首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
各国政治   1篇
世界政治   8篇
外交国际关系   6篇
政治理论   4篇
  2017年   1篇
  2016年   3篇
  2015年   1篇
  2014年   1篇
  2013年   10篇
  2010年   1篇
  2005年   1篇
  1998年   1篇
排序方式: 共有19条查询结果,搜索用时 31 毫秒
1.
This article evaluates state-sponsored terrorism as a principal-agent issue. More often applied to the study of licit national or international institutions as a way to improve their governance, we argue that applying principal-agent analysis to illicit relationships such as those between states and terrorist agents is an equally fruitful application, though one with different objectives. Rather than being used as a tool to improve governance, applying principal-agent analysis to illicit relationships such as state-sponsored terrorism may point to areas of susceptibility and thus inform more effective counterterrorism strategies. In this article, we explain why states delegate to terrorist groups, how they seek to control their agents, and the tensions in the relationship, both generally and through specific reference to Iran's sponsorship of Hizballah, Syria of various Palestinian groups, and the Taliban of al-Qa'ida. This analysis yields propositions about the conditions under which states are likely to delegate to terrorist groups and specific recommendations on how principal-agent problems of these illicit relationships may be used in practice to combat terrorism.  相似文献   
2.
3.
Many scholars are drawn to political science research with hopes that their ideas will influence important policy debates. Unfortunately, scholars who want to shape policy often do not design research appropriately or take advantage of available conditions and opportunities to advance their ideas. This article identifies the conditions under which ideas of academics—and nongovernment knowledge in general—are more likely to be considered by and influence those in the policy world. To reach beyond the ivory tower, we argue that scholars should design research that might produce actionable findings and recommendations, identify moments of ripeness in policy debates, and inject their ideas into the policy process. For those who want to conduct rigorous academic scholarship and influence real-world debates, we provide the strongest possible encouragement and hope that our advice proves helpful.  相似文献   
4.
This article examines Israel's attempts to weaken and defeat the Lebanese Hizballah. It reviews Hizballah's rise after the 1982 Israeli invasion of Lebanon, Hizballah's successful effort to force Israeli forces to withdraw from Lebanon in 2000, the 2006 war, and Israeli attempts to deter Hizballah. The article argues that Israel has largely failed to defeat Hizballah militarily and politically. Israel's experience offers lessons for how terrorist groups learn, the effectiveness of terrorist attrition strategies against casualty-sensitivity states, the difficulties in coercing terrorist groups, and the importance of an information strategy. Finally, Israel's clash with Hizballah indicates the importance of thinking of groups that are large and multi-faceted from a counterinsurgency paradigm.  相似文献   
5.
The article examines Israel's successes and failures during the Second Intifada. It argues that Israel's advances came from an effective counterterrorism campaign involving a mix of military operations, defensive measures, and in particular improved intelligence gathering. Domestic resilience also proved strong in the face of a brutal terrorism campaign. Yet long-term victory remains elusive for Israel. Deterrence, always difficult against terrorist groups, is growing harder for Israel. Hamas's control of Gaza, and the mistrust and hatred sown during the Second Intifada, have hindered a political deal between Israel and moderate Palestinians. Much of what went into successful counterterrorism, notably the security barrier and the aggressive campaign of raids and arrests, does not jibe with most visions of what peace would look like and makes a deal harder to achieve. To make a peace deal work, Israeli counterterrorism must change, with measures including relocating parts of the security barrier, bolstering moderate Palestinian politicians, and working with, as opposed to undermining, Palestinian security forces in the West Bank.  相似文献   
6.
Daniel Byman 《安全研究》2013,22(4):599-643
This article examines whether the outbreak of an insurgency after the U.S. invasion of Iraq was an avoidable policy failure or whether the structural conditions surrounding the occupation made such an outbreak inevitable. Several U.S. policy mistakes, in particular the deployment of too few troops, a lack of comprehensive political and military planning for the occupation, disbanding the Iraqi military, the failure to establish a government in waiting, and overly aggressive de-Baathification, greatly exacerbated rather than ameliorated the various structural problems. More fundamentally, structure and policy choices interacted at all levels to explain the Iraq failure. The unavoidable conditions that coalition forces encountered in Iraq—a divided society devastated by years of war, sanctions, and misrule—and the political context in the United States made the challenge for successful policy execution difficult. This structure constrained and delimited the options open to U.S. policy makers but, even within those narrow limits, the United States made many bad choices that further diminished the chances of success.

A particularly important series of policy mistakes occurred well in advance of the buildup to war itself. The orientation of the U.S. armed forces away from counterinsurgency, the failure to establish a political settlement before invasion, and other controllable policy choices in the prewar period all led to enormous difficulties during the occupation itself. Thus, by the time of the invasion, these policy choices had become almost like structural constraints and the failures had a snowballing effect, making policy corrections far more difficult.  相似文献   
7.
8.
ABSTRACT

Jihadist foreign fighters are frequently described as non-state actors whose prominence challenges the traditional, state-dominated international system and our understanding of it. In practice, however, foreign fighters rely heavily on the very states they reject. Some of the most important foreign fighter movements in the world today receive massive and explicit state support, while still others rely on states to tolerate their fund-raising, transit, recruitment, and other core activities. Yet the scope, scale, and nature of this reliance varies tremendously, as does its overall impact. To stop or at least limit these flows, it is vital to change the policies and capacities of these state backers.  相似文献   
9.
10.
Daniel Byman 《安全研究》2014,23(3):431-470
Drawing on organization theory, this article argues that al Qaeda seeks affiliates to expand the scope and scale of its operations, gain the benefits of greater local expertise, better spread innovations, and―most important―endow itself and its mission with greater legitimacy. The conventional wisdom on al Qaeda affiliates emphasizes these benefits and thus paints affiliation as a tremendous boon to al Qaeda that magnifies the danger of terrorism. However, al Qaeda faces a host of problems related to delegation and integration, and often affiliation is a net loss. Divergent preferences and priorities, branding problems, shirking at the local level, adverse selection, and costly control mechanisms all make affiliates of questionable value to the core organization. Although the danger al Qaeda poses may have morphed with the core declining and the affiliates rising in importance, the broader movement is probably less dangerous than it was when the al Qaeda core was at its height. US counterterrorism often magnifies these integration problems and, if done well, can further induce friction, discredit the brand, and otherwise throw sand in the gears. The broader study of al Qaeda and its affiliates also offers insight into the study of organizations in general.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号