首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
《Justice Quarterly》2012,29(4):428-461
Scholarly interest in terrorism has grown dramatically since September 11. One important line of inquiry within this body of research has been the media’s coverage of terrorism. Although there have been several important studies published on this topic, there has been little research examining media coverage of domestic terrorism. This study fills this gap by examining the media’s coverage of terrorism in the United States from 1980 until September 10, 2001. The analysis is based on a list of terrorist‐related incidents and New York Times articles pertaining to each incident. This study documents the amount and type of coverage received by domestic terrorism incidents, and identifies the variables influencing whether an incident is covered and how much space it receives. The results indicate that most terrorism incidents receive little or no coverage in the news, but a few cases are sensationalized in the press. There are several characteristics that consistently explain which incidents are covered and receive substantial news space. Incidents with casualties, linked to domestic terrorist groups, targeting airlines, or when hijacking is used as a tactic are significantly more likely to be covered and have more articles and words written about them. This study concludes with a discussion of the policy implications of these findings for the understanding of terrorism as a social problem.  相似文献   

2.
《Global Crime》2013,14(4):381-392
By drawing upon the first results of an analysis carried out on the 1998–2005 period, this work tries to reconstruct the trends in terrorist attacks and their media coverage in seven international daily newspapers. Also the dynamics of media over/under-representation are investigated, as well as the existence of differentiated coverage related to the geopolitical distance/proximity of the country object of attack. Special attention is paid to an empirical analysis of the Iraqi case. The work opens with a short methodological discussion on the issue of terrorism measurement, from its operational definition to the choice of the database on which to carry out the analyses.  相似文献   

3.
我国刑法中“恐怖活动犯罪”的认定   总被引:12,自引:0,他引:12  
陈忠林 《现代法学》2002,24(5):24-31
“制造社会恐怖”是恐怖活动犯罪特有的犯罪目的 ,正确理解恐怖活动犯罪的这一犯罪目的的内容 ,以及由这一目的决定的恐怖活动犯罪的罪过结构和客观特征 ,是司法实践中认定恐怖活动犯罪 ,正确适用刑法相关规定的基本前提。  相似文献   

4.
In this paper I shall discuss how criminal investigation might contribute to a situational approach to terrorism. Therefore I discuss Policing Terrorism by Newman and Clarke, and confront it with experiences from work in the field of counterterrorism: criminal investigations at the Dutch National Police Agency (NPA). I demonstrate that Newman and Clarke have too narrow a scope on policing terrorism, in particular when it comes to the role of criminal investigation. They restrict their focus to local police work in the phases immediately before and after a terrorist attack. This is unfortunate because case files show that criminal investigators play a central role in the prevention of terrorism. They intervene in earlier phases of terrorist preparation, target a wider range of terrorist offences than terrorist attacks, and prosecute radicals for their non-terrorist offences. Furthermore, criminal investigations offer insights that might be of help in developing an SCP approach to terrorism.  相似文献   

5.
Radicalization to terrorism is a multifaceted process with no single theory or approach to explain it. Although research has focused on understanding the process, there is still a dearth of studies that examine an empirically driven pathway to terrorism behavior. This study examines a cross-sectional sample of incarcerated men convicted of terrorism in Iraq (N = 160). A questionnaire-guided interview included adverse childhood experiences (ACEs), conduct disorder (CD), antisocial personality disorder (ASPD), religious and political ideology, views about causes of terrorism, and the severity of terrorist acts. Path analysis was employed to examine the relationships between these factors and to identify the model with the best fit. After adjusting for age, employment, and location, results indicated that ACEs positively impacted CD, ASPD, religious guidance, and terrorism attitudes. ASPD positively affected political commitment and terrorism attitudes, but inversely affected current religious commitment. Political commitment inversely influenced terrorism attitudes. Religious commitment positively influenced the prioritization of religion in life, which subsequently impacted terrorism attitudes and behavior severity. Additionally, attitudes toward terrorism directly affected the severity of terrorism behavior. All paths in the final model were statistically significant at p < 0.05. Although these findings may be limited in generalizability due to the unique sample, results support the complex and interdependent nature of childhood and adult experiences on the development of both terrorism attitudes and the severity of terrorism behavior.  相似文献   

6.
The UK Supreme Court judgment in R v Gul presented a unique opportunity for a judicial appraisal of the definition of terrorism contained in section 1 of the Terrorism Act 2000. While the applicant was ultimately unsuccessful in his challenge, the Supreme Court's rejection of the state's argument that reliance on prosecutorial discretion could mitigate certain absurd applications of the section 1 definition of terrorism, eg the labelling of acts of UK or other military forces as terrorist, has potentially wide‐raging implications for the UK's counter‐terrorism measures. In addition, the powerful obiter dictum arguing in favour of a reform of this definition and a ‘root‐and‐branch’ review of counter‐terrorism legislation is a strong rebuke of recent high profile misapplications of such powers.  相似文献   

7.
Abstract

A number of major organisations have, over the last five years or so, become involved in offering advice on the taking and use of photographs of children. The Information Commissioner's Office, for example, has issued guidance on the legal situation surrounding the photographing of children and the NSPCC has drawn up recommendations, for community groups, concerning the placement of children's photographs on websites.  相似文献   

8.
Previous research has demonstrated that the strategic use of evidence (SUE) approach of interviewing criminal suspects is effective at eliciting cues to deception. This study aims at expanding on the SUE approach by testing the technique of general-to-specific evidence framing. We conducted an experiment using a mock terrorism paradigm. Guilty participants took part in a simulated act of terrorism, while innocent participants performed a similar act involving no transgression. All participants (N?=?102) were then interviewed using one of four evidence disclosure styles (early disclosure, late disclosure, 2-step disclosure, or 4-step disclosure). We expected that disclosing evidence to the suspect gradually, with increasing specificity, would induce guilty suspects to alter their statements to a greater extent than innocent suspects. General-to-specific evidence framing effectively discriminated between guilty and innocent suspects, but results only partially supported the hypotheses.  相似文献   

9.
Terrorism, in all its manifestations, has redefined national and international security landscapes in recent years. The impact of terrorist organisations has mushroomed, and they are becoming increasingly complex. There is evidence to point to the fact that the planning, recruitment, coordination and perpetration of terrorist acts has been largely assisted by the proliferation of networking hardware such as computers, cell-phones, and internet access. In addition, the availability of various digital tools and software has amplified the ease of communication, regardless of location. Strategy to date has been dominated by law enforcement and military actions, as exemplified in most international initiatives against terrorism. In some cases, this has elicited sympathy for the terrorist organisations because of resulting unintended civilian casualties. There is now recognition that a shift in strategy to a more civil society focussed approach which addresses the underlying causes may be more effective.  相似文献   

10.

Objective

This article explores patterns of terrorist activity over the period from 2000 through 2010 across three target countries: Indonesia, the Philippines and Thailand.

Methods

We use self-exciting point process models to create interpretable and replicable metrics for three key terrorism concepts: risk, resilience and volatility, as defined in the context of terrorist activity.

Results

Analysis of the data shows significant and important differences in the risk, volatility and resilience metrics over time across the three countries. For the three countries analysed, we show that risk varied on a scale from 0.005 to 1.61 “expected terrorist attacks per day”, volatility ranged from 0.820 to 0.994 “additional attacks caused by each attack”, and resilience, as measured by the number of days until risk subsides to a pre-attack level, ranged from 19 to 39 days. We find that of the three countries, Indonesia had the lowest average risk and volatility, and the highest level of resilience, indicative of the relatively sporadic nature of terrorist activity in Indonesia. The high terrorism risk and low resilience in the Philippines was a function of the more intense, less clustered pattern of terrorism than what was evident in Indonesia.

Conclusions

Mathematical models hold great promise for creating replicable, reliable and interpretable “metrics” to key terrorism concepts such as risk, resilience and volatility.  相似文献   

11.
Global terrorist networks are dependent on receiving financial support from a variety of sources, including individuals, charities and corporations. Also known as terrorist financing, the potential of terrorism finance to resemble a global threat has been recognised and also its closeness to other international crimes such as money laundering and organized crime. As a result, possible responses have to constitute co-ordinated, multi-lateral and multi faceted actions under the umbrella of a wide range of international stakeholders such as the United Nations Security Council and the Financial Action Task Force. Combating terrorism requires a ??holistic?? approach which allows for a mix of possible responses. Besides ??kinetic?? security operations (such as targeted killings) and the adoption of criminal prosecution measures another possible response could be the use of US styled transnational civil litigation by victims of terrorism against both, terrorist groups and their sponsors. Corporations, both profit and non profit, such as banks and other legal entities, as well as individuals, are often complicit in international terrorism in a role of aiders and abettors by providing financial assistance to the perpetrators (cf. UN Al-Qaida Sanctions List: The List established and maintained by the 1267 Committee with respect to individuals, groups, undertakings and other entities associated with Al-Qaida). Such collusion in acts of terrorism gains additional importance against the background of so called ??Hybrid Threats??, NATO??s new concept of identifying and countering new threats arising from multi-level threat scenarios. This article discusses the potential impact of US terrorism lawsuits for the global fight against terrorism.  相似文献   

12.
Increasing anecdotal, empirical, and research evidence indicates mental disorder history is one of the several factors associated with increased risk of involvement in lone-actor terrorist activities. Currently, few studies have been conducted on the mental disorder histories of individuals assessed as at risk of involvement in terrorist activities (Meloy, J Threat Assess Manag 2019;6:93). This pilot study describes demographic, psychiatric, and criminal characteristics of a sample of Scottish individuals identified by the Prevent element of the U.K. national counterterrorism strategy, and outcome data after follow-up at 2 years. Twenty-three individuals were referred to Prevent as posing a national security risk from a county in Scotland. Their records were studied for psychiatric and criminal histories. Nine (39%) had previous psychiatric contact, all were “lone actors”, and none were embedded with organized terrorist groups. The most common diagnoses were substance use disorder, personality disorder, depression, and psychotic disorder. The sample displayed factors associated with increased risk of violence including previous offending, early behavioral difficulties, school problems, substance misuse, cluster B personality disordered traits. After 2 years, 44% of the mentally disordered group had re-offended. The offense types were generally similar to those prior to the individual being involved with the Prevent counter terrorism program. Only one of the mentally disordered group committed a further national security offense. In this sample, mental disorder history is overrepresented in individuals who come to the attention of the U.K. Prevent counter terrorism strategy. Further empirical studies with additional power are required to develop the empirical evidence base in this under-researched area.  相似文献   

13.
Despite considerable speculation among terrorism researchers regarding the conditions leading to organizational desistance from terrorism, quantitative analysis of terrorism frequently focuses on terrorist attacks as the unit of analysis, resulting in a near complete absence of analyses of terrorist organizations themselves. Moreover, research on organizations that engage in terrorism has generally been limited to case studies of individual organizations. Toward a more general understanding of what conditions predict organizational desistance from terrorism, this study uses newly available data from the Global Terrorism Database to analyze the terrorist activity of 557 organizations that were active for at least 365 days between 1970 and 2008. Much like research on conventional crime, prior research on terrorism has focused almost exclusively on the onset of criminal behavior and has neglected determinants of declining activity. Here I use group-based trajectory models to investigate patterns of decline in organization-level terrorist activity. In particular I examine how patterns of onset relate to patterns of decline among these organizations. I first estimate the trajectory models for the organizations’ frequency of attacks, and then calculate the annual ratio of attacks to attacks-at-peak for each organization in order to isolate patterns of decline, independent of the magnitude of activity. I then repeat the trajectory analysis to determine if the relative shape of the organizational trajectory has significance beyond the overall frequency of attacks. I find that the speed and magnitude of an organization’s emergence are correlated with its longevity such that those organizations characterized by rapid onset are two to three times more likely than those characterized by moderate onset to reach moderate or high levels of attacks per year. Likewise, as the rate and overall volume of attacks at onset increase, so does the likelihood that the group will follow a persistent pattern of decline. I conclude with a discussion of the implications of patterns of decline among terrorist organizations for research and policy.  相似文献   

14.
This article examines the connections between mental illness and terrorism. Most social scientists have discounted a causal relationship between mental illness and terrorism. This is not necessarily always the case within terrorism studies, the media, or political circles where the psychology of terrorism is often expressed in the language of mentalisms, and theories of pathologisation continue to exist. This article reaffirms the view that apart from certain pathological cases, there is no causal connection between an individual's mental disorder and engagement in terrorist activity. The individual terrorist's motivations can be explained by other factors, including behavioural psychology. However, there may be a connection between an individual engaging in terrorist activity and developing a mental disorder[s]. Certain stressors that occur because of terrorist activity may result in psychological disturbance in terrorist individuals. These factors may partially explain terrorist group instability and should be taken into account when detaining and interrogating terrorist suspects.  相似文献   

15.
Through case studies selected among the world’s main drug-producer countries and regions (Afghanistan, Bolivia, Burma, Colombia, Morocco, Peru, and West Africa) this paper depicts the global scene in order to improve understanding of how agricultural illicit drug economies may foster the emergence of intra-state conflicts, help prolong intra-state conflicts or, conversely, prevent some crises. The paper thereby examines the complex connections between agricultural illicit drug production and intra-state conflict in the all-important context of underdevelopment and globalisation. Because it is illegal, drug production may affect international security, above all through the armed violence it creates and the uses to which resulting profits are put (financing of armed groups and criminal organisations, and even – as has been recently though mostly erroneously claimed – terrorist organisations [4, 5]. However, it is important to avoid restricting the question of drug production to security issues, and instead to examine the phenomenon overall in an analysis encompassing everything from the causes of the recourse to an illegal drug economy to the effects of official responses. Through case studies selected from the main regions of illegal agricultural drug production (Afghanistan, West Africa, Burma (Myanmar), Bolivia, Colombia, Morocco and Peru) this paper aims at improving our understanding of how such production might foster the emergence of conflicts, ease their prolongation or, conversely, prevent crises in certain situations. These three questions require examining the connections between the agricultural economy of illegal drugs and conflict in the all-important context of underdevelopment and of globalisation.  相似文献   

16.
This study provides an application of cross-classified multilevel models to the study of early case processing outcomes for suspected terrorists in U.S. federal district courts. Because suspected terrorists are simultaneously nested within terrorist organizations and criminal court environments, they are characterized by overlapping data hierarchies that involve cross-nested ecological contexts. Cross-classified models provide a useful but underutilized approach for analyzing such data. Using the American Terrorism Study (ATS), this research examines case dismissals, trial adjudications and criminal convictions for a sample of 574 terrorist suspects. Findings indicate that diverse factors affect case processing outcomes, including legal factors such as the number of counts, number of co-defendants, and statute of indictment, extralegal factors such as the ethnicity of the offender, and incident characteristics such as the type of terrorism target. Case processing outcomes also vary significantly across both terrorist groups and criminal courts and are partially explained by select group and court characteristics including the type of terrorist organization and the terrorism trial rate of the court. Results are discussed vis-à-vis contemporary research on terrorism punishments and future directions are suggested for additional applications of cross-classified models in criminological research.  相似文献   

17.
Protophormia terraenovae (Robineau‐Desvoidy) (Diptera: Calliphoridae) and Phormia regina (Meigen) (Diptera: Calliphoridae) are morphologically similar blow fly species commonly used for estimating postmortem intervals. Field collection and storage of adults can result in color changes, in particular on calypters and palps; often collected specimens show damage such as wing fray or fungal growth. We measured the frons width: total head width ratio using photographs (ImageJ version 1.49) to differentiate these two species. Both sexes were distinguishable to species, with the greatest difference between males: 12.34% P. terraenovae versus 1.62% P. regina, less so for females: 40.25% P. terraenovae, versus 33.65% P. regina. Incorporating this feature into future blow fly keys would help with distinguishing field‐caught specimens when other features are obstructed.  相似文献   

18.
According to the belief in a just world (BJW) theory, the most threatening victim for the observers' BJW is the innocent victim whose suffering persists. Consequently the innocent victim whose suffering persists should be more secondarily victimized by high-BJW participants than by low-BJW participants. However, research has never systematically tested this basic prediction of the theory. In these two studies we tried to determine the impact of the observer's BJW, the victim's innocence, and the persistence of the victim's suffering on secondary victimization. In study 1, an interaction between BJW and victim's innocence was found on the attractiveness of the victim. In study 2, an interaction between BJW, victim's innocence, and persistence of suffering was found on the derogation of the victim.  相似文献   

19.
Over the past 50 years, suicide bombings have become an increasingly common tactic of politically motivated violence, and a rising number of these attacks feature women perpetrators. Prior literature suggested that female-perpetrated suicide bombings occurring between 1985 through 2008 inflicted greater casualties, which may account in part for their increased use by terror groups. The current research project ascertains whether sex continues to predict the lethality of suicide bombing attacks perpetrated by terror groups over the decade leading up to 2016. The study utilizes secondary data sampled from the Global Terrorism Database (N?=?881) and the Chicago Project on Security and Threats (N?=?1,722). A negative binomial model regressing lethality against perpetrator and conflict covariates did not observe a statistically significant relationship between sex and lethality. Male and female suicide bombers demonstrated similar lethality in suicide bombing events between 2005 and 2016, although scatterplots suggest some aberration during the years 2009, 2010, and 2016. Pairwise comparisons of perpetrator sex by conflict observed some variation in the lethality of attacks, with female suicide bombers from Al Qaeda, the Islamic State of Iraq, and Iraqi rebel groups found more lethal than male suicide bombers from Boko Haram and the Nigerian rebels. The current research project contributes to the literature by demonstrating the evolving nature of terrorism and tactics relevant to the lethality of politically motivated violent attacks.  相似文献   

20.
Part I of this two-part article presents a psychological and political analysis of the terrorist mind. Part II describes the major current psychological classifications and typologies of domestic and foreign terrorism. Explanations are offered in terms of our current understanding of the personality and psychopathology of terroristic violence. A heuristic model of classifying terrorism in terms of personality and psychopathology is presented. In addition to guiding further research and theory on the psychology of terrorism, this model has immediate practical application to the investigation and interrogation of terrorist suspects.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号