排序方式: 共有37条查询结果,搜索用时 15 毫秒
11.
In this article, we argue that a comparative study of state and non-state terrorism that uses the minimal foundationalist definition of terrorism as its central analytical framework offers a unique and instructive approach for answering the question: “what is terrorism?” To date, most recent comparative case study analyses of terrorism focus on ideologies, political/governance models, structural/contextual enablers, practices, organisational structures, and/or the basis of issues such as trust, belonging, and membership. We uniquely contribute to the growing literature on comparative terrorism studies by comparing and contrasting state and non-state terrorism on the basis of strategic communication vis-à-vis the preparation, execution, and outcomes of political violence (the “terrorism attack cycle”), the instrumentalisation of victims, and fear management. We argue that state and non-state terrorism are co-constituting and co-enabling phenomena, possibly best conceptualised as two bounded and coiled strands of the political violence DNA. 相似文献
12.
13.
14.
15.
Finn Breinholt Larsen 《国际比较与应用刑事审判杂志》2013,37(2):277-290
The conflict which many indigenous peoples experience with Westernized systems of law has precipitated a search for alternative models of criminal justice. While the process of colonization has most often resulted in the destruction of traditional practices of social control, in Greenland an attempt was made to adapt Western law to the indigenous culture. The Greenlandic justice system has several unique attributes which have attracted the attention of indigenous peoples and governments worldwide. This article traces the origins, development and evolution of the Greenlandic Criminal Code and criminal justice system, the factors which influenced its development, and the extent to which the objectives of the architects of the systems have been met. The discussion provides key insights into the potential and limitations of adapting Western law to indigenous cultures. 相似文献
16.
This paper analyses whether direct government assistance during start-up and other forms of interaction with the state sector have influenced the long-run performance of small and medium-sized manufacturing enterprises (SMEs) in Vietnam. Using three partly overlapping surveys during the period 1990–2000, we find strong effects on firm dynamics from interaction with state institutions. Enterprises which have the state sector as their main customer perform better. This is so for both survival and growth. Moreover, temporary tax exemptions during firm start-up had a separate and positive influence on long-run growth for non-household enterprises and initial credit support seems to benefit rural firms. 相似文献
17.
Martin Kramer Philip Windsor Donna M. Schlagheck John E. Finn 《Terrorism and Political Violence》2013,25(2):270-279
Amir Taheri, Holy Terror: The Inside Story of Islamic Terrorism. London: Century Hutchinson; Bethesda, MD: Adler & Adler, 1987. Pp.313. £12.95/$19.95 (hardback); £3.95 (paperback). Robert O. Slater and Michael Stohl (eds.), Current Perspectives on International Terrorism. London: Macmillan Press; New York: St. Martin's Press, 1988. Pp. 288. £29.50/$39.95 (hardback); £13.95 (paperback). Juliet Lodge (ed.), The Threat of Terrorism. Brighton: Wheatsheaf Books; Boulder, CO.Westview Press, 1988. Pp. 280. £35/$33.50 (hardback); £12.95 (paperback). Edward F. Mickolus with Peter A. Flemming (compilers), Terrorism, 1980–1987: A Selectively Annotated Bibliography. Westport, CT: Greenwood Press, 1988. Pp. 314. £49.50/$55. 相似文献
18.
19.
Mary A. Finn 《犯罪学与公共政策》2013,12(3):443-472
20.
The Technology Safety Project of the Washington State Coalition Against Domestic Violence was designed to increase awareness
and knowledge of technology safety issues for domestic violence victims, survivors, and advocacy staff. The project used a
“train the trainer” model and provided computer and Internet resources to domestic violence service providers in order to
(1) increase safe computer and Internet access for domestic violence survivors in Washington; (2) reduce the risk posed by
abusers by educating survivors about technology safety and privacy; and (3) increase the ability of survivors to help themselves
and their children through information technology. Evaluation of the project suggests that the program is needed, useful,
and effective. Consumer satisfaction was high and there was perceived improvement in computer confidence and knowledge of
computer safety. Areas for future program development and further research are discussed. 相似文献