首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As the international community responds to the September 11 attacks and the general war on terrorism, member states in the United Nations (UN) must continue to address the balance between the rights of the individual and the security of the state. This study highlights the various roles that the UN plays in combating transnational terrorism through norm setting, codification of human rights law, as well as the drafting and effective implementation of 12 key multilateral agreements aimed at counter-terrorism. In these ways, the UN provides direction and guidance for implementing human rights rules and the ways in which they should be enforced. Even so, national governments must make these rules work. In a system of sovereign states, the role of the UN organization in checking or reversing these human rights abuses remains severely limited and largely dependent upon the political will of the member states. As a consequence, part of the price paid for protecting national security against threats posed by terrorism may well be the curtailment of some human rights and civil liberties within the liberal democratic state.  相似文献   

2.
    
Civil liberties came under pressure after Al Qaeda’s attacks in the U.S. and Europe. Governments in many Organisation for Economic Co-operation and Development countries started questioning the effectiveness of counterterrorist policies and regulations. Incumbents responded to terrorism not only by introducing ex novo (or re-adapting) laws and regulations affecting a large set of civil rights; they also responded to international terrorism by choosing between an untargeted and a targeted legislative response. Some governments reduced the liberties of foreign foes more than the freedoms of citizens, while others preferred burdening all individuals within their borders, immigrants and citizens alike. This article analyzes the determinants of targeted and untargeted antiterrorist responses to Al Qaeda terrorism in a sample of 20 Western democracies from 2000 to 2008. The findings suggest that patterns of targeted legislation were more pronounced in countries governed by right-wing incumbents and those where the decisional power in the cabinet is divided among a few number of political parties. In addition, a larger share of Muslims and the degree of ethnic fractionalization played a relevant role in determining governments’ choices of prime targets.  相似文献   

3.
This article studies whether the action-reaction model holds on an “embryonic” terrorist group like Galician Resistance (REGA). After presenting an overview of REGA’s history, structure, financing, terrorist campaigns, and the police measures adopted against them, the text empirically contrasts whether deterrence is an efficient measure in reducing an incipient terrorist group’s actions. Our results show that deterrence does in fact reduce the number of attacks when aimed at the group’s periphery. However, it causes a backlash of new attacks when aimed at the group’s core. In addition, we prove that an increase in the number of attacks also causes a reaction by police forces and a higher number of detentions of core members. Our results give some meaningful insights into the design of counter-terrorism strategies aimed against “embryonic” groups.  相似文献   

4.
    
This work examines differences in the level of violence of counterterrorism measures adopted by Central Asian states. Why do some Central Asian governments opt for wanton repression in the name of the struggle with terrorism, while others adopt less severe methods of control and prevention? To answer this question, this study draws on a synthesis of rationalist and constructivist explanations. Like rationalists, it posits that the magnitude of terrorism and states' material capabilities affect governments' responses to terrorism. Following constructivists, the study stresses the impact of ideas about the nature of terrorist threats and views on the appropriateness of the use of force on the counterterrorism policies of Central Asian states.  相似文献   

5.
This article analyses state counterterrorism (CT) policy on two dimensions: its effectiveness and its efficiency. It points out that CT is likely to be effective but inefficient. The material weakness of terrorist groups in relation to their state opponents, and different organisational dilemmas, increases the probability of an effective CT policy. However, states frequently overreact to terrorist attacks, which are valued in normative instead of strategic terms. Hence, they spend more resources on CT than justified by the threat posed by the terrorist groups. The article concludes that CT should be framed as an allocation of scarce resources that could be used in other important contexts.  相似文献   

6.
The core concern of this article is derived from my personal experience of being stopped and questioned at Heathrow Airport on 28 March 2012 for possession of “suspect materials”: academic books on terrorism. I seek to utilise this experience to reflect on how logics of counterterrorism can become manifested in bizarre and prejudicial ways, and how autoethnography provides a unique means to articulate human experiences of such logics. I further utilise my experience to reflect on the dynamics of academic privilege, which often flourish at the expense of the voices of “ordinary citizens”, and argue that autoethnography can be embraced as an empowering form of self-expression through which “ordinary citizens” might de-subjugate themselves from the margins of academia towards an emancipatory ideal wherein the lived experiences of such citizens occupy a substantial space in academic and popular understandings of (counter)terrorism.  相似文献   

7.
In political disputes, issue frames set parameters for debate and shape which view dominates. This study expands issue framing research to examine the influence of frames on the perception of future terrorist threats as well as subsequent support for related counterterrorism policies. We test several hypotheses using data from an experimental field poll. We find that issue frames clearly influence perceptions of threat. However, our frames, which posit specific terrorism threats, only have a limited influence on respondent preferences for counter-terrorism policies. We consider a variety of explanations for these results and provide direction for future research.  相似文献   

8.
This article presents some of the findings of research on issues surrounding teaching terrorism and political violence at UK higher education institutions. It reports the results of a survey of UK institutions of higher education on their responses to government and other pressures in relation to terrorism. The data show a minority of universities have developed systems, policies or procedures for ‘preventing violent extremism’, while a significant number have developed close cooperation and collaboration with state counterterrorism policies raising potential issues of academic freedom. This article then examines three high-profile cases – incidents where universities, lecturers and students have come under political and legal pressures over the content of terrorism courses or accusations of ‘radicalisation’ on campus. It suggests that these pressures can be and sometimes are resisted, but that they have on occasion effectively narrowed the scope of academic freedom in practise with the danger that a further chilling effect follows in their wake.  相似文献   

9.
范畴的明晰是学科发展的基础与前提。国家安全学的范畴是对国家安全概念的系统化和理论化概括。国家安全学聚焦现实问题,因而以国家安全工作的整个过程为据,将其划分为问题、中介和目标三个阶段,而后结合总体国家安全观对国家安全学的范畴进行提炼。研究发现,在国家安全逆向路径中定义的国家安全问题呈现出集合性和动态性的特征,构成了国家安全学的对象范畴;以规律为载体的国家安全学的中介范畴在于探寻国家安全问题的解决之道,而作为中间环节的中国安全规律既吸纳了普遍与传统的安全规律,又统合了具体领域的安全规律;国家的生存与发展是国家安全学的目标范畴,即国家的完整与统一、人民的安全和发展、制度的生存与发展以及国际环境的稳定。  相似文献   

10.
11.
    
The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing the actual fighting and peacekeeping on the ground while western powers basically pay the costs, the logistics, and the training of local African troops. The paper concludes that the African Union Mission in Somalia (AMISOM) in Somalia and The African-led International Support Mission to Mali (AFISMA) in Mali are proxies for the USA and the European Union.  相似文献   

12.
    
This article assesses the scope and nature of the current terrorist threat to the United States and suggests a strategy to counter it. Al-Qaeda continues to pose the most serious terrorist threat to the U.S. today. If the September 11, 2001 attacks have taught us anything, it is that al-Qaeda is most dangerous when it has a sanctuary or safe haven from which to plan and plot attacks. Al-Qaeda has acquired such a sanctuary in Pakistan's Federal Administered Tribal Areas (FATA) and its North-West Frontier Province (NWFP) and surrounding environs. Accordingly, the highest priority for the new American presidential administration must be to refocus our—and our allies'—attention on Afghanistan and Pakistan, where al-Qaeda began to collapse after 2001, but has now re-grouped. This will entail understanding that al-Qaeda and its local militant jihadi allies cannot be defeated by military means alone. Success will require a dual strategy of systematically destroying and weakening enemy capabilities—that is, continuing to kill and capture al-Qaeda commanders and operatives—along with breaking the cycle of terrorist recruitment among radicalized “bunches of guys” as well as more effectively countering al-Qaeda's effective information operations. The U.S. thus requires a strategy that harnesses the overwhelming kinetic force of the American military as part of a comprehensive vision to transform other, non-kinetic instruments of national power in order to deal more effectively with irregular and unconventional threats. This article first discusses the scope and details of the terrorist threat today and then proposes a counterterrorism strategy for the new presidential administration. It focuses first on creating a micro approach to address the deteriorating situation in both Afghanistan and Pakistan. It then considers the requirements of a broader macro strategy to counter terrorism and insurgency.  相似文献   

13.
This article seeks to provide a comprehensive analysis of the early demise of Rode Jeugd's initiatives towards a terrorist campaign in the Netherlands. It is concluded that three contextual factors played a crucial role in the process: the openness of the political culture, the setbacks experienced by similar organizations elsewhere (RAF in particular), and the lack of overt repression, combined with effective covert operations carried out by the security forces against the Rode Jeugd. Overall, the case of Rode Jeugd is a prime example of a demonstration of state power not always being the most efficient or even suitable method to combat terrorism.  相似文献   

14.
Academic studies of terrorism and mass political violence have developed largely independently of one another. Insurgents, in contrast, have tended to incorporate terrorism tactics along with other types of unconventional warfare in their repertoire of action. This tendency has become more apparent among insurgents engaging in armed confrontations in the twenty-first century. In order to take account of this development, scholars and others interested in contemporary warfare need to incorporate terrorism studies within the broader subject of insurgencies and “small wars”—political violence, in other words.  相似文献   

15.
深度伪造是人工智能技术和数字技术发展的产物,自2017年第一个深度伪造的作品出现,深度伪造正在世界范围内快速扩散。人工智能与大数据技术的发展和普及,使得有心者制作各种深度伪造作品的门槛大大降低,导致互联网和各种社交媒体充斥着各式各样的深度伪造作品。深度伪造技术既有造福于人类社会的正面功能,也有给国家安全带来风险与挑战的负面作用。它不仅给国际形势和国际安全环境带来了巨大的冲击,让国际社会本就存在的“信任赤字”更为恶化,而且在国防安全、政治安全、经济安全和国民安全等领域制造了更多、更为复杂的问题。国际经济犯罪团伙利用深度伪造对中国企业和民众进行诈骗活动;以美国为首的西方国家更是频频利用深度伪造的作品,在涉疆、涉港等问题上对中国发难;在重大国际问题上,国际上的各种势力更是利用深度伪造争取中国的民意,造成部分民众认知的错乱;等等。要治理深度伪造所带来的各种安全隐患,就要在总体国家安全架构下完善针对深度伪造的综合治理体系,同时倡导综合安全、合作安全和共同安全的理念,与国际社会共同打造数字时代人类安全的命运共同体。  相似文献   

16.
    
In December 1992, after the kidnapping and murder of a policeman, Israel deported 415 members of Hamas and Islamic Jihad to Lebanon. Most were affiliated with the Hamas political apparatus and had not been involved in terrorism. The deportees decided to stay together and set up a camp in Marj al-Zuhur in southern Lebanon. Here they engaged in study and various cultural pursuits—including poetry writing. Roughly a dozen of the deportees wrote poetry. The poems were read aloud at gatherings in the camp and published in the Arab press. Their main function was to raise the residents’ spirits and keep their plight in the public eye. They incorporate the expected political messages: anger at Israel and criticism of the international community, the Palestinian leadership, and the Arab states, which were prodded to work harder for the deportees’ return. The poetry was part of a successful media and information campaign, which annoyed Israel so much that it allowed all the deportees to return home by December 1993. Some of the poems were later published and helped cultivate the myth of the Marj al-Zuhur deportation, which Hamas viewed as a victory and symbol of steadfast resistance to Israel.  相似文献   

17.
Observers argue that the business of news is responsible for worsening the coverage of terrorism, but exactly how economic considerations influence coverage is controversial. Based on an analysis of over 1600 articles from The Washington Post and USA Today, we find that concerns about the effects of economic pressures on terrorism reporting are exaggerated. The business climate affects coverage, but the long-term impact of market pressures on coverage is modest. Articles about terrorist violence are increasingly prominent, but coverage of counterterrorism remains robust. Efforts to inoculate the press against the worst excesses of the market are unnecessary.  相似文献   

18.
    
This study moves beyond theories emphasising “state failure” as the cause for terrorist “spill-over”. The aim is to offer new theoretical and empirical considerations concerning the determinants of terrorist groups’ geographical strategies. The main argument this article presents is that transnationality for nationalistic terrorist organisations can be costly. This is the case due to the mobility, social and strategic costs of operating beyond controlled territories. Hence, the article proposes an interpretation of these decisions as being mainly generated by states’ counterterrorism strategies. Using data gathered from the GTD Dataset and secondary sources such as specialised reports and strategic documents, the article explores the argument by presenting observations and empirical findings on two groups, AQIM and Boko Haram.  相似文献   

19.
中共二十大报告首次以专章部署国家安全工作,从中华民族伟大复兴全局高度定位国家安全事业,旗帜鲜明地提出以新安全格局保障新发展格局的整体规划。构建新安全格局既不是另起炉灶,也不是简单重复,而是在中国特色国家安全道路上守正创新。守正方面,新安全格局是国家安全制度层叠的历史经验集成,在建制、渐进和突破期的国家安全格局变迁中逐渐形成内外统筹兼顾、多元功能一体的国家安全体系,以及“党管安全”的国家安全归口领导机制;同时,新安全格局也是总体国家安全观指导安全实践的现实经验集成,体现为以系统观念、底线思维和极限思维的实践逻辑防范化解风险综合体。创新方面,新安全格局是在新发展阶段对既有国家安全体系和领导机制进行提质升级,从而到2035年远景目标实现时达成社会保持长期稳定、国家安全体系和能力全面加强的规范性目标。新安全格局对标新发展格局,在体系目标上打造“全域联动、立体高效”的国家安全体系,在状态目标上达到对内的社会安全稳固坚韧、公共安全治理有效和对外的大国博弈主动有为、海外利益保护得当。  相似文献   

20.
    
Research on autocracies and their consequences has been a growth industry in the latest decade. Nonetheless, the relationship between the type of autocracy and the violation of civil liberties has largely been ignored. In this article, we employ a new dataset, which includes cross-temporal data on freedom of speech, freedom of assembly/association, freedom of religion, and freedom of movement, to shed light on this issue. Analysing 182 countries in the period 1979–2008, we show that democracies repress civil liberties less than autocracies do, whereas we find little evidence to the effect that different kinds of autocracies violate civil liberties to different degrees. However, we also show that the differences between democracies and autocracies have declined starkly since the Cold War. Finally, our results demonstrate that the difference in the extent to which democracies and autocracies repress civil liberties is larger for the freedom of speech and freedom of assembly/association than for the freedom of religion and freedom of movement. We take the general difference between the two categories of liberties as evidence that autocracies repress political liberties more than private liberties because the former presents levers for oppositional activity. We argue that the cross-temporal differences are a consequence of the spread of more minimalist democracies since the end of the Cold War.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号