首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
There has been an historic transition through which Type I terrorism and Type II terrorism are being combined. Type I terrorism consists of acts that attempt to impose terror by individuals or small groups on other individuals and groups, and through them indirectly on their governments. Type II terrorism is the imposition by governments on individuals or on groups of local or foreign populations, e.g., the use of atomic weapons, poison gas, Nazi camps for genocide. The new type of terrorism—Type III—has all the components for success. The article deals with how this new terrorism disrupts personal and historic memory through large‐scale catastrophe organized for that purpose. It is pointed out that this type of terrorism is met with self‐protection on the conscious level and has very little psychic cost on the perpetrators. Type III terrorism results from states disseminating high‐level technology. Target nations will not have open to them the conventional responses and will have to devise new methods. The danger of technical failure in the use of new methods of terrorism is very real.  相似文献   

2.
Erik van Ree 《欧亚研究》2008,60(1):127-154
This article discusses the development of Transcaucasian social-democratic terrorism from 1901 to 1909. For two reasons the ‘psychohistorical’ model emphasising the subjective and irrational aspects of terrorism has only limited value for the Transcaucasian case. First, the significance of the contextual factor is powerfully underscored by the phenomenon of workers' ‘economic terrorism’. It was not uncommon even, for workers to blackmail reluctant party organisations into supporting the killing of their enemies. Secondly, the social democrats were not driven by irrational urges but followed a rationally motivated and selective terrorist strategy. They attempted to limit or prevent workers' terrorism from below, the ‘anarchist’ potential of which they considered a threat to the organised mass struggle. They set their hopes on a division of labour, with a militant but mostly peaceful workers' movement and terrorism as the prerogative of the party.  相似文献   

3.

Girls—both willingly and unwillingly—participate in terrorist acts within the context of contemporary wars. These acts range from targeting civilians for torture and killing to destroying community infrastructures so that people's physical and psychological health and survival are affected. Girls witness or participate in acts such as mutilation, human sacrifice, forced cannibalism, drug use, and physical and psychological deprivation. This article focuses upon girls in two fighting forces: the Lord's Resistance Army (LRA) in Northern Uganda and the Revolutionary United Front (RUF) in Sierra Leone and their roles as combatants whose primary strategy is perpetrating terrorist acts against civilians. In analyses of gender and terrorism, girls are typically subsumed under the larger category of female, which marginalizes their experiences and fails to recognize that they possess agency and power.  相似文献   

4.
In order to thwart and prevent terrorism the State is compelled to use all of the covert capabilities at its disposal in order to protect the society it serves. One of its most effective weapons is the use of human intelligence. Often acquired through secret relationships with terrorists or those with the ability to access preemptive intelligence. This important work is contentious for any democratic society as such practices and relationships, should they become known, inevitably beg the question—How far is it permissible for the State to go? A case study of State efforts to combat terrorism in Northern Ireland presents the moral, ethical, and legal dilemmas encountered and the propaganda opportunity such activity presents its detractors and critics. This article will identify key aspects related to the intelligence war and the development and creation of the concept of “collusion,” a subjective issue, and one that has no legal definition.  相似文献   

5.
The often changing range of terrorism journals selected for indexing in various databases adds to the elasticity of this field's definition. The electronic databases as well as websites change their format and content quite often and this instability hampers the formation of a clear delineation of the disciplinary boundaries of terrorism. Nevertheless, the integration of electronic databases into terrorism research has exposed researchers to a large number of journals that deal with various aspects of terrorism, and the boundaries of this subject are continually expanding to encompass new sub-areas. In addition to the known core journals covering terrorism, many peripheral journals are emerging that are concerned with the dynamics of this field. The exposure of researchers to such a massive amount of information, print and electronic, demonstrates a marked knowledge growth in this area of study. However, the field could become so broad, even before reaching disciplinary maturation, that it could defy any attempt at delineation.‐  相似文献   

6.
The use of terrorism as a strategy for obtaining political goals by non-state actors persists in the international system, despite attempts by states to counter the phenomenon. This article explores the resurgent threat posed to British security by dissident Irish republicans in order to illustrate the limited utility of terrorism as a strategy in the current sociopolitical context. Therefore, it has three objectives: First, it explains how strategic theory can aid in constructing a conceptual framework for explaining the persistence of terrorism, in general, and dissident republican violence, in particular. Second, it examines the dissident threat in light of the general failure of “armed struggle” to achieve republican goals in Irish politics. It is argued here that dissident republicans have confused “means” with “ends” and that this, ultimately, demonstrates the futility of their violence. Finally, the article suggests ways of tackling the dissident republican variant of terrorism.  相似文献   

7.

This research note explores aspects of the demand for terrorism using data from the Pew Research Center. With these data from 7,849 adult respondents persons within 14 Muslim countries, this article explores who supports terrorism. It is shown that females, younger persons, and those who believe Islam is under threat are more likely to support terrorism. Very poor respondents and those who believe that religious leaders should play a larger role in politics are less likely to support terrorism than others. Because these affects vary throughout the countries studies, it is argued that interventions must be highly tailored, using detailed demographic and psychographic data.  相似文献   

8.
This article examines how Europe fits into the broader international campaign against terrorism. It argues that Europe is both a source and a target of terrorist activity, and faces threats including Al Qaeda–inspired terrorism, extremist political parties, insurgent sympathizer networks, subversive movements, and the overlap between crime and terrorism. The article argues that the primary threat is terrorist-linked subversion, which seeks to manipulate and exploit the sociological and ethnographic features of immigrant communities. Islamic theology is a strictly secondary factor, and a focus on Islam as such is likely to be an analytical dead-end. The article examines countersubversion as a conceptual framework for counterterrorism in Europe. The article concludes that an approach based on trusted networks and close collaboration with communities is most likely to succeed.  相似文献   

9.
This article attempts to clarify what is meant by “root causes” and considers if their analysis helps to explain and describe how, where, and why terrorism occurs. In attempting to explore—but not definitively resolve—these challenges, the article will attempt to delineate “root causes” into qualitative and quantitative variables that can be empirically tested in relation to contemporary terrorist activity. In so doing, it considers the relative merits of different methodologies for approaching “root causes.” The article concludes that indirect and underlying sources of conflict are significant to understanding specific incidents of terrorism and certain categories of terrorism; that “root causes” are less helpful in describing and explaining terrorism as a general phenomenon; and that root causes are of analytical use only in conjunction with precipitant factors.  相似文献   

10.
This article argues that, while there have always been good reasons for striving for a universally agreed definition of terrorism, there are further reasons for doing so in the post 9/11 environment, notwithstanding the formidable challenges that confront such an endeavour. Arguing that the essence of terrorism lies in its intent to generate a psychological impact beyond the immediate victims, it will propose three preliminary assumptions: that there is no such thing as an act of violence that is in and of itself inherently terrorist, that terrorism is best conceptualized as a particular method of political violence rather than defined as inherent to any particular ideology or perpetrator, and that non-civilians and combatants can also be victims of terrorism. It will then outline the implications that these assumptions have for the definitional debate.  相似文献   

11.
ABSTRACT

While the threat from terrorism has gained widespread acknowledgment over the last decade, the infiltration of organizations by “terrorist” insiders has not, and the potential dangers these individuals present has not been fully explored. There is a need to understand the wider aspects of insider threats, including motivations and attack methodologies, and to be able to demonstrate the potential devastation that could be caused. Organizations can attempt to mitigate the potential for insider infiltration by both terrorist and other hostile actors, and if such individuals were within an organization, there are procedures and strategies that can be employed to prevent exploitation of existing organizational vulnerabilities and detection of insiders. This article provides an informed and new approach to the connection between insider threat and terrorism.  相似文献   

12.
ABSTRACT

This article considers the terrorism financing risk associated with the growth of Financial Technology innovations and in particular, focuses on virtual currency products and services. The ease with which cross-border payments by virtual currencies are facilitated, the anonymity surrounding their usage, and their potential to be converted into the fiat financial system, make them ideal for terrorism financing and therefore calls for a coordinated global regulatory response. This article considers the extent of the risk of terrorism financing through virtual currencies in “high risk” States by focusing on countries that have been recently associated with terrorism activities. It assesses the robustness of their financial regulatory and law enforcement regimes in combating terrorism financing and considers the extent to which Regulatory Technology and its global standardization, can mitigate this risk.  相似文献   

13.
The view of terrorists as entrepreneurs is not new. Yet, unlike traditional entrepreneurs, they are not motivated by profits. This article argues that terrorists are social entrepreneurs. They are motivated primarily by social returns. Furthermore, their main output is a public good due to its non-rival and non-excludable properties. Using social entrepreneurship theories, this article presents an alternative view of the incentives behind the formation of terrorist organizations. It concludes with a discussion of policy implications of this framework for combating terrorism.  相似文献   

14.
15.
It is widely believed that the current wave of religiously inspired terrorism will persist for the foreseeable future. Is this necessarily the case? This article asserts that this present wave may be cresting, much like previous waves in the modern history of terrorist violence. Further, the article goes on to forecast not an end to terrorism in general, but the likely emergence of still new manifestations of terrorist violence.  相似文献   

16.

Religious terrorists have been the subject of much scholarly scrutiny. While such analyses have endeavored to elucidate the ideological logic and implications of religious terrorism, the transnational character of jihadists necessitates new ways of understanding this phenomenon. My article attempts to explain how jihadists can be defined as liminal beings who seek to re-enchant the world via their symbolic and performative features. Jihadists' strategically position themselves as ambiguous not only as a distinguishing device, but also to enhance their belief of a cosmic war on earth. Jihadists' use of symbolic imagery on the internet works within the ambit of a magical kind of panoptic power which seeks to both impress and terrify viewers.  相似文献   

17.
This article examines the causes of terrorism at a global level. It also reexamines the chronology of terrorism since the nineteenth century. It argues that local causes cannot explain global waves, and that while ideology is a necessary ingredient in causing terrorism, it does not explain it. The article proposes that the most important cause of global waves of terror is the inspiring example for radicals everywhere of what are, or appear to be, successful uses of terrorist strategies. This hypothesis is tested in the context of a reevaluation of David Rapoport's chronology of global waves of terrorism. The article argues for different periodization, and for labeling the waves as Italian, German, Chinese, and Afghan.  相似文献   

18.
The willingness of some single-issue groups to use violence in the pursuit of their cause has received surprisingly little attention within the literature on terrorism. This article seeks to add to our understanding of this phenomenonnamely that of single-issue terrorismby focusing on the increasing tendency of groups within the British animal rights movement to utilize violent methods in order to achieve their objectives. The article will seek to further the argument that some single-issue groups have been willing to use violence in past campaigns, thereby highlighting the understudied nature of the phenomenon. This will be illustrated by examining the campaign of single-issue terrorism undertaken by the militant suffragettes in Britain in the 1910s.  相似文献   

19.
Abstract

That terrorism presents scholars and policymakers alike with new challenges is well documented. But the fact that transnational terrorism and societal responses to it have also placed new demands on those who teach international affairs in the undergraduate classroom is less widely discussed. This article identifies a basic set of educational objectives for teaching about terrorism as well as materials and methods for achieving those objectives with a reasonable degree of success. Through a discussion of the uses of library research exercises, films, role playing and simulation, and values clarification approaches, the article provides a scheme for educating a nucleus of future citizens who will better understand the policy and value choices confronting them in a world beset by terrorism.  相似文献   

20.
Abstract

Using a variety of public opinion sources, this article explores American attitudes during the two Reagan administrations toward terrorism. It establishes the salience of terrorism in the public's mind, the perceived causes of terrorism, opinion about preventing future terrorist incidents, and attitudes on negotiating with terrorists. The paper also examines sentiments about military retaliation options and reviews beliefs about media coverage of terrorism. In this overall attitudinal context, the study touches on the theoretical relationship between public opinion and foreign policymaking, contending that the American public is responsible and sensible enough to comprehend the general nuances and basic complexities of an issue such as terrorism. Public opinion is judged to be a capable and logical determinant in foreign policy formation. The paper also concludes that there must be some symmetry between U.S. policy and public opinion on the issue for the policy to be effective.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号