首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This article examines how Great Britain helped create Pakistan’s Inter-Services Intelligence Directorate (ISI) with two goals: (1) establishing a Pakistani branch of a Commonwealth intelligence network; (2) ensuring information security within that network. Ultimately, this endeavor failed because of perceived deficiencies in Pakistan’s security institutions and Britain’s inability to address Pakistan’s security needs. By the mid-1950s ISI forged close ties with the United States which offered more and with fewer political strings attached. This article offers new insights on intelligence alliance formation during the cold war. It also provides a useful case study in the weaknesses of multilateral intelligence coalitions.  相似文献   

2.
《Patterns of Prejudice》2012,46(1):51-63
The phenomenon of ‘social antisemitism’ is well known. By the beginning of the twentieth century, however, an idiosyncratic variant had emerged in France. Where, elsewhere, social antisemitism tended to be ingrained and unthinking, this French variant was (typically) more theoretical, and its practitioners tended to be among the most prominent authors and thinkers. It stressed the essential cultural differences between the ‘French’ and the ‘Israelites’, and the ‘separateness’ of the Jews within France, and also developed a series of facile generalizations about the essentially inferior nature of the Jewish intellect. Griffiths examines this phenomenon, both for its characteristics and for its widespread existence in French intellectual circles, by taking a specific subject: the reception of Lacretelle’s 1922 novel Silbermann. A wide range of writers and critics—a number of whom had in other circumstances a reputation for liberal values and attitudes, and had been among those who had deplored the excesses of the antisemitic mob during the Dreyfus affair—are found to echo the views put forward by Lacretelle in that novel, and even to elaborate on them. Many of these writers were to adopt a completely different attitude towards the Jews after the Second World War; when the position of the Jews was fully realized, their earlier ‘social antisemitism’ proved less powerful than their human sympathies. But this is not to devalue the importance of the danger posed by social antisemitism, which could provide the basis for far more virulent forms of racism to flourish.  相似文献   

3.
This article contributes to the debate on the politicization of intelligence with a case study of a major attempt of politicization that so far largely escaped academic attention: the Special National Intelligence Estimate on the Soviet Union’s role in international terrorism produced by the US Intelligence Community in spring 1981. Despite direct and indirect manipulation by members of President Reagan’s Cabinet, this case differs from those usually discussed in a decisive way – politicization failed. Based on the empirical analysis, a theoretical model of intelligence politicization is introduced that extends Joshua Rovner’s oversell model, which can explain why policymakers demand intelligence support but is insufficient due to its exclusive focus on the consumers of intelligence, by integrating the incentives of intelligence producers and specifying the determinants of whether politicization succeeds or fails.  相似文献   

4.
John M. Carey  Simon Hix 《Public Choice》2013,154(1-2):139-148
Drawing on new data that combine recorded votes from the Swiss National Assembly with canton-level referendum results on identical legislative proposals, Portmann et al. (Public Choice 151:585–610, 2012) develop an innovative strategy to identify the effect of district magnitude on the relationship between representatives and their constituents. We replicate PSE’s central result and also estimate a related model that allows for the possibility of non-monotonicity in the relationship between district magnitude and representatives’ deviance from referendum median voters. Our results indicate that representatives elected in low-magnitude multi-member districts deviate from canton-level majorities less than either MPs from single-member districts or those from high-magnitude multi-member districts.  相似文献   

5.
6.
This article applies the Policy Conflict Framework (PCF) to describe and explain the characteristics of policy conflict within the oil and gas subsystem in Colorado. We use data from a survey of policy actors to assess three cognitive characteristics of policy conflict: divergence in policy positions, perceived threats from opponents’ positions, and an unwillingness to compromise. Aggregating these indicators across policy actors in the subsystem, we find a moderately high level of policy conflict intensity, but we also find substantial variation in the characteristics of policy conflict across policy actors. To help explain this variation, we examine how interpersonal and intrapersonal attributes of policy actors relate to the characteristics of policy conflict. In particular, we find that insular policy actor networks, interest group affiliations, and rigidity of risk and benefit perceptions associate more consistently with conflict characteristics than political views, education, or experience. We conclude with a discussion of the strengths and limitations of this first application of the PCF and reiterate the need for theoretically and empirically rigorous measures of policy conflict.  相似文献   

7.

Evaluations are a potentially important tool for democratic governments: they provide a basis for accountability and policy learning. To contribute to these key functions, evaluations must be of sufficient methodological quality. However, this quality is threatened by both political influences and technical complexities. This article describes and explains the variance in the quality of ex-post legislative (EPL) evaluations conducted by the European Commission, which is a frontrunner in this realm. A number of potential political and technical explanations of evaluation quality are tested with a unique, self-constructed dataset of 153 EPL evaluations. The results show that the Commission’s EPL evaluations usually apply a robust methodology, while the clarity of their scope, the accuracy of their data and the foundations of their conclusions are problematic. The variance in this quality is mainly explained by the type of evaluator: EPL evaluations conducted by external actors are of higher quality than evaluations conducted internally by the Commission.

  相似文献   

8.
9.
Chinese outward foreign direct investment (COFDI) has captured the imagination of international business academics, journalists, and analysts of Chinese foreign economic policy. While these students of COFDI have added greatly to our knowledge, they have not adequately considered the politico-economy of COFDI. Specifically, they have not sufficiently evaluated the degree to which COFDI is driven by political versus economic considerations, the extent to which political considerations influence the overseas operations of Chinese multinational corporations (MNCs), or the political ramifications of COFDI for host countries, international institutions, or China’s interactions with third parties. Reviewing the Western literature, this article provides useful background information about COFDI, distills two general schools of thought about the politico-economy of COFDI—i.e., the “Beijing as Puppeteer” camp and the “Business of Business is Business” camp, and highlights a number of shortcomings with each. As well, it suggests a number of ways in which the extant literature can move forward and makes clear the importance of tracking the development of Chinese MNCs.  相似文献   

10.
Journal of Chinese Political Science - This study provides a longitudinal analysis of the news coverage on Japan and Sino-Japanese relations between 2001 and 2015 by China’s most influential...  相似文献   

11.
Journal of Chinese Political Science - This article investigates China’s use of strategic narratives to facilitate its geopolitical return, through a critical case study of the Belt and Road...  相似文献   

12.
Congleton  Roger D. 《Public Choice》2019,181(1-2):5-12
Public Choice - Gordon Tullock’s “Welfare Costs of Tariffs, Monopolies, and Theft” is by now widely regarded to be a classic work in public choice. However, like many...  相似文献   

13.
This article reconstructs the CIA’s exploitation of the Natsional’no Trudovoi Soyuz, a right-wing Russian nationalist organization, as a part of ‘rollback’ and ‘stay-behind’ covert operations against the Soviet Union during the 1950s. Operations such as these relied on the notion that far-right nationalism presented a potent counter to international communism. The article explores postwar ties between American intelligence and the NTS in a shared effort to ‘roll back’ the borders of communism. It likewise discusses the ability of Soviet counterintelligence to intercept, penetrate, and sabotage nationalist networks and their operations backed by Western governments.  相似文献   

14.
Some public health crises become threats to national security. In April 2009, the Veratect Corporation provided a series of escalated warnings to key members of the international public health community regarding unusual respiratory disease reporting activity in Mexico, later referred to as the 2009 H1N1 influenza pandemic. The warning sequence of the H1N1 influenza pandemic highlighted potential complementarity between that of an intelligence-inspired warning culture vs. a risk-averse, forensically oriented response culture favored by traditional public health practitioners. Both are required to address the current range of difficult-to-predict public health crises that become a threat to national security.  相似文献   

15.
ABSTRACT

This article addresses the need for critical approaches to social media by bridging the focus on language and other semiotic resources that characterises discourse studies with the broader perspective on social media as social, cultural, economic and technological constructs that dominates media and cultural studies. Specifically, we propose a model for analysing how social media as semiotic technologies, that is, technologies designed to enable and constrain meaning-making, may transform social practices. By incorporating Van Leeuwen’s [2008. Discourse and Practice: New Tools for Critical Analysis. London: Oxford University Press] framework for the critical analysis of discourse and social practice, the model extends the social semiotic approach developed in recent critical multimodal studies of software such as PowerPoint to social media, which function primarily to provide platforms for and commodify social practices, rather than to offer rich arrays of semiotic resources for creating multimodal texts and artefacts. Using the academic social network site ResearchGate and the practice of research peer review, we illustrate the model’s capacity to account for the ways the design of social media platforms – through the semiotic resources they make available and the ways these are presented – enables and constrains their users’ ability to perform key social practices and has the potential to transform these practices.  相似文献   

16.
The notion of soft power suggests that actions that contradict international standards will harm a country’s international image. The current study focuses on the impact of anti-democratic action taken by Israel during 2015 on its international image, as projected in the foreign press (N = 4,425 articles) and on social media (N = 23,797 tweets). The findings indicate that anti-democratic actions did not have an immediate or long-term effect on the tone of coverage toward Israel, while other factors, such as the circumstances and the topics discussed, did influence the tone of coverage.  相似文献   

17.
18.
Mexico??s ombudsman??s office (the Comision Nacional de Derechos Humanos (CNDH)), established in 1990 by a nondemocratic government, posed no threat to the then ruling party. Counter to expectations, even after Mexico democratized in 2000, the CNDH remained unwilling to challenge officials for human rights violations. I argue that this is because the ombudsman (the head of the CNDH) is chosen by Mexican Senators who are not accountable??due to secret voting and a prohibition on reelection??to the Mexican public. While civil society wanted a powerful ombudsman, the three main parties did not. Ignoring the public, Senators responded to their parties and appointed a compliant individual to serve as ombudsman, thereby ensuring that the CNDH would not challenge those who held political power. The paper suggests that where accountability institutions, such as human rights offices, are chosen by unaccountable actors (in this case the Mexican Senate), the development of such accountability institutions will be limited.  相似文献   

19.
20.
How did the National Security Agency (NSA) adopt the practice of hacking? This paper explores how NSA confronted the digital age by focusing on arguably NSA’s key organizational innovation as a microcosm of these broader changes: the Office of Tailored Access Operations (TAO). This paper develops a pragmatist model of organizational change showing how the practice of hacking became a practical solution to deal with the problems posed by a globally networked world through TAO’s case history. TAO’s aggressive expansion by developing a scalable Computer Network Exploitation (CNE) architecture was designed to keep NSA relevant in the twenty-first century.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号