首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We examined the geographic concentration and persistence of terrorism using the Global Terrorism Database (GTD). The GTD logs all terrorist incidents worldwide using open-source media, and, for 1970–2013, includes over 125,000 incidents from over 200 countries and territories. We examined regional and country-level data; different terrorism forms, severity levels, and timeframes (entire period, five-year periods, and annual); and multiple definitions of “elevated” terrorism. The findings reveal that terrorism is concentrated geographically and temporally. Most countries experience peace or very low levels of terrorism; only a few experience substantial outbreaks; very few experience prolonged terrorism; and even fewer, prolonged severe terrorism.  相似文献   

2.
Whether the Global War on Terror (GWOT) has changed the terrorist threat is a matter of controversy. This study, using transnational terrorism events data from 1993 through 2004, employs a time-series approach to investigate the extent to which the onset of the GWOT (beginning with the invasion of Afghanistan) and related events (the invasion of Iraq, the capture of Saddam Hussein, and the release of photos from Abu Ghraib) are associated with changes in transnational terrorist activity, its frequency, dispersion, lethality, type of attack, and type of victim of transnational terrorist incidents.  相似文献   

3.
Abstract

The purpose of this paper is to devise a methodology for estimating the impact of transnational terrorism on tourism. Using monthly data from 1970–1988, we estimate the relationship between terrorism and tourism for Spain. We find that terrorist events have had a significant negative impact on the number of tourists visiting Spain. A typical incident is estimated as scaring away just over 140,000 tourists when all monthly impacts are combined. Moreover, the causality is unidirectional: terrorism affects tourism, but not the reverse.  相似文献   

4.
Abstract

The study examines the predictability of international terrorism in terms of the existence of trends, seasonality, and periodicity of terrorist events. The data base used was the RAND Corporation's Chronology of International Terrorism. It contains the attributes of every case of international terrorism from 1968 to 1986 (n = 5,589). The authors applied Box‐Jenkins models for a time‐series analysis of the occurrence of terrorist events as well as their victimization rates. The analysis revealed that occurrence of terrorist events is far from being random: There is a clear trend and an almost constant periodicity of one month that can be best described by a first‐order moving average model. The fit of this model was tested both by statistical diagnostics and the accuracy of predictions based on this model compared to actual occurrence. However, the series of victimization rates did not reveal any predictability aside from the overall trend of an increasing level of victimization. The findings of the study are discussed by two approaches: the contagiousness of terrorism and the concept of media‐oriented terrorism. These two concepts, separately or combined, may explain some of the patterns revealed in the occurrence of terrorist events. However, they both highlight the part played by the mass media, either as a target for publicity‐seeking terrorists or as an influential factor in the process of contagion.  相似文献   

5.
This article explores how terrorists acting alone or in small groups have used sports events as symbolic targets in their performance of terrorism. Drawing on a comparative analysis of the attacks on the 1996 Atlanta Olympic Games and the 2013 Boston Marathon, it is argued that terrorist target selection of major sports events should be understood in relation to the grievances and desires of the perpetrators. The article finds that rather than being the primary target of their attacks, sports events are among a broader range of densely crowded spaces that terrorist actors may seek to target as part of their violent struggle against their adversaries. The findings are contextualized in relation to broader patterns and trends in lone wolf terrorism, including the significance of a copycat phenomenon and inspiration effect.  相似文献   

6.
Abstract

Violence against abortion clinics and other activities directed toward patients and staff of abortion facilities have been termed terrorism by the pro‐choice movement. However, the Federal Bureau of Investigation denies that these actions are terrorism. Instances of abortion clinic violence for 1982–1987 were examined in order to determine whether there is a correspondence between these incidents and definitions or models of terrorism. It appears that these incidents do fit the classification of “limited political” or ‘subrevolutionary” terrorism. Reasons why the FBI has made the decision not to include these acts as forms of terrorism are entertained. One is that current international tensions have resulted in a preoccupation with only certain types of events which for administrative, i.e., juris‐dictional, reasons have come to essentialize terrorism. Another explanation, posited by pro‐choice activists, is that the FBI's decision is a consequence of political influence: the current administration is openly anti‐choice.  相似文献   

7.
Terrorism is a word that everyone across the globe has become familiar with in the wake of the events of 11 September 2001. The rhetoric about these events, however, is more than mere commentary seeking to understand the cause of or apportion blame for such attacks and forms part of a much wider western discourse invoked to describe unfamiliar cultures and landscapes. In fact, terrorism is only the most recent in a long line of dangerous conditions that have come to represent how certain areas of the non-western world are usually imagined and subsequently depicted as regions of risk. This article argues that "tropicality," "development," and "vulnerability" form part of one and the same essentializing and generalizing cultural discourse with "terrorism" that historically denigrate large regions of the world as disease-ridden, poverty-stricken, disaster-prone and terrorist-spawning.‐  相似文献   

8.
Beginning in June of 2000 Chechen terrorists have carried out twenty-eight acts of suicide terrorism acts including two mass hostage taking operations combined with suicide terrorism (Beslan and Nord Ost). This paper reports the findings from psychological autopsies (interviews with close family members and friends) of thirty-four (out of 112 total) of these human bombers as well as augmenting them with material from hostage interviews from Beslan and Nord-Ost. The authors analyze the phenomena on the levels of the organization, individual, society and in terms of ideology and compare findings from other arenas also involving suicide terrorism. The main findings are that a lethal mix occurs when individuals in Chechnya are vulnerable to self recruitment into suicide terrorism due to traumatic experiences and feeling a duty to revenge and this vulnerability is combined with exposure to groups that recruit and equip suicide terrorists with both an ideology and the means to explode themselves. The ideology supporting Chechen suicide terrorism is very similar to the global jihadist ideology but remains more nationalist in its goals. It functions for the bombers much like short lived psychological first aid—answering their posttraumatic concerns in a way that shortly leads to their deaths. Unlike the Palestinian case, there is little social support for suicide terrorism in Chechnya.  相似文献   

9.
There has been an historic transition through which Type I terrorism and Type II terrorism are being combined. Type I terrorism consists of acts that attempt to impose terror by individuals or small groups on other individuals and groups, and through them indirectly on their governments. Type II terrorism is the imposition by governments on individuals or on groups of local or foreign populations, e.g., the use of atomic weapons, poison gas, Nazi camps for genocide. The new type of terrorism—Type III—has all the components for success. The article deals with how this new terrorism disrupts personal and historic memory through large‐scale catastrophe organized for that purpose. It is pointed out that this type of terrorism is met with self‐protection on the conscious level and has very little psychic cost on the perpetrators. Type III terrorism results from states disseminating high‐level technology. Target nations will not have open to them the conventional responses and will have to devise new methods. The danger of technical failure in the use of new methods of terrorism is very real.  相似文献   

10.
Despite many commonalities in national security priorities, Australia and New Zealand approach the threat of terrorism quite differently. Both had twentieth-century manifestations of domestic terrorism which were generally downplayed. The emergence of jihadist-inspired threats globally have affected Australia much more than New Zealand, and Australian counterterrorism strategy has developed significantly since 9/11. New Zealand has watched global events so far untouched by any jihadist threat, and has implemented few effective counterterrorism measures. The reasons for the differing experience, it is contended here, are the varying historical perceptions of threat, and consequent differing approaches each country has taken to mitigate perceived threat.  相似文献   

11.
Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in the United States than in the other countries under study. The cross-national analysis suggests that in the United States lone wolf terrorism has increased markedly during the past three decades; a similar increase does not appear to have occurred in the other countries under study. The numbers of casualties resulting from lone wolf terrorism have been relatively limited, and there is no evidence that the lethality of lone wolf terrorism is on the increase. The rates of psychological disturbance and social ineptitude are found to be relatively high among lone wolf terrorists. Lone wolf terrorists tend to create their own ideologies that combine personal frustrations and aversion with broader political, social, or religious aims. In this process, many lone wolf terrorists draw on the communities of belief and ideologies of validation generated and transmitted by extremist movements.  相似文献   

12.
The American policy landscape during the George W. Bush administration was shaped by a series of traumatic events that confronted the nation and people of the United States. These included the terrorist attacks of 9/11 in 2001, the anthrax attacks in the fall of 2001, military actions in Afghanistan and Iraq, Hurricane Katrina in 2005, the threat of a flu pandemic in 2005 and 2006, the 2007 Intergovernmental Panel on Climate Change reports, and the financial collapse of 2008. The results of the 2008 presidential election appear to be a rejection of the Bush administration's major policy responses to these events, but the variation in type and level of public support among different groups suggests a much more varied and dynamic portrait of America in turbulent times. Using a multiyear panel survey, an interdisciplinary team of political scientists and psychologists analyzed the behavior and political responses to the events by the American public. The findings suggest that even seven years after the events of 11 September 2001, people with higher levels of post-traumatic stress symptomatology related to 9/11 have significantly different interpretations of the threat of terrorism and the appropriate policy responses to it than do others. Perceptions of threat, the political salience of terrorism and other traumatic events, the level of support for political leaders and assessments of the government's actions vary over time and across different groups within society based on the psychological, political and social, and personal characteristics of the respondent. These results help to open the black box of aggregate public opinion by providing a detailed portrait of how psychological, social, political, and personal factors affected perceptions and political behavior during the George W. Bush administration.  相似文献   

13.
This article focuses on the role of ideology in the decision of people who are not from societies’ worst-off socioeconomic groups to join a left-wing terrorist organization. Taking up the sociological perspective of Max Weber, Clifford Geertz, and Raymond Boudon, the author introduces the concept of the “terrorist of the first hour” and considers ideology as a type of social bond. The concept of ideology is here broken down into four dimensions: Social, Temporal, Affective, and Moral (STAM bond). This article also presents data on the ages, sex, educational level, and occupation of the Italian people arrested (2,730) or convicted (528) for crimes of terrorism from 1970 to 2011. Data on Italian terrorists were provided by the General Department of Prisoners of the Ministry of Justice. 1 1. The research was conducted between February and July 2011. The author wishes to sincerely thank Sebastiano Ardita—the Director of the General Department of Prisoners of the Ministry of Justice—who gave authorization to collect data on Italian people arrested or convicted of terrorism of which only the Ministry of Justice is in possession. This article considered only data regarding terrorists working to subvert internal order. The articles of the Italian Penal Code regarding “internal” terrorism are articles 270, 270 bis, and 306, and since 2001 further articles have been introduced in order to combat international terrorism.   相似文献   

14.
This article offers a three-pronged critique of Robert A. Pape's book Dying to Win. The first section of the article highlights problems related to the book's definition of key concepts, its assessment of existing research on suicide terrorism, and its presentation of data. The next section challenges the book's argument that suicide attacks have a high success rate of 54 percent. The alternative analysis offered here arrives at a significantly lower success rate of 24 percent. The last section argues that Pape exaggerates the link between occupation and suicide terrorism, especially with regard to the case of Al Qaeda. In this context, a distinction between traditional (localized) and contemporary (globalized) patterns of suicide attacks is introduced. It is argued that the occupation thesis may help explain the traditional (localized) pattern of suicide attacks, but falls short of illuminating the causes of the contemporary “globalization of martyrdom.”  相似文献   

15.
Utilizing interviews with former Irish Republican Army (IRA) members, Loyalists, and community workers, the article looks at how militants in Northern Ireland have helped to prevent terrorism and political violence (TPV) by adopting roles in the community. By using mobile phones, a network of former combatants emerged around interface areas in the late 1990s to contain trigger causes of terrorism, providing a unique role that the state could not. The structure of the network encouraged militant groups to follow the IRA's example to disengage—thus creating a domino effect—and the co-operation between senior militants has limited the opportunities for other groups to mobilize a campaign of terrorism.  相似文献   

16.
Despite increasing concern over the potential threat from “forest jihad,” there has been no systematic attempt to assess whether such attacks are in fact taking place. Drawing on principles from the geospatial profiling of terrorist events, fire-risk prediction data, and information on jihadist convictions, this article offers a thorough review of the evidence to address this question. The available information suggests that so far, jihadists have not attempted to attack North American or European wildlands by means of arson. Despite calls for “popular resistance terrorism” in the jihadist literature, and the apparently low costs associated with this type of attack, jihadists have so far shown little appetite for “forest jihad.”  相似文献   

17.
Abstract

Concentrating on terrorism in West Germany, Italy, and the Basque provinces of Spain, the author presents a detailed picture of the motivations, the strategies, and the ‘'achievements” of a number of the best known groups which for alleged political purposes take the law into their own hands. The Red Armee Faction, perhaps the best known West German terrorist group, and the 2nd of June Movement as well as such organizations as the Revolutionary Cells and the Guerilla Diffusa are described and their aims and activities are scrutinized. German right‐wing terrorism is also shown to wield great power, its contacts with terrorists in Lebanon and Algeria rivaling those of leftist organizations. Italian terrorism is also fully covered in this paper, with the activities of the Red Brigades, the best‐known of the leftist organizations, and its international connections, as well as other groups and the individuals involved being dealt with in some detail. The events in Spain, past and present, due especially to Basque terrorism, are considered, and the Soviet influence, represented by terrorist organizations in Europe, the Middle East, Africa, and Cuba, is discussed as is also the outlook for the future.  相似文献   

18.
ABSTRACT

This article considers the terrorism financing risk associated with the growth of Financial Technology innovations and in particular, focuses on virtual currency products and services. The ease with which cross-border payments by virtual currencies are facilitated, the anonymity surrounding their usage, and their potential to be converted into the fiat financial system, make them ideal for terrorism financing and therefore calls for a coordinated global regulatory response. This article considers the extent of the risk of terrorism financing through virtual currencies in “high risk” States by focusing on countries that have been recently associated with terrorism activities. It assesses the robustness of their financial regulatory and law enforcement regimes in combating terrorism financing and considers the extent to which Regulatory Technology and its global standardization, can mitigate this risk.  相似文献   

19.
Abstract

Literature on terrorists and terrorism is abundant, but very little is written on the victim. Whether the studies are published by psychologists or political scientists, by psychiatrists or sociologists, data on the victim are conspicuous by their absence. There is hardly any mention of how victims of terrorism are chosen, their characteristics, the role they play, if any, in preparing or triggering the terrorist acts, their behavior during the ordeal, and their postvictimization condition.1 The dearth of the empirical data renders the systematic study of the victims of terrorism particularly difficult. This paper presents a series of reflections on some victimological aspects of terrorism and offers a number of suggestions for future research.  相似文献   

20.
This study is interested in understanding public opinion in Pakistan toward terror attacks. Specifically, this study explores (1) the general picture of attitudes in Pakistan toward terrorism and (2) which individuals are most likely to support terrorism in Pakistan. The study aims to give insights into how pervasive a support base exists for terrorism as a tactic in Pakistan and it seeks to isolate the individual-level traits that account for the variation we see among Pakistani Muslims regarding their level of acceptance of terrorism against Pakistani and Indian targets. The study finds that a large majority of Pakistanis oppose terrorism but terrorism directed at Indian targets is more tolerated than terrorism against Pakistani targets. The study also finds that those who are most supportive of Talibanization in Pakistan are the most supportive of terrorism.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号