首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   

2.
We study the spatial and temporal determinants of terrorism risk in Israel, using a geocoded database of Israeli terrorist attacks from 1949 to 2004. In selecting targets, terrorists seem to respond rationally to costs and benefits: they are more likely to hit targets more accessible from their own homebases and international borders, closer to symbolic centers of government administration, and in more heavily Jewish areas. We also examine the waiting time between attacks experienced by localities. Long periods without an attack signal lower risk for most localities, but higher risk for important areas such as regional or national capitals.  相似文献   

3.
我国反恐怖斗争对策研究   总被引:1,自引:0,他引:1  
随着以美国为首的国际反恐怖战争在全球的迅速展开 ,以基地组织为代表的国际恐怖组织实施恐怖袭击的行动能力受到一定的削弱和限制。但同时 ,在世界各地尤其是中东、中亚等热点地区的恐怖事件却愈演愈烈 ,并且恐怖袭击的目标、采用的方式更趋于多样化、复杂化 ,造成的危害更加严重。  相似文献   

4.
Qualitative studies of terrorist movements frequently highlight the importance of diaspora communities as important factors in producing and sustaining terrorist activity in countries. The underlying theoretical argument is that bifurcation of tight-knit minority communities between countries nurtures separatist or irredentist sentiments among affected community members, thus prompting terrorist activity, while minority community members in other countries might mobilize financial and political resources to support terrorist activity among their compatriots. In this study, we empirically test whether transnational dispersion, versus domestic concentration, of minority communities in countries produces higher incidents of terrorism. Conducting a series of negative binomial estimations on a reshaped database of around 170 countries from 1981 to 2006, derived from the Minorities at Risk database and the Global Terrorism Database, we determine that both transnational dispersion of kin minority communities and domestic concentration of minorities within countries increase terrorism and that transnational dispersion is a particularly robust predictor of terrorist attacks.  相似文献   

5.
The July 2005 terrorist attacks in London demonstrated the resilience of Western society in the face of low-level conventional terrorism. But the psychological damage from the London bombings would likely pale next to the severe, unpredictable, long-lasting effects of a radiological attack. One unique hazard of radiation exposure beyond the obvious physiological effects is that it is colorless, odorless, and tasteless, making it difficult for ordinary citizens to evaluate, quantify, and rationally understand the dangers confronting them. Radiological weapons stand out among the tools available to terrorists for their capacity to inflict far-reaching psychological damage to civilian populaces well beyond the immediate victims. A possible solution to mitigate the psychological consequences is to build a “resilience culture,” an interlocking set of beliefs, attitudes, approaches, and behaviors that help people fare better in any disaster or extraordinary circumstance. The “all-hazards approach,” which emphasizes the identifiable similarities among the “disaster triad”—that is, natural, accidentally man-made, and intentionally man-made disasters—extends to acts of terrorism and could help demystify the fears associated with radiological terrorist weapons.  相似文献   

6.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

7.
This article concerns scheduling policies in a surveillance system aimed at detecting a terrorist attack in time. Terrorist suspects arriving at a public area are subject to continuous monitoring, while a surveillance team takes their biometric signatures and compares them with records stored in a terrorist database. Because the surveillance team can screen only one terrorist suspect at a time, the team faces a dynamic scheduling problem among the suspects. We build a model consisting of an M/G/1 queue with two types of customers—red and white—to study this problem. Both types of customers are impatient but the reneging time distributions are different. The server only receives a reward by serving a red customer and can use the time a customer has spent in the queue to deduce its likely type. In a few special cases, a simple service rule—such as first‐come‐first‐serve—is optimal. We explain why the problem is in general difficult and we develop a heuristic policy motivated by the fact that terrorist attacks tend to be rare events. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   

8.
A cost–benefit analysis of terrorist attacks is developed and placed within a systematic theoretical structure. For the target or object of the attack, we consider the lost value of human lives, lost economic value, and lost influence value, counted as benefits for the terrorist. The corresponding losses for the terrorist are counted as costs. The terrorist attacks if benefits outweigh costs. Bounded rationality is enabled where the three kinds of benefits and costs can be weighted differently. We account for two ex ante probabilities of successful planning and attack, and enable the terrorist to assign different weights to its multiple stakeholders. We introduce multiple time periods, time discounting, attitudes towards risk, and subcategories for the benefits and costs. The cost–benefit analysis is illustrated with the 11 September 2001 attack, and 53 incidents in the Global Terrorism Database yielding both positive and negative expected utilities. The paper is intended as a tool for scientists and policy-makers, as a way of thinking about costs and benefits of terrorist attacks.  相似文献   

9.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   

10.
生化恐怖袭击及其应对策略   总被引:1,自引:0,他引:1  
本文指出了生化恐怖活动发展的历史趋势、分析了大规模生化恐怖活动兴起的原因 ,并分析了恐怖分子获得生化武器的可能性 ,对于可能发生的大规模生化恐怖活动提出了的应对策略  相似文献   

11.
境外反恐行动在国际上已有大量先例,对于一个境外目标面临恐怖威胁或遭受恐怖袭击的国家,是不容回避的现实问题。通过对境外反恐行动产生的根源、各国境外反恐的对策、采取的方式及其制约因素的综合分析,能够得出有益的启示。反恐怖斗争的严峻现实和发展趋势,要求我们探索境外反恐对策,切实保护国家利益和人民生命财产安全,同时为国际反恐斗争作出应有的贡献。  相似文献   

12.
This paper presents a game‐theoretic model of suicide terrorism containing three agents: the terrorist leader; a targeted government; and potential terrorist supporters. Supporters join the terrorist group if they gain more from their participation than from their economic opportunities. Preemptive measures by the government can result in a backlash that encourages recruitment through new grievances. Suicide attacks can also lead to recruitment. Increases in preemption costs and/or economic opportunities can reduce the overall level of terrorism, while increasing the proportion of suicide to normal attacks. An increase in the effect of preemption on recruitment, or the propaganda effect of suicide bombings has the opposite effect of increasing normal and suicide attacks, but decreasing the proportion of suicide to normal attacks in the terrorist organization’s strategy profile.  相似文献   

13.
Using a time series method called ‘transfer function’, this paper examines the effect of terrorism on tourism in Turkey. The results indicate that there exists a negative but small impact of terrorism, which is observed within approximately one year. However, terrorist attacks in Turkey have accounted for a reduction of six million foreign tourists over the last nine years. Moreover, the economic cost of terrorism in the tourism industry was more than $700 million in 2006. However, terrorist attacks in continental Europe and America, and an active war involving a neighboring country, had no effects on tourism in Turkey.  相似文献   

14.
The present article aims at investigating the causal relationship between defense spending and terrorism in Turkey using the Autoregressive Distributed Lag (ARDL) bounds testing procedure and Granger‐causality analysis. The findings reveal that there exists a unidirectional causality running form terrorist attacks to defense spending as expected, but not vice versa. In the light of this finding it can be inferred that military anti‐terrorism measures alone are not sufficient to prevent terrorism.  相似文献   

15.
This study examines whether the exclusion of ethnic groups from political power is an important contributing factor to domestic terrorism. To empirically test this question, we employ a negative binomial regression estimation on 130 countries during the period from 1981 to 2005. We find that countries in which certain ethnic populations are excluded from political power are significantly more likely to experience domestic terrorist attacks and to suffer from terrorist casualties; furthermore, ethnic group political exclusion is a more consistent and substantive predictor of domestic terrorist activity than general political repression or economic discrimination.  相似文献   

16.
September 11 2001 has put the spotlight on terrorism, and it has been at the apex of the international security agenda ever since. Politicians, lawmakers, scholars and others have been debating the meaning and definition of terrorism for many years. Numerous myths and misconceptions persist on this highly debated issue. With the aid of historical case studies, this article aims to demonstrate how broad a concept terrorism has become. It focuses on its subjective and value-laden interpretation and hence the difficulty of arriving at a universally acceptable definition. The author introduces the concept of ‘colonial terror’, which depicts a distinct form of state terrorism perpetrated during the colonial and post-colonial periods. Like many before her, the author concludes that the definition and meaning of terrorism lie in the eye of the beholder.

There are two ways to approach the study of terrorism. One may adopt a literal approach, taking the topic seriously, or a propagandistic approach, construing the concept of terrorism as a weapon to be exploited in the service of some system of power. In each case it is clear how to proceed. Pursuing the literal approach, we begin by determining what constitutes terrorism. We then seek instances of the phenomenon—concentrating on major examples, if we are serious—and try to determine causes and remedies. The propagandistic approach dictates a different course. We begin with the thesis that terrorism is the responsibility of some officially designated enemy. We then designate terrorist acts as ‘terrorist’ just in the cases where they can be attributed (whether plausibly or not) to the required source; otherwise they are to be ignored, suppressed or termed ‘retaliation’ or ‘self-defence’. (Noam Chomsky)  相似文献   

17.
Using the ITERATE dataset, we explore the origins of transnational terrorist activity, from 1982 through 1997, in 118 countries. We model terrorism, not as a function of a nation’s ethnic, religious or linguistic fractionalization, but as an independent measure of perceived ethnic tensions. When we control for institutional quality, evidence that political rights and civil liberties mitigate the terrorism‐producing effects of ethnic tensions exists only since 1990. Economic freedoms, on the other hand, robustly reduce the number of terrorist attacks originating in ethnically tense societies.  相似文献   

18.
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones.  相似文献   

19.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society.  相似文献   

20.
NEW TERRORISM     
New or contemporary international terrorism associated with Islamic fundamentalism and the struggle against Zionism and American interests is a recent phenomenon in Kenya, different to that experienced during the struggle against colonialism. Many explanations have been offered as to why Kenya is being targeted, but have not sufficiently explored its close relationship with the West—especially Britain and the United States, the perceived connection between Israel and the former Presidency of Daniel Arap Moi, domestic forces and government policy. Externally the most important explanations for the increase in regional terrorism are the three waves of global terrorism since 1967, the most recent and significant of which is associated with Osama bin Laden and the Palestinian Intifada. These events reverberated in the region, Sudan and Somalia in particular, but also internally. Both internal and external attribution factors explain the resurgence of new terrorism in Africa. In the case of Kenya, terrorist attacks are associated with the country's internal domestic processes and a naïve approach to broader international issues.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号