首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
The existing literature in the terrorism field does not address the absence of terrorism scholarship in developing countries. This article focuses on this intellectual gap using the case of Pakistan. It argues that most decolonised states, including Pakistan, are yet to grasp the complexities of traditional approaches to the study of terrorism, let alone its critical dimensions. The article explores some of the prevailing conditions in developing countries, specifically decolonised states such as Pakistan, which prevent the development of a robust academic discourse on terrorism and the development of a strong field of study. It suggests that the main barriers that account for this shortfall include the state’s legitimacy deficit, a flawed education system that nurtures fictions as truth and inhibits knowledge production, the institutionalised role of conspiracy theories in national politics and the multiplicity of terrorism discourses among government and sociopolitical entities. The conclusion highlights a number of reasons that might help to explain this persistent condition and offers a few policy recommendations.  相似文献   

2.
    
This article explores the parameters, value and limitations of different critical strategies for those dissatisfied with the contemporary politics of terror. It argues, first, that the prominent (counter-)terrorism paradigm – in which terrorism is approached as a ubiquitous and very specific security challenge meriting appropriately exceptional responses – is far more critiqued than we might anticipate. And, second, that such critiques – which can be found across political language, popular culture, everyday life, and beyond – employ distinct critical resources to serve varying ends. Reflecting on these, the article offers a new heuristic distinguishing five critical strategies which seek to: (i) repudiate; (ii) question; (iii) subvert; (iv) replace, or (v) deconstruct the prominent counter-terrorism paradigm. This typology, it argues, offers scope for optimism and strategic resources for those attracted to a critical terrorism studies project going forward.  相似文献   

3.
    
In this article, we argue that a comparative study of state and non-state terrorism that uses the minimal foundationalist definition of terrorism as its central analytical framework offers a unique and instructive approach for answering the question: “what is terrorism?” To date, most recent comparative case study analyses of terrorism focus on ideologies, political/governance models, structural/contextual enablers, practices, organisational structures, and/or the basis of issues such as trust, belonging, and membership. We uniquely contribute to the growing literature on comparative terrorism studies by comparing and contrasting state and non-state terrorism on the basis of strategic communication vis-à-vis the preparation, execution, and outcomes of political violence (the “terrorism attack cycle”), the instrumentalisation of victims, and fear management. We argue that state and non-state terrorism are co-constituting and co-enabling phenomena, possibly best conceptualised as two bounded and coiled strands of the political violence DNA.  相似文献   

4.
    
ABSTRACT

This article questions the current narrative paradigm and argues that al-Shabaab attacks Kenya for strategic and highly rational reasons, beyond sharing a border and having bases in southern Somalia closer to major population centres than Ethiopia or Uganda. Al-Shabaab targets Kenya more than other frontline states because of the opportunity spaces linked to Kenya’s international status and visibility, its relatively free and independent media that widely publicizes terrorist attacks, a highly developed and lucrative tourist sector that provides soft targets, the comparatively high number of Kenyan foreign fighters within the group’s ranks, the presence of terror cells in Kenya, expanding democratic space, and high levels of corruption. These variables play into al-Shabaab’s motivations and aid planning and execution of terrorist acts that aim to fulfil the group’s quest to survive by maintaining relevance. In order to address this predictable menace, we offer a number of measures that Kenya needs to take, including reducing corruption in order to properly invest in intelligence efforts and relevant homeland security measures, thereby making it possible for Kenya to sustainably and effectively combat al-Shabaab.  相似文献   

5.
This article explores the value of scholarship on state terrorism for the critical study of terrorist violences. The article begins by identifying four primary contributions of this scholarship: first, a rethinking of the status and significance of terrorism; second, an unsettling of broader assumptions within International Relations (IR) and terrorism research; third, an ability to locate state violences within pertinent, but potentially camouflaged, contexts; and, fourth, a prioritisation of critique as a responsibility of scholarship. The article’s second section then argues that the purchase of this work could be further extended by greater conceptual engagement with the state itself. In particular, we point to the value of contemporary approaches to the state as a terrain and outcome of social and political struggle, rather than as a singular actor of unitary purpose. Rethinking the state in this way has value, we argue, first, for moving research beyond the identification and typologising of state terrorisms; and, second, for circumventing the perennial problem of identifying intentionality in efforts to designate violences as (state) terrorism.  相似文献   

6.
This article examines the little explored issue of non-state actor (NSA) participation in the European Union’s (EU) Common Security and Defence Policy (CSDP). Despite the fact that NGOs and civil society are shielded from formal access to CSDP, EU staff in both Brussels and the missions engage with them informally. Drawing on interviews with policy-makers and NSA representatives, the article analyses the practices of the EU in its engagement with NSAs, focusing on civilian missions in Georgia and Palestine. It shows that such engagement is more intense during implementation at the level of CSDP missions rather than during policy-making in Brussels. It argues that a combination of rational choice-based (functional needs of policy-makers and intensity of NSA advocacy) and constructivist (organisational and individual cultures) explanations helps us better understand why CSDP structures open up to NSAs. The article contributes to the nascent academic and policy debate on EU–civil society cooperation in CSDP and, more broadly, to the studies of informal governance in the EU and NSA participation in international organisations.  相似文献   

7.
    
Although military cooperation among rebel groups in multi-party civil wars could help rebels defeat or extract concessions from an incumbent government, violent conflict among rebel groups is empirically prevalent. Why do rebel groups in multi-party civil wars choose to fight one another? This article models the strategic dilemma facing rebel groups in multi-party civil wars as an alternating-offer bargaining game of incomplete information with an outside option. The game-theoretic model explores the relationship between the status quo distribution of power among rebel groups, the costs of fighting, and the likelihood that one rebel group will opt to unilaterally end bargaining over a set of goods, such as access to supply routes, natural resources, and control over civilian populations. We show that the likelihood of violent conflict between rebel groups is lowest when the status quo distribution of benefits reflects the existing distribution of power.  相似文献   

8.
This article reports on a recent survey designed to capture understandings of cyberterrorism across the global research community. Specifically, it explores competing views, and the importance thereof, amongst 118 respondents on three definitional issues: (a) the need for a specific definition of cyberterrorism for either policymakers or researchers; (b) the core characteristics or constituent parts of this concept; and (c) the value of applying the term “cyberterrorism” to a range of actual or potential scenarios. The article concludes by arguing that while a majority of researchers believe a specific definition of cyberterrorism is necessary for academics and policymakers, disagreement around what this might look like has additional potential to stimulate a rethinking of terrorism more widely.  相似文献   

9.
Employing a discourse analytic approach, this paper examines the silence on state terrorism within the broader terrorism studies literature. An analysis of this literature reveals that state terrorism is noticeable mainly for its absence as a subject of systematic academic study. Following the textual analysis, the main finding – the silence on state terrorism within terrorism studies – is subjected to both a first- and second-order critique. A first-order or immanent critique uses a discourse's internal contradictions, mistakes and misconceptions to criticise it on its own terms. In this case, the absence of state terrorism is criticised for its illogical actor-based definition of terrorism, its politically biased research focus, and its failure to acknowledge the empirical evidence of the extent and nature of state terrorism. A second-order critique entails reflecting on the broader political and ethical consequences of the representations enabled by the discourse. It is argued that the absence of state terrorism from academic discourse functions to promote particular kinds of state hegemonic projects, construct a legitimising public discourse for foreign and domestic policy, and deflect attention from the terroristic practices of states. The exposure and destabilisation of this dominant narrative also opens up critical space for the articulation of alternative and potentially emancipatory forms of knowledge and practice.  相似文献   

10.
    
Critical theory avows that “where there is power there is always resistance”. However, the practical implications and consequences of particular modes of resistance remain, within World Politics, under-theorised. In critical terrorism studies (CTS), this critical imperative to resist has recently emerged in the proposal to remember state terrorism. With this move, CTS aims to disturb the legitimacy of forms of violence/terror that emerge from the state. In this article, I argue that such an agenda of “resistance through memory” has already been put forth in the Global South (specifically, Latin America). Drawing on this historical experience, I elucidate some problems with the critical imperative to resist. More specifically, I show how in Brazil the Global South counter-memorial narratives of state terror share a common ground with the Global North counterterrorism discourses. I do so by analysing three underlying tropes of Brazilian remembrance that replicate Global North representations of terrorists: bestialism, pathology and dehumanisation.  相似文献   

11.
    
Proxy relationships between non-state challengers and their external state patrons in the Middle East are a factor that can weaken regional stability as non-state proxies become both a tool and a decisive factor in shaping inter-state competition between regional powers. As a result, non-state actors with regional influence must increasingly be factored into policy decisions in military, diplomatic and legal terms.  相似文献   

12.
13.
    
This research note responds to recent debates about new intergovernmentalism and argues that the hypotheses of Bickerton, Hodson and Puetter overlook the roles non‐state actors play in the integration process. It intends to open up a debate about private power and the new intergovernmentalism, demonstrating that the concentration of powers of national governments has proceeded alongside the concentration of powers of transnational business interests in Europe. The note draws on the example of the civil security industry and Justice and Home Affairs policies in order to modify the six hypotheses of new intergovernmentalism.  相似文献   

14.
    
Discourse on terrorist violence has long facilitated an especially liberal form of securitisation. Originally evoked in reference to anarchists and communists, a rational consideration of terrorist violence, inaugurated by the concept, asks for deferred judgement about the nature of, or reasons behind, violence related to terror on the premise that state and international legal norms governing the legitimate use of violence fail to circumscribe the proper capacities of the state to regulate and explain terrorism. Where sovereign powers along with their military and civilian instruments of coercion are deemed unable to regulate violence effectively, analysts of terrorist violence and their readership are invited to consider and cultivate new sensibilities. Beginning in the 1980s, studies by psychologists found renewed urgency among a growing cadre of interdisciplinary terror experts who found religion, Islam especially, a key variable of analysis. I situate their contributions in a longer history of secular and racialising discourse about terrorist violence. Central to this history are practices of reading, translating, interpreting and archiving texts. Evidence for the argument is based on the analysis of an algorithm that allegedly predicts the likelihood of terrorist strikes by counting words spoken by al-Qa?ida leaders and correlating their frequency with over 30 psychological categories.  相似文献   

15.
    
ABSTRACT

This article problematises Critical Terrorism Studies’s (CTS) seeming reluctance to engage in causal explanation. An analysis of the meta-theoretical assumptions on causation in both orthodox and critical terrorism studies reveals that the latter’s refusal to incorporate causal analysis in its broader research agenda reproduces – despite its commitment to epistemological pluralism – the former’s understanding of causation as the only sustainable one. Elemental to this understanding is the idea that causation refers to the regular observation of constant conjunction. Due to the positivist leanings of such a conception, CTS is quick to dismiss it as consolidating Orthodox Terrorism Studies’s lack of critical self-reflexivity, responsibility of the researcher, and dedication towards informing state-led policies of counterterrorism. Drawing on recent work in the philosophy of science and International Relations, this article advances an alternative understanding of causation that emphasises its interpretative, normative and dialogical fabric. It is therefore argued that CTS should reclaim causal analysis as an essential element of its research agenda. This not only facilitates a more robust challenge against Orthodox Terrorism Studies’ conventional understanding of causation but also consolidates CTS’s endeavour of deepening and broadening our understanding that (re)embeds terrorist violence in its historical and social context.  相似文献   

16.
    
This article engages with the suicide bomber as he or she appears in the terrorism studies literature. In contrast to sensationalised narratives of the suicide bomber as pathological or fanatical, terrorism studies has increasingly come to view suicide bombing as a rational phenomenon that follows an identifiable strategic logic. Following Foucault’s articulation of governmentality, I read this literature as a governmental practice that attempts to understand the latent rationality of suicide bombing so that the phenomenon may be effectively governed and managed. With this understanding, I look specifically at the terrorism studies accounts of female suicide bombers and argue that the concerns they articulate regarding the superior capacity of these women to go undetected, such as with the use of fake pregnancies as disguises, produces the female suicide bomber as a uniquely risky and ungovernable subject.  相似文献   

17.
Studying Islam and Middle Eastern politics has become highly popular, particularly in American and British universities after the 9/11 and 7/7 terrorist events. Unfortunately, the increasing interest in Islam and Muslims in the West is often based on (mis)recognition of images of Muslims in the media. This has created a new set of problems of ignorance and misunderstandings about terrorism and the Islamic world. The intent of this article is to outline a ‘critical pedagogy’ of research-based teaching for Islamic studies and illustrate how this kind of pedagogical engagement better equips students to ‘problematise the natural, cultural and historical reality’ and dominant Orientalist assumptions about the relationship between Islam and terrorism. This article shows how research-based teaching can help students to become critical thinkers to connect knowledge and power while studying Islam and Middle Eastern politics.  相似文献   

18.
    
The journal Terrorism and Political Violence recently published a special issue looking at why particular communities of intellectuals purportedly support terrorism, which, due to its politically partisan nature, is potentially damaging for terrorism studies. Showing that several articles within the special issue use the twin processes of accusing intellectuals of supporting terrorism and of being psychologically disturbed as a form of delegitimisation, three fundamental flaws in the special issue will be examined. In explaining these flaws, this paper draws attention to the way that this special issue forms an “epistemic community” at both the micro and the macro level, where certain assumptions on power and legitimacy are unquestioned. As a result, the special issue gains and performs an ideological function in censuring criticism of Israeli foreign policy.  相似文献   

19.
ABSTRACT

This study analyses messages within corporate web pages as physical indicators of the following: the extent to which sampled companies provide information communication technology (ICT) to the South African society in terms of geographical spread; the types of ICTs they provide; the nature of their support; and the members of society targeted. Through latent coding, it seeks to deduce whether the companies realise their role in social development by focusing their corporate social responsibility programmes on societal needs and to establish whether their support is broadly aligned with government priorities.

Although the study is exploratory in nature, it reveals the following noteworthy issues: The geographical spread indicates that seven of the 11 companies analysed focus their support for ICT on the country as a whole; most companies tend to provide a whole range of technological equipment rather than one type; the provision of equipment is coupled with training; and the support for ICT is largely aimed at schools.

It is inferred that the companies realise their societal obligations; support government priorities; and are committed to social development by creating appropriate mechanisms for access to ICT.  相似文献   

20.
While welcoming Critical Terrorism Studies (CTS) as an interesting and valuable addition to the discourse on terrorism studies, this article argues that CTS has some serious shortcomings, particularly in those accounts that draw explicitly on a Frankfurt School approach. The article will mainly engage with three areas: the notion and conceptualisation of ‘critique’, the role of emancipation, and the overstatement of the novelty of CTS. It will argue that the way in which Critical Theory has been incorporated into the study of terrorism does not take sufficient account of the wider philosophical implications and shortcomings inherent in Critical Theory. It then suggests that while the concept of emancipation (which drives the normative agenda of CTS) has been advocated, it is very unclear as to its practical application. CTS scholars, it is argued, cannot simply take ‘emancipation’ out of the different contestations surrounding it by either claiming a (somewhat deceptive) transparency of meaning manifested in ‘liberating the oppressed’ or by retreating into an anti-foundationalist stand in which ‘the concrete content of emancipation cannot and need not be determined in the beginning’. Finally, and in relation to the definition of terrorism in particular, the article argues that the novelty of CTS has been overstated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号