首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
世界政治   1篇
外交国际关系   2篇
  2013年   3篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
For all of their centralized power and undisputed authority, even crisis leaders are susceptible to breakdowns in political communication. This is particularly significant when martial rule or a state of emergency—most effective when of short duration— becomes open‐ended; the sense of urgency no longer prevails.

In the initial stage of proclaiming a constitutional emergency it is perhaps easiest to create an atmosphere of crisis and to promote a collective sense of danger. A climate of national fear and insecurity, in turn, enables the constitutional dictator to mobilize broad support even for draconian measures imposed at the expense of individual freedoms. With the prolongation of the emergency, however, and the institutionalization of crisis government, certain immunities to authoritarianism do begin to surface. As suggested by periods of prolonged emergency rule in India and South Korea, the leader becomes remote and isolated; he or she no longer feels quite so compelled to communicate; domestic opposition increases.

The experience of President Marcos and the Philippines since 1972 illustrates some of the political dynamics of the modern, permanent “emergency state.” What has happened to the New Society program of reforms should help in understanding the critical link of communication between leaders and their followers under conditions of either real or manipulative domestic political stress.  相似文献   
2.
With the advent of social media, terrorist organisations have seized an unprecedented opportunity to engage wider audiences with their ideologies and actions. This study aims to develop an understanding of this tactic by analysing its use in the 2013 Westgate Mall hostage crisis. During that event, the Twitter account @HSMPress_ provided continuous updates supporting the actions of the terrorist organisation Al-Shabaab. Situating the event within a framework of Jürgen Habermas’s theories of the Public Sphere and Andrew Mack’s theories of asymmetric warfare, this paper employs Kenneth Burke’s dramatistic pentad to perform a rhetorical analysis of the tweets using both artistic and inartistic factors. It does so in order to understand how they engaged the audience of the terrorist event, emphasising the performative nature of the text in accordance with behaviourist objectives. The results of this analysis will demonstrate how terrorist groups may use platforms like Twitter to achieve a strategic political goal by shifting viewer perspectives, with significant implications for future policy governing social media content and censorship.  相似文献   
3.
This article analyzes the state of aviation security, beginning with the characteristics of the air transportation system that complicate the achievement of a high level of security. It analyzes the situation that existed prior to 9/11 and then evaluates the changes that have occurred since. It concludes that no overall systematic program has yet been put in place to deal with the threats that terrorism poses to the various elements of aviation. It also argues that aviation security, indeed homeland security, requires incorporating antiterrorism into foreign policy and ongoing attempts to deal with the underlying factors that promote terrorism.‐  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号