首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The consequences of states’ reactions to terrorist attacks can far outweigh the effects of the attacks themselves. Yet risk analysis, widely accepted as the proper analytical basis for assessing terrorist threats, largely ignores the consequences from potential reactions to attacks. It also generally fails to consider how the anticipation of these reactions may influence terrorists’ attack preferences. Policymakers should therefore be wary of the limitations of risk analysis as currently practiced. Further, states should strive to avoid reactions to attacks that unwittingly further their adversaries’ agendas, a goal that may be aided by strengthening public resilience to terrorism.  相似文献   

2.
The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. One can describe the Internet as composed of layers: the “upper” layer, or the Surface Web, can easily be accessed by regular searches. However, “deeper” layers, the content of the Deep Web, have not been indexed by traditional search engines such as Google. Michael K. Bergman who wrote the seminal paper on the Deep Web, compared searching the Internet to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deeper and therefore missed. In fact, most of the Web's information is buried far down on sites, and standard search engines are unable to access it.  相似文献   

3.
The author's prior cross-national research found a negative relationship between the percent of the workforce that is female and terrorism. One explanation of this finding suggests that women are violence-averse and work to mitigate acts of political violence. Alternatively, women in the workforce may simply proxy for an economy with robust employment with fewer grievances or proxy for modernizing forces (e.g., democracy, secularism) that moderate traditionalism. The author examines the relationship between women in the workforce and terrorism and finds that while modernization factors are important, terrorism is nonetheless explained by the unique nonviolent influences of women in public society.  相似文献   

4.
谢玲 《国际展望》2021,(3):135-151,157,158
随着互联网和人工智能的快速发展,恐怖主义活动方式变得更为隐秘。网络恐怖主义活动空间从表网的在线社区与视频分享平台转向暗网黑市交易和暗网论坛。针对暗网节点通信和交易信息高度匿名等特点,相应的反恐工作需要采取新的技术手段,以深度切入恐怖分子用于扩大影响的暗网空间。为此,可以设计和优化专门适用于暗网的聚焦爬虫工具,挖掘恐怖主义活动信息;可以搭建涉恐事件数据模型,分析恐怖组织可能的线下攻击手段;可以利用社会网络分析和超链接分析方法,定位暗网内恐怖主义隐蔽社区和危险用户集群。通过准确把握暗网中的匿名恐怖主义活动规律,抓住安全监控与防范的重点、难点,综合施策,以及适时制定和精准实施反恐网络安全策略,能够最大限度遏制暗网恐怖主义的危害,保护国家安全和人民利益。  相似文献   

5.
Although the psychology of terrorism is far from a neglected subject, there is still much to learn. “Ordinary” criminals remain enigmatic but have proved a far more accessible population for research purposes. This article bridges the gap between the study of crime and contemporary terrorism by examining the parallels between the two. Significant similarities are shown to exist between terrorists and organized as well as low-level criminals, including activities performed and systems of social influence and organization. Processes of social identification are universally important to varying degrees; however, specific differences in identity may represent key distinguishing features between groups. Although further comparisons utilizing more restrictive samples are necessary, attention is drawn to the sometimes underutilized potential that criminological research holds to act as a point of reference for the investigation of terrorism.  相似文献   

6.
Abstract

Pointing out that the circumstances as regards terrorism in Taiwan are far different from those prevailing in, say, Israel or Italy, the authors describe the conditions that have faced the ROC since 1949, the beleaguered fortress mentality, the emergency legislation, and the anti‐terrorist measures, including restrictions on political and civil rights, taken in what may be called a period of protracted crisis. In the authors’ view, the goal of a fundamentally democratic political system will depend to a great extent on outside forces and influences.  相似文献   

7.
Since 1979 the United States and several European countries have accused the Islamic Republic of Iran of supporting terrorism. This article does not seek to examine the validity of these accusations. Rather, it analyzes how Washington and Brussels have sought to change Tehran's policy. Special attention is given to organizations such as Hizbollah, Hamas, Jihad, and Mujahideen-e Khalq. In addition, Ayatollah Khomeini's Fatwa against Salman Rushdie, the Mykonos trial, and the Flatow Amendment are discussed. The article highlights the differences between the American and European approaches toward Iran and suggests that more cooperation between the two sides of the Atlantic is needed.  相似文献   

8.
Using a unique panel of household businesses for Vietnam, this paper sheds light on the links between households’ and entrepreneurs’ social networks and business performance. We address two related questions. The first question asks if we can find evidence of a differentiated effect of employment of members of the family versus hired workers on the business performance. A second question tackles the respective effects of various dimensions of social networks on business technical efficiency. The hypothesis is that, beyond the channel of labour productivity, entrepreneurs that are confronted with an unfavourable social environment may produce less efficiently and realise a lower output than what could be possible with the same amount of resources. We find evidence of a marginal productivity differential between family and hired labour and highlight results consistent with the presence of adverse social network effects faced by households running a business, in particular ethnic minorities. We also stress the importance of professional networks for successful entrepreneurship.  相似文献   

9.
In order to understand how the Tupamaros ended it is necessary to give an overview of Uruguay's situation in the 1950s and 1960s and explain why in this relatively rich South American country an urban guerilla group developed. The first section presents the topographical, historical, socio-political and ideological context in which the Tupamaros emerged. The following sections describe the violent organization's “career” and point out some of its structural traits such as ideology, strategy and tactics, support milieu and interaction dynamics. As to the end of the guerilla group, first the question is discussed whether a pacific outcome of the conflict by negotiations would have been possible. Then the reasons for the rapid and total military defeat of the insurgents are analyzed as well as the long-term consequences of their organization's destruction.  相似文献   

10.
Lone wolf terrorism remains an ambiguous and enigmatic phenomenon. The boundaries of lone wolf terrorism are fuzzy and arbitrary. This article aims to define and analyze the main features and patterns of lone wolf terrorism in fifteen countries. Lone wolf terrorism is shown to be more prevalent in the United States than in the other countries under study. The cross-national analysis suggests that in the United States lone wolf terrorism has increased markedly during the past three decades; a similar increase does not appear to have occurred in the other countries under study. The numbers of casualties resulting from lone wolf terrorism have been relatively limited, and there is no evidence that the lethality of lone wolf terrorism is on the increase. The rates of psychological disturbance and social ineptitude are found to be relatively high among lone wolf terrorists. Lone wolf terrorists tend to create their own ideologies that combine personal frustrations and aversion with broader political, social, or religious aims. In this process, many lone wolf terrorists draw on the communities of belief and ideologies of validation generated and transmitted by extremist movements.  相似文献   

11.
Beginning in June of 2000 Chechen terrorists have carried out twenty-eight acts of suicide terrorism acts including two mass hostage taking operations combined with suicide terrorism (Beslan and Nord Ost). This paper reports the findings from psychological autopsies (interviews with close family members and friends) of thirty-four (out of 112 total) of these human bombers as well as augmenting them with material from hostage interviews from Beslan and Nord-Ost. The authors analyze the phenomena on the levels of the organization, individual, society and in terms of ideology and compare findings from other arenas also involving suicide terrorism. The main findings are that a lethal mix occurs when individuals in Chechnya are vulnerable to self recruitment into suicide terrorism due to traumatic experiences and feeling a duty to revenge and this vulnerability is combined with exposure to groups that recruit and equip suicide terrorists with both an ideology and the means to explode themselves. The ideology supporting Chechen suicide terrorism is very similar to the global jihadist ideology but remains more nationalist in its goals. It functions for the bombers much like short lived psychological first aid—answering their posttraumatic concerns in a way that shortly leads to their deaths. Unlike the Palestinian case, there is little social support for suicide terrorism in Chechnya.  相似文献   

12.
13.
14.
15.
16.
17.
This article focuses on the role of ideology in the decision of people who are not from societies’ worst-off socioeconomic groups to join a left-wing terrorist organization. Taking up the sociological perspective of Max Weber, Clifford Geertz, and Raymond Boudon, the author introduces the concept of the “terrorist of the first hour” and considers ideology as a type of social bond. The concept of ideology is here broken down into four dimensions: Social, Temporal, Affective, and Moral (STAM bond). This article also presents data on the ages, sex, educational level, and occupation of the Italian people arrested (2,730) or convicted (528) for crimes of terrorism from 1970 to 2011. Data on Italian terrorists were provided by the General Department of Prisoners of the Ministry of Justice. 1 1. The research was conducted between February and July 2011. The author wishes to sincerely thank Sebastiano Ardita—the Director of the General Department of Prisoners of the Ministry of Justice—who gave authorization to collect data on Italian people arrested or convicted of terrorism of which only the Ministry of Justice is in possession. This article considered only data regarding terrorists working to subvert internal order. The articles of the Italian Penal Code regarding “internal” terrorism are articles 270, 270 bis, and 306, and since 2001 further articles have been introduced in order to combat international terrorism.   相似文献   

18.
In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity.  相似文献   

19.
In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity.  相似文献   

20.
Despite many commonalities in national security priorities, Australia and New Zealand approach the threat of terrorism quite differently. Both had twentieth-century manifestations of domestic terrorism which were generally downplayed. The emergence of jihadist-inspired threats globally have affected Australia much more than New Zealand, and Australian counterterrorism strategy has developed significantly since 9/11. New Zealand has watched global events so far untouched by any jihadist threat, and has implemented few effective counterterrorism measures. The reasons for the differing experience, it is contended here, are the varying historical perceptions of threat, and consequent differing approaches each country has taken to mitigate perceived threat.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号