首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In her treatise on abjection, Julia Kristeva argues that the abject is located outside the self, remaining in a state of repulsion that threatens to destroy the self. Abject representations are prevalent in the way terrorists have been portrayed in the Western news media post-September 11, 2001. These images of abjection are problematic, as they consolidate the images we have seen in Hollywood films representing Arabs. Furthermore, these depictions have eroded the fine line between the real and the unreal. This article examines the point at which these issues intersect, by analysing individual images vis-à-vis film portrayals of the Arab and, ultimately, how the framed images of terrorists aired on TV screens have conformed to previously accepted notions of the Arab.  相似文献   

2.
Robert Kaplan's 1994 article, ‘The Coming Anarchy’ was a milestone in the literature on the links between environmental change and security. The article predicted that disease, corruption, overpopulation, scarce resources and climate change would plunge West Africa into pervasive conflict. Nearly a decade and a half—and several civil wars—later this article returns to West Africa to see to what extent Kaplan's predictions have come to pass. While West Africa may not have followed exactly the trajectory that Kaplan foresaw, he did correctly predict that climate change would be recognised as a threat to international security. This paper reviews in greater detail the development of conceptualisations of environment and security that influence current discussions over the potential impacts of climate change on security, paying particular attention to the ways in which West Africa is vulnerable to the impacts of climate change.  相似文献   

3.
Jack Lule 《政治交往》2013,30(2):101-120
Mythic aspects of news portrayals of a terrorist victim are the focus of this study. Using the dramatistic approach of Kenneth Burke, the study reviews New York Times coverage of Leon Klinghoffer, who was killed by terrorists aboard the Achille Lauro cruise ship in October 1985.

Myth is defined not as a false or incredible tale, but as a symbolic narrative that attempts to explain and give meaning to practice and belief. The study shows that news reports used dramatic details of the suffering and grief of the widow to develop around her husband a compelling myth—the sacrifice of the innocent, heroic victim.

In dramatic and psychological terms, the victim is a symbol of the self. Through this myth, then, the news reports appear to invite intense identification of the reader with the terrorist victim.

Although the study is exploratory, implications can be considered. Mythic portrayals suggest that the power of terrorism may stem from its ability to forge symbolic links between victims and individual members of an audience. Mythic images in the news may help terrorists communicate with their audience. Too, public policy makers may attempt to arouse support for measures of prevention and reprisal by drawing from the mythic power of the victim.  相似文献   

4.
5.
6.
Starting from Mao's well‐known metaphor of ‘water and fish’, this article examines the nature of power as it applies to terrorist groups. Terrorists are under constant pressure actively to increase their influence and control over their constituent communities. Our understandings of how terrorist groups can do this has generally suffered from being too limited and overly simplistic. Focusing on Northern Ireland, this article explores how terrorist groups can first identify and then access various sources of power which can be used to strengthen the group's position and authority. The article argues that there are identifiable strategies which can be exploited by current and future terrorists in virtually any setting. It is in the interest of those combating terrorism to study these principles closely if they wish to limit the power and durability of terrorist opponents.  相似文献   

7.
Abstract

A campaign by civil society organizations (CSOs) turned a relatively obscure area of international economic law—investor–state dispute settlement (ISDS)—into the focus of opposition to the Transatlantic Trade and Investment Partnership (TTIP) and later the European Union (EU)–Canada Comprehensive Economic and Trade Agreement (CETA). This article analyses how CSOs impacted on the EU’s position, while highlighting the limitations of their influence. Combining insights from constructivist International Political Economy literature with scholarship emphasizing the importance of emotions in advocacy framing, I contend that CSOs were able to create a polysemic ‘injustice frame’. The characterization of transatlantic ISDS as a threat to democracy and the rule of law aroused anger, while being ambiguous enough to garner widespread support. The ambiguity of CSOs’ advocacy frame and the concreteness of its target, however, were also the frame’s Achilles heel. These aspects provided space for the European Commission to reform a specific element of the agreement and thereby repair the latter’s overall legitimacy. The Commission’s counter-frame emphasized the reform’s democratic credentials by representing TTIP as an opportunity to move ISDS towards a system of ‘public law’. While this reframing failed to satisfy most opposition, it placated pivotal actors and allowed the Commission to move forward.  相似文献   

8.
Islamic resistance groups in Lebanon and the Palestinian territories have been accused of using terrorist tactics to achieve their aims. Although some critics suggest that such groups may also have hijacked the democratic agenda in ways that disadvantage women, their supporters claim that they are promoting a model of modernity that is empowering women. This article examines the reasons why some Lebanese Shi'i and Palestinian women support the resistance against Israeli invasion and occupation that is justified in terms of religion. Far from seeing the actions of Hizbullah in Lebanon and Hamas in the Palestinian territories as acts of terrorism, many women welcome the resistance as it brings dignity and meaning to their lives and enhances feelings of national identification.  相似文献   

9.
Policy-makers who are confronted with the potential spread of violent extremist ideologies among prison inmates are challenged to design sustainable prison regimes which are suitable to counter prison radicalisation whilst rehabilitating and reintegrating inmates into society. This article outlines a theoretical framework that explains how uncertainty and pressure in the policy-making context heightens the need for structure that induces a shift towards intolerance and stereotypic black-and-white thinking, which leads to the introduction of unbalanced, one-sided prison regimes. We argue that in the long run, these prison regimes are likely to be self-undermining and unsustainable because they undermine long-term security objectives and cause undesired side effects. These propositions are illustrated by an in-depth case study of the Dutch terrorist detention policy.  相似文献   

10.
11.
Abstract

A combination of undemocratic developments in Hungary and Poland as well as Eastern Europe’s reluctance to engage in solidary burden-sharing at the height of the refugee crisis in Europe has brought back familiar allusions of Eastern Europeans as troublemakers for European unity and peace. This article offers a discursive dissection of ‘Eastern Europe’ as a subtly subversive challenge to Europe’s security of ‘self’, entailing a fear of being overrun by an ‘other’ perceived as endangering one’s normative and cultural order. Proceeding from Ingrid Creppell’s (2011 Creppell, Ingrid (2011) ‘The concept of normative threat’, International Theory, 3:3, 450487[Crossref], [Web of Science ®] [Google Scholar]) notion of normative threat, this article argues that the reappearance of ‘Eastern Europe’ as an ontological insecurity trope is indicative of deeper anxieties within Europe, some of which are systemic (such as doubts about the efficacy of integration and the legitimacy of the European Union) and some of which are contingent (such as concerns about defending the European political order from populist upsurges amidst ‘resurgent nationalism’).  相似文献   

12.
Asia Europe Journal - This article studies the potential paradigm shift in Europe linking refugees’ influx with the security phenomenon through the works of intellectuals belonging to...  相似文献   

13.
14.
Two images of populism are well-established: it is either labelled as a pathological political phenomenon, or it is regarded as the most authentic form of political representation. In this article I argue that it is more fruitful to categorize populism as an ambivalence that, depending on the case, may constitute a threat to or a corrective for democracy. Unfolding my argument, I offer a roadmap for the understanding of the diverse and usually conflicting approaches to studying the relation between populism and democracy. In particular, three main approaches are identified and discussed: the liberal, the radical and the minimal. I stress that the latter is the most promising of them for the study of the ambivalent relationship between populism and democracy. In fact, the minimal approach does not imply a specific concept of democracy, and facilitates the undertaking of cross-regional comparisons. This helps to recognize that populism interacts differently with the two dimensions of democracy that Robert Dahl distinguished: while populism might well represent a democratic corrective in terms of inclusiveness, it also might become a democratic threat concerning public contestation.  相似文献   

15.
Timothy Hoyt 《India Review》2013,12(3):117-144
This article traces the evolution of Kashmir as a “nuclear flashpoint,” and the relationship between Kashmir, nuclear weapons, and regional security. The first section discusses the concept of a geopolitical flashpoint, providing a definition and a series of historical examples. The Kashmir issue and its role in the broader Indo-Pakistani conflict fit reasonably neatly into this definition. A second section briefly traces the history of nuclear weapons programs in the region, as the potential for nuclear escalation by competing powers or their allies is a key factor in defining nuclear flashpoints (a post-1945 phenomenon). The third section examines the evolution of the Kashmir issue and successive Indo-Pakistani crises within a nuclearized regional environment from 1984 to 2003. The final section assesses the prospects for Kashmir in the near future, and concludes that due to underlying political factors, Kashmir will remain a nuclear flashpoint for the foreseeable future.  相似文献   

16.
ABSTRACT

Following the terrorist attacks of 13 November 2015 in Paris and 22 March 2016 in Brussels, radicalisation has become the topic of lively debate in Belgium. However, little research has been done on the different perspectives which people use to communicate about radicalisation in Belgium. Therefore, an inductive framing analysis of 2,271 excerpts, taken from various newspaper articles, policy documents and social media, was performed to precisely reconstruct all the frames and counter-frames that are used to define the issue. The results were validated through seven interviews and two workshops with a variety of stakeholders (imams, youth workers, academics, journalists). This resulted in the reconstruction of four problematising frames and eight deproblematising counter-frames. In addition to presenting and illustrating these frames, this paper discusses how the framing analysis can help gain insight into the social construction of radicalisation in the wake of the 2015 and 2016 terrorist attacks.  相似文献   

17.
18.
俄罗斯军事安全面临的威胁及其防范措施   总被引:1,自引:0,他引:1  
军事安全在传统安全观中占据核心位置。军事安全或国防安全是国家安全的一个重要组成部分,属于传统国家安全范畴,是一个国家安全的根本保证,亦是一国维护自身国际地位的重要因素之一。在后冷战时期,俄罗斯军事安全面临着各种威胁。随着经济的不断发展,综合国力的增强,俄罗斯越来越重视国家军事安全问题,关注军队的建设和改革,采取各种行之有效的防范措施来维护本国的军事安全。  相似文献   

19.
ABSTRACT

Perceptions of threat from Russia’s military activities in Ukraine and President Trump’s critical attitude towards NATO have put the idea of a common European army on the agenda of European politics. Do these strategic threat perceptions also influence public support for the creation of a common European army? Previous research has largely overlooked strategic threat perceptions as individual-level determinants of public support for a common European army. This article explores the empirical relationship between strategic threat perceptions and support for a common European army at the individual level of analysis with representative German survey data from 2018. The multivariate analysis shows that perceiving Russia’s military activities in Ukraine as a threat to Germany’s security, and U.S. foreign and security policy as a threat to the cohesion of NATO significantly increases support for the creation of a common European army, even when the influence of numerous other determinants is controlled for. The findings highlight the importance of considering strategic threat perceptions in future analyses of public opinion on European defence cooperation and integration.  相似文献   

20.
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号