共查询到20条相似文献,搜索用时 15 毫秒
1.
近年来,东南亚海上私人安保公司悄然兴起。其参与东南亚海上安全治理是海上安全环境的变化、海上安全供给与需求的鸿沟、东南亚民主化进程及安全部门改革所共同驱动的结果。海峡和港口是私人安保公司重点参与的治理区域,在马六甲海峡,尽管私人安保公司挑战了国家主权,但其能有效应对海上安全威胁,在短期内已得到国家“默许”;而印尼勿拉湾港口是一种多主体参与治理的安全系统,私人安保公司与其他行为体竞争,反而导致港口不安全。相比较而言,私人安保公司在海峡和港口安全治理中具有隐秘性强、与国家关系复杂、规制难及趋利性等共性;而不同的参与模式与作用则反映了二者的差异性。当前,中国要进一步挖掘海上私人安保的潜力,并做好相应的规制;要重视利用私人安保公司在海峡和港口安全治理中的共性与差异,鼓励中国与东南亚私人安保公司发展战略合作,保护中国海外利益。 相似文献
2.
3.
R. Kim Cragin 《Terrorism and Political Violence》2014,26(2):337-353
Although much has been written about how and why individuals become terrorists, very little research has focused on why individuals choose not to become involved in political violence. Some assume that these non-radicalized individuals simply have not had the same life experiences as terrorists. Yet one only has to explore areas of conflict, such as the Gaza Strip, northwest Pakistan, or the southern Philippines, to wonder why more individuals have not joined local militant groups. This article presents a conceptual model ofnon-radicalization in an attempt to move the discussion forward on this topic. It argues that it is impossible to understand radicalization pathways, or design policies to preempt them, without a complementary knowledge ofwhy individuals resist the influence ofviolent extremism. 相似文献
4.
John Turner 《Terrorism and Political Violence》2013,25(4):541-558
Al Qaeda after the invasion of Afghanistan can now be understood as not only an international terror organisation but an ideology which inspires groups with similar goals of a supranational caliphate. The Al Qaeda ideology draws from long standing historical Islamic concepts that date to the time of Muhammad. The ideologues of the organisation, most notably Ayman al Zawahiri, have cleverly used these ideas and the works of other Islamists to create not just a terror organisation but an ideology designed to unite disparate groups of Islamic radicals around the world. 相似文献
5.
Joshua D. Freilich William S. Parkin Jeff Gruenewald Steven M. Chermak 《Terrorism and Political Violence》2013,25(5):943-965
ABSTRACTThis study explores differences in perpetrators of suicide attacks and non-suicide attacks in the United States. The study uses data on far-right and Al Qaeda and affiliated/inspired terrorists between 1990 and 2013 from the United States Extremist Crime Database. Our analysis estimates logistic regression models to test whether suicide attackers were more likely to have exhibited specific risk factors for suicidality, while examining other prominent claims regarding patterns of suicide terrorism. Suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide or to have been diagnosed as mentally ill. Suicide attackers were more likely, though, to have a history of substance abuse, to be loners, have served in the military, participated in paramilitary training, and be more ideologically committed to the cause. We found that Al Qaeda affiliated/inspired attackers were more likely than far-right attackers to have engaged in a suicide mission. With the current focus on Americans traveling to Syria and Iraq to receive training and fight for jihadist movements (e.g., the Islamic State), our findings appear relevant. Observers have expressed concern that these fighters may return and then commit attacks in their homeland. Law enforcement could make use of this study’s findings. 相似文献
6.
Manuel R. Torres Javier Jordán Nicola Horsburgh 《Terrorism and Political Violence》2013,25(3):399-421
The Global Jihadist Movement (GJM) has a series of well-defined objectives, which constitute the central points of their ideology. In the realization of these goals, propaganda and public communication play a central role. This article studies the evolution of the principal characteristics of GJM propaganda, analyzing over 2,000 documents issued by the GJM between 1996 and 2005. 相似文献
7.
Stephen Tankel 《Terrorism and Political Violence》2013,25(2):299-322
ABSTRACTWhy did the Islamic State of Iraq and al-Sham (ISIS) and Jabhat al-Nusra (JN)—two groups that shared similar ideological preferences and were both initially part of the Al Qaeda network—take different paths in the Syrian conflict? Part of the answer lies in the fact that JN is primarily a Syrian organization, whereas Iraqis lead ISIS. A jihadist group’s relationship to its country of origin and domicile (the two are not always the same) helps to explain that organization’s ideological preferences and alliance behavior. Yet no method of categorization based on jihadist-state relations exists. I fill this gap by theorizing an explanatory typology based on a jihadist group’s relationship with its country of origin and/or domicile. This typology consists of two tiers. The first classifies jihadist organizations based on whether they are nationally homogeneous or heterogeneous, and whether they are based in their country of origin, exile, or multiple locations. The second tier categorizes groups based on the nature of their engagement—collaborative, belligerent, or neutral—with a state. This new typology enables the generation of multiple hypotheses and has practical implications given that most U.S. counterterrorism efforts require cooperation from partner nations. 相似文献
8.
Eric Stollenwerk Thomas Dörfler Julian Schibberges 《Terrorism and Political Violence》2016,28(5):950-970
Network analysis has attracted significant attention when researching the phenomenon of transnational terrorism, particularly Al Qaeda. While many scholars have made valuable contributions to mapping Al Qaeda, several problems remain due to a lack of data and the omission of data provided by international organizations such as the UN. Thus, this article applies a social network analysis and subsequent mappings of the data gleaned from the Security Council's consolidated sanctions list, and asks what they can demonstrate about the structure and organizational characteristics of Al Qaeda. The study maps the Al Qaeda network on a large scale using a newly compiled data set. The analysis reveals that the Al Qaeda network consists of several hundred individual and group nodes connecting almost all over the globe. Several major nodes are crucial for the network structure, while simultaneously many other nodes only weakly and foremost regionally connect to the network. The article concludes that the findings tie in well to the latest research pointing to local and simultaneously global elements of Al Qaeda, and that the new data is a valuable source for further analyses, potentially in combination with other data. 相似文献
9.
Martin Durham 《Terrorism and Political Violence》2013,25(1):65-79
The devastating explosion in Oklahoma City on 19 April 1995 has drawn attention to the existence of citizen militias and the Patriot movement of which they are part. Opposed to gun control and taxation and strongly influenced by claims of concealed foreign troops, concentration camps and plans to impose a New World order, Patriots are the inheritors of a radical rightist conspiratorialism dating back to the 1960s. Believing American liberties to be as threatened by Oliver North as by President Clinton, the movement is a diffuse subculture which encompasses both racist adherents of what is termed Christian Identity and more traditional Christian fundamentalists (and even includes some members of ethnic minorities). The Oklahoma bombing, it believes, was the work of forces seeking to demonize the movement but while it argues that the creation of militias is purely defensive, there is a constant danger of confrontation with the state in the rhetoric of a second American Revolution. 相似文献
10.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):95-97
Research on the motives of those who engage in small group political violence typically takes a qualitative or quantitative form. I argue that researchers should seek to understand why people engage in small group political violence, and that the best way to achieve such understanding is to employ both. The advantages of this approach are discussed in this paper, as is the importance of recognizing that the activities of all actors in any given violent location, including state actors, should be accounted for in research. 相似文献
11.
Robert S. Leiken 《Terrorism and Political Violence》2013,25(4):503-521
This article uses immigration and other biographical data to refute much of the conventional wisdom about the relationship between terrorism and immigration. Using a database created from the biographical data of 373 terrorists, we have established a number of significant findings. Over forty percent of our database is made up of Western Nationals. Second, despite widespread alarms raised over terrorist infiltration from Mexico, we found no terrorist presence in Mexico and no terrorists who entered the U.S. from Mexico. Third, we found a sizeable terrorist presence in Canada and a number of Canadian-based terrorists who have entered the U.S. In addition to illuminating the terrorist networks entrenched in the West, this paper is also an attempt to advance the field of terrorism studies by taking a quantitative approach to data analysis. 相似文献
12.
Over the last few years, Moroccans have been disproportionately involved in jihadist terrorism. Morocco has been increasingly identified as one of the largest producers of terrorists and insurgents in Afghanistan, Iraq, and throughout Europe. This article examines the factors behind the emergence of jihadist terrorism in Morocco, and how this terrorist threat has gone beyond this country's borders. Three factors have contributed to this development: the influence of global jihad on potential Moroccan jihadists; the growing Islamization of the country; and deteriorating socioeconomic conditions. In analyzing these variables, special attention will be paid to the Casablanca terrorist attacks on May 16, 2003, marking the debut of suicide terrorism in Morocco. The article will also examine the principal counterterrorist initiatives Morocco has implemented in response to this threat. 相似文献
13.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):72-83
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities. 相似文献
14.
Devin D. Jessee 《Terrorism and Political Violence》2013,25(3):367-388
This analysis surveys Al Qaeda's employment of denial and deception (D&D) and shows that it uses D&D on tactical and operational levels in order to achieve strategic results. It defines denial and deception and explains how they relate to Al Qaeda, overviews Al Qaeda's changing network structure and seeks to summarize how Al Qaeda employs D&D throughout its operations. This paper is structured to show that denial and deception are institutionalized factors that manifest themselves through all aspects of bin Laden's organization and that the traditional conception of D&D—that nonstate actors are incapable of employing deception as an element of grand strategy—is incorrect. 相似文献
15.
Jonathan Kennedy 《Terrorism and Political Violence》2013,25(2):201-212
The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001. 相似文献
16.
Megan K. McBride 《Terrorism and Political Violence》2013,25(4):560-581
Drawing from the work of political theorists, theologians, anthropologists, journalists, philosophers, and contemporary psychologists studying Terror Management Theory (TMT), it becomes possible to see that the concepts of existentialism and ideology may be useful for modern thinkers attempting to understand a problem such as terrorism. Integrating work from these fields makes it possible to see that terrorism may be driven by an existential-terroristic feedback loop: a cycle in which people support or engage in terrorism to alleviate existential anxiety but ultimately find this anxiety exacerbated in the wake of the violence they create or sanction. The loop is closed when this exacerbated anxiety compels them to reaffirm their support of, or participation in, terrorist violence. If this model is valid, then effectively addressing the problem of terrorism requires joining existing U.S. policies with policies that address ideologies. Specifically, policies must aspire to a) mitigate existential anxiety, b) provide a compelling counter-narrative, c) address environmental factors conducive to radicalization, d) prevent the formation of radicalized groups, and e) deradicalize existing ideologues. 相似文献
17.
马六甲海峡与南海航道安全 总被引:4,自引:0,他引:4
马六甲海峡是世界上最重要的海上交通航线之一,其安全的主要问题是海盗的袭击。在反海盗的过程中,如何处理好海峡沿岸国家的主权问题成为确保马六甲海峡安全的关键。美、日、印度三国以反海盗袭击和打击恐怖主义为名,在南海海域加强军事合作,其真正目的据说是牵制中国,这无疑增加了南海航道的不安全因素。 相似文献
18.
在东南亚地区的非传统安全合作中,存在3个层次的合作机制。东盟主导下的非传统安全合作机制,深化缓慢,执行乏力,主要扮演着合作的倡导者和规划者的角色;成员国间的双边或多边小范围合作机制是东盟合作计划的实施者,但合作领域单一,能力有限;区外西方大国主导的双边或多边合作机制,将传统安全与非传统安全合作相结合,发展迅速。这3个层次的非传统安全合作机制既相互支持,又相互竞争。面对东南亚非传统安全合作机制的独特架构,中国需进行策略思考。 相似文献
19.
20.