首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
The use of treachery (a deliberate betrayal of trust) and deceit (the ensnaring by guile) are generally overlooked aspects of warfare, whether in tribal or state societies.­ What distinguishes treacherous attacks from other forms of ambush is the necessity of peaceful social interaction between attacker and victim immediately prior to the assault. This article examines the cross-cultural evidence for its use in tribal societies, and relates the implications of these findings to the apparent use of treachery and deceit in a number of guerrilla/terrorist conflicts, including the Al Qaeda attacks of 11 September 2001.  相似文献   

4.
This article examines the phenomenon of “ecoterrorism” from a conceptual and empirical perspective. We explore the political and academic debates over the meaning and use of the term ecoterrorism, and assess the validity of the concept of “ecoterrorism” and of the alleged threat of the Radical Environmentalist and Animal Rights (REAR) movement by analyzing the characteristics of both the movement and its actions. Our analysis shows that the term ecoterrorism should only be used for a small proportion of the actions of REAR movement. Consequently, counterterrorist measures should only target these terrorist minorities, rather than all groups and the broader movement.  相似文献   

5.
Many scholars and practitioners claim that labeling groups or individuals as “terrorists” does not simply describe them but also shapes public attitudes, due to the label's important normative and political charge. Yet is there such a “terrorist label effect”? In view of surprisingly scant evidence, the present article evaluates whether or not the terrorist label—as well as the “Islamist” one—really impacts both the audience's perception of the security environment and its security policy preferences, and if yes, how and why. To do so, the article implements a randomized-controlled vignette experiment where participants (N = 481) first read one out of three press articles, each depicting a street shooting in the exact same way but labeling the author of the violence with a different category (“terrorist”/“shooter”/“Islamist”). Participants were then asked to report on both their perceptions and their policy preferences. This design reveals very strong effects of both the “terrorist” and “Islamist” categories on each dimension. These effects are analyzed through the lenses of social and cognitive psychology, in a way that interrogates the use of the terrorist category in society, the conflation of Islamism with terrorism, and the press and policymakers' lexical choices when reporting on political violence.  相似文献   

6.
Why do Human Rights Organizations (HROs) target or “shame” countries for human rights abuses? The literature using country-level factors to explain why one country is likely to be targeted over another is growing but many questions still remain. Terrorist activity in a country should have a positive effect on the amount of shaming directed at a country. HROs are in the publicity business and have organizational interests to shame states already receiving attention. Findings show that there is a connection between certain types of transnational terrorist incidents occur in a country and the amount of HRO shaming of governments, even after accounting for the human rights practices within the state.  相似文献   

7.
8.
As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.  相似文献   

9.
Each terrorist organization faces a critical tradeoff between effectively managing the organization's violent behavior while remaining secure from counterterrorism efforts. Drawing on organization theory and terrorism literature, this article develops theoretical linkages between the organizational design of a terrorist group and this critical tradeoff. It considers the impact of four key design parameters: membership, operational space and time, formalization, and centralization. The first two structural parameters construct the physical anatomy of a terrorist organization. The latter two structuring parameters prescribe or restrict the behavior within this organizational context. Net advantages by means of rising structural design parameter values are increasingly offset by the organizational strength and security vulnerabilities that inherently follow from the rising structuring parameters.  相似文献   

10.
Terrorist incidents are not random in space or time. Understanding the current spatial and temporal patterns of terrorist incidents, as well as predicting future trends, is vital for effective counterterrorist efforts. This article focuses on terrorist incidents in Iraq, which are defined here as attacks, both successful and unsuccessful, in order to detect patterns in the establishment of terrorist activity spaces. Using Geographic Information Science (GISc), this project carries out a series of spatial and temporal cluster identification analyses on recent terrorist incidents in Iraq.  相似文献   

11.
This section of Studies in Conflict & Terrorism is dedicated to the reprinting of selected, translated terrorist communiqués that provide insights into the mindset, worldview, or operational thinking of a group. In terms of communiqués, this section employs the following typology of terrorist communiqués. There are three types of terrorist communiqués: attack, strategic, and special. Attack communiqués are issued to claim responsibility for an attack, explain the target selected, and provide the political rationale for attacking the target. A strategic communiqué is a longer document that is issued to provide strategic direction or commentary on political events, issues, and developments relevant to the group's cause and constituency. It can be used to explain changes of strategy or reinforce the strategic direction of the group. The special communiqué is similar to the attack communiqué in that it is event-driven but addresses non-attack events like anniversary dates, hunger strikes, elections, deaths of leaders, ceasefires, issuing threats or warnings, annual progress reports, issuing apologies, and so on. All three communiqués are issued publicly and intended to influence various audiences.  相似文献   

12.
ABSTRACT

The relationship between drug trafficking and terrorism remains a contentious issue. While some assert that drug trafficking is a strong predictor of terrorism, others contest this observation. This study focuses on the impact of the Afghan opioid trade on terrorist violence in Central Asia, a region of drug transit states. We employ Geographic Information Systems–enabled visualizations of the drug trade and terrorism as well as statistical tests to study the drug–terror relationship at the subnational level. Our findings lend support to the argument that the drug trade facilitates terrorism, but we also find that the drug–terror relationship is multifaceted, complex, and intimately linked to the state.  相似文献   

13.
Whether the Global War on Terror (GWOT) has changed the terrorist threat is a matter of controversy. This study, using transnational terrorism events data from 1993 through 2004, employs a time-series approach to investigate the extent to which the onset of the GWOT (beginning with the invasion of Afghanistan) and related events (the invasion of Iraq, the capture of Saddam Hussein, and the release of photos from Abu Ghraib) are associated with changes in transnational terrorist activity, its frequency, dispersion, lethality, type of attack, and type of victim of transnational terrorist incidents.  相似文献   

14.
名称年月期数 者 编j著论文斯大林在1936年宣布苏联建戍社会主义是适 宜的南斯拉夫工业发展的几个问题局举全世界无产者和被压迫民族联合起来的 伟大旗帜—纪念列宁《民挨和殖民.他问 题提纲初稿》六十周年关于共产国际与印度革命问题有关研究印度社会性质的几个理论问题关于印  相似文献   

15.
The United States is at significant risk of a future pyro-terrorist attack—when terrorists unleash the latent energy in the nation's forests to achieve the effect of a weapon of mass destruction—the threat, must be defined America's vulnerabilities understood, and action taken to mitigate this danger to the United States.  相似文献   

16.
Why do some terrorist organizations deploy women on the front lines and in violent attacks? This study explores the social conditions, economic factors, and organizational characteristics that might explain women's participation in violent terrorist activity. With a new data set of 395 terrorist organizations, women's participation in terrorist attacks was quantified and coded. The logistic regression analysis results suggest that women's educational attainment, social rights, terrorist organization's age and size, and the level of a country's economic development are important predictors of the deployment of women in terrorist violence while a terrorist group's ideological or religious orientation and the level of democracy do not significantly influence the likelihood of women's participation.  相似文献   

17.
The current article seeks to add to the quantitative approach to understanding terrorism by examining the logic underlying terrorist choice of targets and timing within the context of the Chechen–Russian conflict. Using data on Chechen rebel bombings in Chechnya and Russia from 1997–2003, the analysis revealed support for a logic underlying terrorist choice of targets. The results indicated that civilian targets were more likely to be targeted in Russia than in Chechnya, illustrating the importance of examining contextual effects within quantitative approaches to terrorism. The results also implicated an affect of weather and urbanization. Implications of the results and future directions for research are discussed.  相似文献   

18.
《青少年与法》2008,(2):29-29
吉祥物是一只名叫Misha的俄罗斯熊,由著名的儿童书籍插图画家维克多切兹可夫设计。Misha在莫斯科奥运会期间被用在诸如毛绒玩具、瓷器、塑料制品、玻璃器皿等上百种纪念品上,而且还被印制成丁邮票  相似文献   

19.
樊超 《国际政治研究》2013,(1):121-134,1
一条线战略的缺陷是中国外交战略调整的根本原因。此战略的实施揭示出苏联的战略困境,增强了中国应对苏联战略压力的信心,使中国具备了战略调整的前提。联美反苏的构想给美国造成了中国有求于人的印象,导致里根政府在台湾问题上的倒退。为打破一条线战略束缚对美政策的局面,中国在八一七公报谈判中结束了一条线战略,从而牵动了外交战略的调整。这次调整的结果是改变了中国对美、对苏和对第三世界的政策:与美国战略合作的地位相对降低,开启了中苏关系缓和的进程,重新重视与第三世界的关系。  相似文献   

20.
Considering Europe's long history of terrorist violence by separatist, leftist and rightwing groups, terrorism by militant Sunni Islamists has until recently been a marginal phenomenon. However, empirical data presented in this chronology suggests it constitutes a growing and increasingly lethal threat, and a worrisome trend in the context of increased tensions between the Muslim world and the West in the wake of 9/11 and the U.S.-led invasions of Afghanistan and Iraq, which needs to be dealt with on many levels—socially, politically, and economically. The current chronology is meant to serve as a tool for conducting academic research on the scope of the threat, and for mapping incidents that might be surveyed in more depth to create a better understanding of its organizational, operational, and motivational patterns.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号