsequent proliferation of weapons in the broader Sahel/North Africa region. Its argument is based on secondary sources: online databases, international organisations reports and news media. First, we examine the question of firearms in Libya in order to understand how changing conditions of weapons availability affected the formation of armed groups during different phases of war hostilities (February–October 2011). We highlight that, as weapons became more readily available to fighters in the field during this period, a process of fragmentation occurred, hindering efforts to build mechanisms that would allow control of the direction of the revolutionary armed movement. Next, as security continued to be a primary challenge in the new Libya, we consider the way in which unaccountable firearms and light weapons have affected the post-war landscape in the period from October 2011 to the end of 2013. Finally, we put the regional and international dimensions under scrutiny, and consider how the proliferation of weapons to nearby insurgencies and armed groups has raised major concern among Libya’s neighbours. Short of establishing any causal relationship stricto sensu, we underscore the ways in which weapons from Libya have rekindled or altered local conflicts, creating permissive conditions for new tactical options, and accelerating splintering processes within armed movements in the Sahara-Sahel region.  相似文献   

2.

Objective

This study examines whether radical eco-groups have been deterred by legal sanctions. From a rational choice framework, I argue that members of these groups weigh costs and benefits. I measure an increase in costs, or an objective deterrence effect, through four federal sentencing acts targeted at reducing the criminal behavior of these groups [the tree-spiking clause of the Anti-Drug Abuse Act (ADA), the Animal Enterprise Protection Act (AEPA), the Anti-Terrorism and Effective Death Penalty Act (AEDPA), and the Animal Enterprise Terrorism Act (AETA)] and hypothesize that this legislation decreased the hazard of subsequent attacks.

Methods

This research is a quasi-experimental design utilizing the 1,068 illegal incidents perpetrated in the name of the environment, animal, or both as extracted from the Eco-Incidents Database. Using series hazard modeling, I examine the time until the next incident, serious incident, and ideologically specific incident in relation to dummy variables operationalizing the enactment dates of the above legislation.

Results

All in all, the results are somewhat consistent with a rational choice framework and my hypotheses. The ADA decreased the hazard of another attack (11 %) and environment-only attack (15 %), while at the same time increasing the hazard of a terrorist, damage, and animal-related attack. AETA decreased the hazard of all (47 %), damage (42 %), and the behavior it was aimed at, that of animal-only incidents (52 %). However, neither the AEPA, nor AEDPA had a significant effect on any of the outcomes.

Conclusions

Overall, radical eco-groups were deterred by legal sanctions, but these findings are legislation and outcome specific in addition to including displacement effects.  相似文献   

3.
Most research on physical abuse in relationships has been conducted from the perspective of the individual. Data compiled on couples have been mostly aggregate in nature. The present study examines physical violence at the level of the relationship from the perspective of both individuals involved. Using the Circumplex Model of Family Functioning as the conceptual framework, 75 intact couples in a counseling agency completed the Conflict Tactics Scale and the FACES III inventory at intake. The purpose of the research was to define characteristics of violent couples in terms of adaptability and cohesion in the relationship as measured by the self-report questionnaires. Findings suggest that violent couples are significantly more rigid on the adaptability dimension of FACES III. However, contrary to suggestions that violent couples are enmeshed, the present results showed that they were significantly more disengaged as measured by FACES III. Implications of the findings for therapeutic intervention of violent couples is discussed.  相似文献   

4.
In this paper we test several specific hypotheses derived from the intergenerational transmission of violence thesis to see if exposure to physical abuse has a special role in the etiology of violence. We employ a systematic statistical approach using data from the National Longitudinal Study of Adolescent Health (Add Health). Our findings suggest that a history of physical abuse is strongly associated with frequency of violence, but the association is not specific to violence and is mediated by their common association with nonviolent offending. Further, the association between physical abuse and violence is not significantly larger than the association between neglect or sexual abuse and violence. In summary, the data suggest that the association between abuse and violence is not unique to physical abuse and that the impact of physical abuse is not specific to violent behavior.  相似文献   

5.
NASA's Charter demands that innovations arising from the agency's work receive the widest possible dissemination to bring about a transfer of the technology to the public welfare. This Spinoff from the Space Program is now a predictable event because of analyses done over the years by NASA and economists. However, the initial identification of innovations must be done through disclosures from NASA, prime contractor and subtier contractor employee innovators. Although NASA provides innovators with nominal cash awards for published innovations and inventions, a problem exists for NASA in assuring that all valuable innovations and inventions get promptly identified, reported and disseminated. This paper describes the technique developed by NASA's prime contractor for Shuttle Orbiter (Rockwell Space Division), which has successfully captured over 1200 innovations for NASA-JSC. Aspects of the Program described include the contract requirements, motivational techniques, results, problems, and a discussion of the results. An order of magnitude increase in innovation reporting resulted from Rockwell's activities primarily accomplished using an inexpensive four-step process implemented at about 200 subcontractor's facilities.  相似文献   

6.
The NASA Technology Transfer Program has taken on a variety of roles during the past twenty years. This paper briefly reviews these roles. It presents then several organized approaches that could be adopted to maximize the cost/benefit of technology transfer from NASA to the private sector.  相似文献   

7.
In a series of cases decided over the past decade, the U.S. Supreme Court has consistently held that laws providing for both preventive detention and preventive execution do not violate Constitutional guarantees. Preventive detention and preventive execution share a common method and goal: Determine which individuals pose a threat to society and then remove those persons from society (i.e., incarcerate them) or-if they have also been convicted of first degree murder-execute them. In each of these cases, the Court has been presented with behavioral science data indicating that most predictions of dangerousness-anywhere from 51% to 95%-prove to be wrong. This article describes the relevant data and the Court's response to those data, then considers why the Court has responded as it has, what the Court's response may mean with regard to the future role of behavioral science data in Constitutional litigation regarding the rights of those accused or convicted of crimes, and what, if anything, behavioral scientists might do to enhance the utility and influence of empirical data in such litigation.  相似文献   

8.
The present paper offers resource material for evaluation of malingering, response bias, and symptom and performance validity. The material mostly consists of noncontroversial, paraphrased excerpts from relevant consensus statements, guidelines, codes, books, and articles. The five principles of the American Psychological Association (APA) ethics code were used to integrate the material. In addition, five other principles were needed (e.g., on science). The companion article on a new consensus statement on the ethical use of symptom and performance validity written for the Association for Psychological Advancement in Psychological Injury and Law (ASAPIL) in the journal Psychological Injury and Law (PIL; Bush, Ruff, & Heibronner, 2014) was instigated by and written partly based on the resources described in the present paper. The resources offered in the present paper are divided into the following sections: I. Malingering; II. Related Terms; III. APA Ethics Code; IV. Other Ethics Guidelines; V. Practice Guidelines; VI. Assessment Guidelines; VII. Other Ethical Sources; IX. Biases, Fallacies, Errors; X. Prior SVT-M/PVT-M Statements; XI. A New Ethical Model of Ten Principles; and XII. Instrumentation, and followed by Conclusions. The ten principles of the present ethical guidelines could be used to help revise the APA ethics code. The companion statement constitutes a major advance in the field and the present resource material facilitates its use.  相似文献   

9.
Forensic psychologists often refuse to release evaluation records, especially to the evaluee. One justification for this practice is based on the ethical positions that the referral source “is the client” and “controls release of records” (also found in the Specialty Guidelines for Forensic Psychology). To determine whether these ethical positions are shared by the field of forensic mental health, official documents from forensic mental health organizations were used as a proxy for these views. Thirty-four supporting arguments for either position were identified from the literature; it was postulated that official documents would support both positions and utilize supporting arguments. Fifty-four official documents were discovered, and qualitative analysis was used to construct a 17-category model of official views. Neither position was supported by a majority of documents, and few of the supporting arguments were utilized by supportive documents. The positions are unsupported because official documents espouse a wide diversity of views, there are a number of logical flaws in supporting arguments, and even official APA documents hold conflicting views. Ethical arguments are advanced for contrary positions, and the referral-source-control of records release is contrary to law. A more ethical view is that the psychologist may have multiple, possibly conflicting responsibilities to multiple entities; the psychologist’s roles and responsibilities should be clarified with each entity using an informed consent process. Psychologists should release records at the behest of the evaluee, lest they be subject to licensing discipline, Health Insurance Portability and Accountability Act (HIPAA) complaints, and/or civil sanctions. Recommendations are offered for psychologists, future ethics codes and professional practice guidelines, and test security practices.  相似文献   

10.
Nearly one-third (28.4 %) of adolescents experience some form of physical assault in the home. A survey of 176 adolescents documents optimistic bias; adolescents believe they are less likely than others to become victims of family violence. Elements of the Health Belief Model, perceived susceptibility and perceived severity, predicted optimistic bias. The study also considers the impact vicarious experience through the media on adolescent risk perception.  相似文献   

11.
During the summer of 1985, LCDR Robert Cox completed a course entitled “Technology Transfer” at the U.S. Naval Postgraduate School, Monterey, California. The objectives of the course were to enhance the capability of course participants to take advantage of innovations, to move appropriate research and development results into use, and to gain insight into the Technology Transfer responsibilities of managers. LCDR Cox' paper was chosen from among several contributions as an example of the application of Technology Transfer principles to a manager's job.  相似文献   

12.
Wide variations in prevalence estimates of marital aggression point to the absence of a uniform and adequate definition of marital aggression. To focus on the construct validity of Straus' (1979) Conflict Tactics Scales, the most frequently used measure of marital aggression, two studies were conducted. Based on responses to the Conflict Tactics Scales, two consistent factors (viz. Physical and Psychological Aggression) emerged in separate samples of 187 couples seeking therapy for marital problems, and 398 nonclinic couples in beginning marriages. The factor structure was consistent across clinic and nonclinic samples, sex, geographical sites, time, and socioeconomic status. Implications for the measurement of interspousal physical aggression are raised (e.g., mild, moderate, and severe aggression load on the same factor) and appropriate directions for further research on the construct validity of the Conflict Tactics Scales are suggested (e.g., conducting similar factor analyses on aggressive couples).  相似文献   

13.
The Technology Transfer issue has aroused much controversy in the last two decades among management researchers. This paper attempts to discuss the problems of Technology Transfer, the debate on this issue and some of the theories concerned. It also presents a suggested theoretical framework to assist the LDCs in determining need for, and receiving of, new technology.  相似文献   

14.
The Logistics Support Laboratory at the Belvoir Research and Development Center is responsible for the development of water purification equipment for the field Army. Developing water purification systems for military use has led to technological breakthroughs which have benefitted the civilian community. Two examples are the evaluation of the Army's ERDLator for the decontamination of water polluted with asbestos fibers, and design of a plant for the soluble-sulfide precipitation of heavy metals from industrial wastewater.  相似文献   

15.
This study compares 202 juvenile offenders on a series of preoffense adjustment variables grouped into five categories: Family Dysfunction, School Adjustment, Prior Violence, Criminal Activity, and Substance Abuse. Emphasis is placed on the importance of distinguishing subgroups of violent youth based on the type of assault (interpersonal conflict or crime-related) and the youth's relationship to the victim (parent or other victim). Findings support the need to identify multiple developmental pathways and distinctive risk factors for different forms of juvenile violence.  相似文献   

16.
A risk marker analysis of assaulted wives   总被引:1,自引:0,他引:1  
In the wife assault literature, a number of risk markers have been identified. Using the data of the female respondents to the National Family Violence Survey (n = 699), a multivariate analysis was performed to examine which risk factors best differentiated between women involved in nonviolent relationships, verbally aggressive relationships, relationships exhibiting minor physical aggression and severely violent relationships. High levels of marital conflict and lower socioeconomic status emerged as the primary predictors of an increased likelihood of wife assault. Research implications are discussed.  相似文献   

17.
The term Government Transfer Services is used in reference to any of the organized streams of public resources that flow into private economic activity. This includes such activities as offshore leasing, Social Security, and NASA technology transfer services. This paper describes a performance measure, empirical results, a theory, and a control model for such services. These are illustrated by a specific example (NASA). An agenda for developing this service control method is also presented.  相似文献   

18.
This report reviews technology transfer in light of the Stevenson-Wydler Technology Innovation Act of 1980. Following a brief introduction, a section on “Definitions” explains the several meanings that the phrase “technology transfer” now carries in policy discussions. The next section, on “Passive Technology Transfer”, reviews traditional Department of Defense scientific and technical information programs that relate to technology transfer. A section on “Military Industrial Transfer” examines technology transfer from the Defense Department to private industry, expecially to defense contractors. A section on “The Stevenson-Wydler Act and Active Technology Transfer” describes the principal provisions of the new act and why Congress passed it. The next two sections, on “NASA’s Technology Transfer Program” and “The Federal Laboratory Consortium” outline the two existing Government programs Congress relied upon in developing ideas for the new law. A section on “Implementation of the Stevenson-Wydler Act”, discusses several important issues that must be considered by Navy laboratory management as the new law is put into effect in the Navy. Finally, a brief conclusion emphasizes the major point of the report: That Congress, in passing the Stevenson-Wydler Act, did not fully consider what relationship the new technology transfer programs it was requiring in the Executive Branch should bear to existing programs with similar purposes. If the public interest is to be served, the report argues, the Navy must consciously and carefully determine the proper nature of this relationship.  相似文献   

19.
This paper examines the effects of partial information on volatility and on the design of simple feedback rules in a rational expectations context. Previous studies have investigated these effects using small analytical models. Here we employ an empirical two-bloc model derived from the OECD Interlink model. The main conclusions are that when current asset prices are observed, but GDP is observed with a delay, then the effect on volatility is small, compared to the full information case. Likewise the choice of simple feedback rules is little affected, although a non-optimal use of information in their design may lead to a deterioration in performance.  相似文献   

20.
In later Yogācāra, the path to enlightenment is the course of learning the Four Noble Truths, investigating their meaning, and realizing them directly and experientially through meditative practice (bhāvanā). The object of the yogi’s enlightenment-realization is dharma and dharmin: The dharma is the true nature of real things, e.g., momentariness, while the dharmin is real things i.e., momentary things. During the practice of meditation, dharma is directly grasped in the process of clear manifestation (vi?adābhā) and the particular dharmin is indirectly ascertained in the process of determination (adhyavasāya). So, even though a yogi does not directly perceive any actual thing, s/he is still nonetheless able to undertake practical activity directed toward it. The realization of the Four Noble Truths consists of two aspects: firstly, the manifestation of momentariness, etc., in the stream of the yogi’s consciousness; secondly, the ascertainment of momentariness, etc., in whatever s/he happens to encounter.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号