首页 | 本学科首页   官方微博 | 高级检索  
     

自杀性恐怖主义的行动模式 及其根源
引用本文:谢 磊. 自杀性恐怖主义的行动模式 及其根源[J]. 国际安全研究, 2014, 0(6): 129-150
作者姓名:谢 磊
摘    要:作为恐怖组织常用的一种行动模式,自杀性恐怖主义在历史上就长期存在,尤其是九一一事件的发生,更使得自杀性恐怖主义成为恐怖组织在恐怖袭击中惯用的一种手段。相比其他形式的恐怖袭击,自杀性恐怖主义具有简单、廉价、机动性强、引起的社会恐慌大以及造成的人员伤亡严重等特征。自杀性恐怖主义在世界多地都已经发生过,被各种类型的恐怖组织广泛使用,针对的对象多样化,并且具有相对固定的行动流程。目前学术界从个体、组织、社会、文化和环境等方面对于自杀性恐怖主义的产生原因进行了分析。从个体的角度来看,一个人是否愿意进行自杀性恐怖袭击,最为重要的是当事人的理性计算,即个人通过自杀性恐怖袭击获得的好处是否能为自己带来更大的个人收益、是否可以增进家庭的福利、是否可以增加所在共同体的利益。在未来的反恐与应对中,国际社会可以通过增强重要设备的科技含量、增加双方对话与谈判的可能性、加强公共外交的力度、增进各国间的相互合作等方式以应对自杀性恐怖主义威胁。

关 键 词:自杀性恐怖主义;层次分析;恐怖主义根源;反恐对策
收稿时间:2014-07-23
修稿时间:2014-08-21

The Modes of Action and Sources of Suicide Terrorism
XIE Lei. The Modes of Action and Sources of Suicide Terrorism[J]. Journal of International Security Studies, 2014, 0(6): 129-150
Authors:XIE Lei
Abstract:As an often used mode of actions for terrorist organizations, suicideterrorism, with its long history, has reached its apex in the modern times afterSeptember 11. Compared with other forms of attack, suicide terrorism has its owndistinctive features - easy operation, low cost, high mobility, large social panic andhigh ratio of casualties. It has befallen many parts of the world and was used bydifferent types of terrorist organizations, sometimes with diversified targets andrelatively fixed operational procedures. So far, the causes of suicide terrorism havebeen analyzed from the levels of the individual, organizations, society, culture,environment, etc. From the individual level, a person makes the decision to commit asuicide attack through a rational calculation of the improvement in personal benefit,family welfare, and gains for his community his death could bring. The possiblecountermeasures for the international community to fight suicide terrorism in thefuture are (1) improve the technological level of key facilities, (2) enhance politicaltolerance, (3) strengthen public diplomacy, and (4) promote international cooperation.
Keywords:suicide terrorism   level analysis   sources of terrorism   counter terrorism
点击此处可从《国际安全研究》浏览原始摘要信息
点击此处可从《国际安全研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号