首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

2.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   

3.
A cost–benefit analysis of terrorist attacks is developed and placed within a systematic theoretical structure. For the target or object of the attack, we consider the lost value of human lives, lost economic value, and lost influence value, counted as benefits for the terrorist. The corresponding losses for the terrorist are counted as costs. The terrorist attacks if benefits outweigh costs. Bounded rationality is enabled where the three kinds of benefits and costs can be weighted differently. We account for two ex ante probabilities of successful planning and attack, and enable the terrorist to assign different weights to its multiple stakeholders. We introduce multiple time periods, time discounting, attitudes towards risk, and subcategories for the benefits and costs. The cost–benefit analysis is illustrated with the 11 September 2001 attack, and 53 incidents in the Global Terrorism Database yielding both positive and negative expected utilities. The paper is intended as a tool for scientists and policy-makers, as a way of thinking about costs and benefits of terrorist attacks.  相似文献   

4.
ABSTRACT

In recent years, an upward trend in terrorist attacks has mirrored an increase in suicide attacks. According to our preliminary analysis, the events of September 11th marked a sea change in the number of terrorist attacks. While a rich literature has evaluated why terrorists participate in suicide attacks, none have considered the uptick in volume after 9/11, and fewer yet have considered how female fighters may be contributing to this. We evaluate how both structural and female-specific factors affect the likelihood of female fighter suicide attacks. Recent literature discovered a trend in terrorist groups using females as suicide bombers due to cultural norms that permit them to get closer to targets. We test our theory using data from the Chicago Project on Security and Threats Suicide Attack Database (CPOST-SAD) and various datasets from the Quality of Government (QOG) compendium for the 1986–2016 time period. We construct a series of models that consider both female-specific and structural factors that could explain variation in the number of female suicide attacks. Our results indicate that our models encompass relatively stable patterns. Female political empowerment, female educational attainment, and female employment rates are significant and positive in our post-9/11 models, indicating that they may increase female suicide attacks. Democracy is a relevant structural factor and generally yields a positive effect on female suicide attacks across both time periods and multiple models. Ethnic fractionalization is significant in both time periods but yields a negative effect before 9/11 and a positive effect in the later period.  相似文献   

5.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   

6.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

7.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

8.
空中恐怖袭击具有突然性和随意性的特点,其目的是通过制造恐怖事件引起巨大影响,带来社会恐慌。通过分析空中恐怖袭击对袭击目标选择的特点,剖析其规律性,从而建立空中反恐保卫目标重要度指标体系和保卫目标重要度评价模型,对保卫目标进行科学有效地划定与排序,便于在空中反恐作战中对保卫目标及早进行确定、实施空中警戒范围划定和战斗部署。  相似文献   

9.
Abstract

A tremendous amount of important work has been done recently on operationalising the protection of civilians as a military task. The bulk of the discussion has focused on how militaries should respond to direct attacks on civilians. This is an important issue, but thinking about civilian protection should also include a serious examination of the ways in which the approach of military organisations to the problem of ‘spoiler’ groups can affect the level and dynamics of attacks on civilians – importantly, where armed groups are interested in violent control of civilian populations, attempts to ‘dislodge’ them from areas of control may substantially increase the level of violence against civilians (beyond the dangers to be expected from being near areas where active fighting is taking place). In 2009, the United Nations mission in the Democratic Republic of Congo (MONUC) supported the Congolese military in operations to dismantle the Hutu-dominated FDLR (Forces Démocratiques de Libération du Rwanda, Democratic Forces for the Liberation of Rwanda) militia group, at massive human cost. Critics have primarily focused on MONUC's failure to protect civilians from direct attack, consonant with the general discourse on tactics for civilian protection. These criticisms are valid, but in this paper I argue that two crucial additional considerations should be kept in mind: the way that military operations can affect violence against civilians, and the way that moralising the approach to armed groups, even those which have committed serious abuses, can limit military and political options – potentially in ways that increase civilian risk in the name of protecting them.  相似文献   

10.
ABSTRACT

U.S. military aid provides recipient governments the fighting capability they require to undermine domestic militant groups, which can undermine groups’ leadership structures and trigger group splintering. In this environment, brutal attacks against non-combatants become an effective mechanism for targeted groups to signal their resolve and outbid competitors. A large-n analysis of U.S. military aid between 1989 -2011 links higher levels of military aid with higher levels of rebel-perpetrated civilian killings, and deaths due to explosive attacks on non-combatant targets. A closer examination of the case of Pakistan sheds further light on the underlying causal mechanisms.  相似文献   

11.
This study explores the correlates of perceived insecurity among the households in Pakistan. For this purpose, data from the third round of Pakistan Panel Household Survey are merged with terrorist incidents taken from Global Terrorism Database. The results illustrate that objective risk, signified by violence in the district of residence, and victimization play an important role in the formation of perceived insecurity. Moreover, males and residents of rural areas feel more insecure than females and urban residents, respectively. Furthermore, spatial variation in violence indicates that terrorist attacks in the first-order contiguous districts (i.e. the immediate neighbors) are also associated with subjective insecurity. These are crucial findings because behavioral changes, such as perceived insecurity, could force the households to make suboptimal investment decisions. More importantly, since changes in behavioral parameters may be highly persistent, this study cautions that violence in Pakistan may have potentially long-term impacts on social welfare.  相似文献   

12.
Purchased materials often account for more than 50% of a manufacturer's product nonconformance cost. A common strategy for reducing such costs is to allocate periodic quality improvement targets to suppliers of such materials. Improvement target allocations are often accomplished via ad hoc methods such as prescribing a fixed, across‐the‐board percentage improvement for all suppliers, which, however, may not be the most effective or efficient approach for allocating improvement targets. We propose a formal modeling and optimization approach for assessing quality improvement targets for suppliers, based on process variance reduction. In our models, a manufacturer has multiple product performance measures that are linear functions of a common set of design variables (factors), each of which is an output from an independent supplier's process. We assume that a manufacturer's quality improvement is a result of reductions in supplier process variances, obtained through learning and experience, which require appropriate investments by both the manufacturer and suppliers. Three learning investment (cost) models for achieving a given learning rate are used to determine the allocations that minimize expected costs for both the supplier and manufacturer and to assess the sensitivity of investment in learning on the allocation of quality improvement targets. Solutions for determining optimal learning rates, and concomitant quality improvement targets are derived for each learning investment function. We also account for the risk that a supplier may not achieve a targeted learning rate for quality improvements. An extensive computational study is conducted to investigate the differences between optimal variance allocations and a fixed percentage allocation. These differences are examined with respect to (i) variance improvement targets and (ii) total expected cost. For certain types of learning investment models, the results suggest that orders of magnitude differences in variance allocations and expected total costs occur between optimal allocations and those arrived at via the commonly used rule of fixed percentage allocations. However, for learning investments characterized by a quadratic function, there is surprisingly close agreement with an “across‐the‐board” allocation of 20% quality improvement targets. © John Wiley & Sons, Inc. Naval Research Logistics 48: 684–709, 2001  相似文献   

13.
Abstract

The current field study used unique data collected in Israel in July 2014, during a military operation that the Israel Defence Forces (I.D.F.) conducted in the Gaza Strip, in reaction to the thousands of missiles launched from there into Israel. During this operation, the new Iron Dome anti-missile defence system was used to protect Israelis exposed to missile attacks. The study examined factors that correlate with decisions to comply with I.D.F. defence instructions regarding behaviour during missile attacks. In addition, the study examined the relationship between attitudes towards the Iron Dome technology and emotions, risk perceptions, and the decision to comply with I.D.F. defence instructions. The results indicate that stronger positive opinions towards Iron Dome were correlated with lower levels of fear and anger, and beliefs that participant’s chances of being injured by a missile were lower than they had been during previous military operation. In addition, better compliance with I.D.F. defence instructions correlated with being more fearful, angrier at Hamas, living closer to Gaza Strip, and having more positive opinions about Iron Dome. The findings also indicate gender differences with respect to factors correlated with risk perceptions, opinions regarding Iron Dome, and precautionary actions during attacks.  相似文献   

14.
Abstract

In this research, we analyzed how Turkish financial markets and foreign investors in the stock market reacted to the terror attacks in Turkey. Our analysis, which was performed using the terror index for the stock market and the foreign exchange market, revealed that returns, abnormal returns, and cumulative abnormal returns were not affected by the terror attacks; however, foreign investors in the stock market were affected. When the geographic regions of the terror attacks were analyzed, the findings showed that foreign investors were negatively affected mainly by the terror attacks that occurred in southeast Anatolia. Attack type and target type were important only for foreign investors. An evaluation of the interaction between the terror attacks and the markets with the involvement of the terrorist organizations indicated that only the foreign investors in the stock market were affected by Al-Qaeda and PKK-linked terror attacks. An evaluation of the effect of terror attacks in foreign countries on Turkish financial markets revealed no effect on the domestic stock market and foreign exchange markets. We also examined the volatility spillovers from the terror index to the stock market and found that terrorist attacks increased the volatility of the stock market.  相似文献   

15.
低慢小无人机具有小型化、红外与雷达暴露征候小、飞行高度低、飞行轨迹不定以及购买使用几乎无门槛等特征,给当前全球军事区域和军事行动安全带来了新的挑战。本文首先分析了世界主要国家对低慢小无人机的界定、国内外管控情况和相关威胁事件;然后,从低慢小无人机的侦察袭击能力、军事区域现有安防措施和低慢小无人机对军事区域进行侦察的相关案例入手,讨论了低慢小无人机对军事区域的侦察袭击的威胁;最后从政策制度、营区部署与隐蔽伪装以及反制措施配置三方面对军事区域防低慢小无人机侦察袭击的手段与措施进行了分析和研究,重点就机动性、经济性、技术难度、可操作性、反应速度、打击效果、能否对抗集群目标以及适用场合等方面对当前各种反无人机的干扰、驱离、毁坏措施进行了对比。  相似文献   

16.
A new technique for solving large‐scale allocation problems with partially observable states and constrained action and observation resources is introduced. The technique uses a master linear program (LP) to determine allocations among a set of control policies, and uses partially observable Markov decision processes (POMDPs) to determine improving policies using dual prices from the master LP. An application is made to a military problem where aircraft attack targets in a sequence of stages, with information acquired in one stage being used to plan attacks in the next. © 2000 John Wiley & Sons, Inc., Naval Research Logistics 47: 607–619, 2000  相似文献   

17.
This study examines whether the exclusion of ethnic groups from political power is an important contributing factor to domestic terrorism. To empirically test this question, we employ a negative binomial regression estimation on 130 countries during the period from 1981 to 2005. We find that countries in which certain ethnic populations are excluded from political power are significantly more likely to experience domestic terrorist attacks and to suffer from terrorist casualties; furthermore, ethnic group political exclusion is a more consistent and substantive predictor of domestic terrorist activity than general political repression or economic discrimination.  相似文献   

18.
This paper presents an extension of gold-mining problems formulated in earlier work by R. Bellman and J. Kadane. Bellman assumes there are two gold mines labeled A and B, respectively, each with a known initial amount of gold. There is one delicate gold-mining machine which can be used to excavate one mine per day. Associated with mine A is a known constant return rate and a known constant probability of breakdown. There is also a return rate and probability of breakdown for mine B. Bellman solves the problem of finding a sequential decision procedure to maximize the expected amount of gold obtained before breakdown of the machine. Kadane extends the problem by assuming that there are several mines and that there are sequences of constants such that the jth constant for each mine represents the return rate for the jth excavation of that mine. He also assumes that the probability of breakdown during the jth excavation of a mine depends on j. We extend these results by assuming that the return rates are random variables with known joint distribution and by allowing the probability of breakdown to be a function of previous observations on the return rates. We show that under certain regularity conditions on the joint distributions of the random variables, the optimal policy is: at each stage always select a mine which has maximal conditional expected return per unit risk. This gold-mining problem is also a formulation of the problem of time-sequential tactical allocation of bombers to targets. Several examples illustrating these results are presented.  相似文献   

19.
Abstract

We use the k-th-order nonparametric causality test at monthly frequency over the period of 1985:1 to 2016:06 to analyze whether geopolitical risks can predict movements in stock returns and volatility of 24 global defense firms. The nonparametric approach controls for the existing misspecification of a linear framework of causality, and hence, the mild evidence of causality obtained under the standard Granger tests cannot be relied upon. When we apply the nonparametric test, we find that there is no evidence of predictability of stock returns of these defense companies emanating from the geopolitical risk measure. However, the geopolitical risk index does predict realized volatility in 50% of the companies. Our results indicate that while global geopolitical events over a period of time is less likely to predict returns, such global risks are more inclined in affecting future risk profile of defense firms.  相似文献   

20.
The incessant bomb attacks by the Niger Delta militants and Boko Haram elements among other popular movements, against the people and government targets, have unmistakably put Nigeria on the global terrorist nations’ map. The grievances of these groups which are political, economic and religious may not be unconnected from the design and operation of the federation; this paper thus examines the constitutional provisions, and political and economic attributes, of the Nigerian federation in the Fourth Republic with a view to discovering why a mechanism put in place with the objective of achieving interethnic unity, democratic stability and socio-economic development has worked to enthrone crisis, violence and disintegrative tendencies in the country. This paper argues that the current reign of terror is a manifestation of a more serious de-linkage and inconsonance between the state and the people, with popular movements providing an alternative platform for spaces, voices and benefits from the streets and away from the state. The paper concludes that the hope for federal renewal lies in the ability of the current handlers of the Nigerian statecraft to marry decentralist constitutional reforms with an agenda for mass-based socio-economic development of the country.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号