首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 953 毫秒
1.
This paper models transnational terrorism as a three‐way strategic interaction involving a government that faces armed opposition at home, which may spill over in the form of acts of terrorism by the state's opponents against the government's external sponsor. The external sponsor also utilises deterrence against potential terrorists, which only lowers terrorism if terrorists are not intrinsically motivated by a deep‐seated sense of humiliation. The model highlights the importance of intrinsic motivation. A rise in the external power's preference for deterrence against terrorism may backfire in these circumstances. Increases in the government's military efficiency against the rebels, who are also terrorists against the government's sponsor, raises overall levels of violence.  相似文献   

2.

In this paper we evaluate what terrorism policies have worked best in handling the Spanish ETA terrorism using time series data from 1968 to 2000. We consider the political, deterrence and economic effects, and conclude that their influence on terrorism incidents is mixed. A parsimonious model shows that the behaviour of different terrorism incidents is distinct and the lagged effect is a primary concern. A policy to manage this case is devised.  相似文献   

3.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society.  相似文献   

4.
Abstract

In spite of government counter-terrorism expenditure and efforts, the incidence of terrorism in Nigeria appears to be rising. This paper examines the growth and fiscal consequences of terrorism in Nigeria by estimating the terrorism–macroeconomy relation using different measures of terror incidence. The results show that terrorism has an economically and statistically significant negative impact on growth; although this impact is considerably small and short-lived, manifesting only after a lag of about three years. Specifically, the cost of terrorism to Nigeria, in terms of lost GDP per annum, is estimated at 0.82%. Moreover, there is evidence that terrorism leads to the reallocation of economic activity away from private investment spending to government spending; that is, terrorism crowds out investment at a higher rate than its potential to crowd in government spending. Lastly, terrorism alters the composition of government expenditure – with the defence component of government expenditure rising vis-a-vis other expenditure items. The results are robust to allowing for dynamic interactions between terrorism and macroeconomic aggregates.  相似文献   

5.
This article first looks at the relationship between international terrorism and terrorism in Africa. Since sub-state terrorism is already endemic to Africa, the future threat potential in the continent lies in a complex mixture of sub-national and international terrorism. Africa may come to play a central role in international terrorism. The motivation, means and targets all exist and these opportunities will not go unheeded for much longer. Africa presents both a facilitating environment and a target-rich environment for terrorists that seek to attack the United States, and indeed the global system. The article concludes with some remarks on counter-strategies.  相似文献   

6.
ABSTRACT

What happens when the world’s ‘oldest profession’ interacts with history’s oldest form of war? In the Horn of Africa, a symbiotic relationship between prostitutes and terrorists has emerged, illuminating critical information about the group’s ideology and strategy. In this article, we argue that al-Shabaab’s differential treatment of Somali and other East African women reveals the group’s strategic focus on Somalia, despite its claims to be a globally focused Islamic extremist organization. Through original ethnographic fieldwork in Kenya, the authors explore al-Shabaab’s deliberate relationships with different groups of women and explain how this helps scholars better understand the group. This article suggests the next phase of scholarship on gender and terrorism, encouraging scholars not only to pay attention to the relationship between women and terrorist groups, but to also examine the nuanced relationships between different categories of women and terrorist groups.  相似文献   

7.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of States and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   

8.
Ian Bellany, an Emeritus Professor of Politics at Lancaster University, died in July 2011 at the age of 70, after a long and painful struggle with myelofibrosis, a rare and invariably terminal blood cancer. Between early 2009 and August 2010, under contract to Hurst & Co., he worked intermittently on a book about nuclear terrorism, which he provisionally entitled Before the Storm. The editor and I are grateful to Michael Dwyer at Hurst & Co. for releasing the draft. What is published here is an edited version of that draft. It may seem presumptuous to speak for Ian, but I am sure he would also have liked to thank the doctors and nurses of the NHS Morecambe Bay Universities Hospital Trust, whose skill, knowledge, and flair for improvisation kept him alive and writing for much longer than anyone expected. Alastair Bellany, Rutgers University, New Jersey, USA.
In the past, terrorists have tended to eschew acts of extreme violence for fear of alienating those whom they wish to persuade and attract to their cause. The first to discard this philosophy was the Aum group in Japan, which sought to use anthrax and acquire a nuclear weapon. Since then, attitudes have changed, spurred on by the impact on public perception of the successful Al Qaeda 9/11 attack on New York and Washington. By crossing the line between moderation and extreme violence, terrorist groups retain one valuable capability: they are much less easily deterred and have few inhibitions. This article considers the three nuclear options open to terrorists – produce a radiological contaminant bomb; build a nuclear bomb; or steal or get given a nuclear device. It examines the possibilities and probabilities of each option and considers how the implementation of the Nuclear Non-proliferation Treaty (NPT) provisions might impose some constraints on terrorists’ nuclear ambitions. By examining the doubtful nuclear security practices of different states and providing statistical evidence of an increase in levels of international terrorist violence, this article points to determined terrorists in time acquiring the means to acquire one or other variants of a nuclear weapon. It concludes that it is not a matter of “if” but “when.”  相似文献   

9.
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants.  相似文献   

10.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of states and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   

11.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   

12.
Security measures are said to increase the price of terrorism. This price has not been hitherto defined in an economically meaningful way. This paper provides a precise definition by treating the terrorists’ resource endowment as a parcel of contingent claims to political influence with a price equal to the summed value of those contingent claims in potential states of the world. Equipped with this definition, an equilibrium model of the price of terrorism is deployed. Important insights are gained into the effect of terrorists’ risk aversion at the level of the price of terrorism in different states of the world and the theoretical conclusion is reached that higher security is associated with a lower price of terrorism rather than a higher price. The implications for policy are discussed.  相似文献   

13.
ABSTRACT

In No Use: Nuclear Weapons and U.S. National Security Policy, Thomas M. Nichols calls for a constructive rethinking about the history of nuclear weapons and the attitudes that have grown up around them. Despite dramatic reductions since the end of the Cold War, the United States still maintains a robust nuclear triad that far exceeds the needs of realistic deterrence in the twenty-first century. Nichols advocates a new strategy of minimum deterrence that includes deep unilateral reductions to the US nuclear arsenal, a no-first-use pledge, withdrawing US tactical nuclear weapons from Europe, and ending extended nuclear deterrence for allies. The weakest part of his argument eschews nuclear retaliation against small nuclear states that attack the United States, opting instead to use only conventional weapons to guarantee regime change. He admits this will entail enormous cost and sacrifice, but cites the “immorality” of retaliating against a smaller power with few targets worthy of nuclear weaponry, which totally ignores the massive underground facilities constructed to shield military facilities in many of these states. Despite this, Nichols's thoughtful approach to post-Cold War deterrence deserves thoughtful consideration.  相似文献   

14.
随着各国加强对空中和陆地恐怖主义的防控,恐怖主义把视角转向海上。海上恐怖主义具有事件的突发性、手段的多样性、处置的复杂性等特点。边防海警部队参与海上反恐作战有利于取得海上反恐斗争的胜利,有利于掌握海上反恐主动权,有利于顺应国际海上反恐斗争的形势。针对海上恐怖主义的特点,边防海警部队应做到以下几点:一是平时反恐作战准备应具有超前性,二是参与海上反恐作战应体现实效性,三是参与海上反恐作战应把握全局性。  相似文献   

15.
恐怖主义的形成是与社会客观现实紧密联系在一起的,世界多极化、霸权主义、经济全球化、宗教文化冲突、传媒效应等社会现实问题是促使当代恐怖主义形成并迅速发展的根本原因,而这些原因反映出恐怖主义本质上就是一个社会问题。因此,要从根本上消除恐怖主义,必须以解决社会问题的思路来制定相应的对策,才能真正达到“治本”的目的。  相似文献   

16.
Current U.S. nuclear weapons strategy, force structure, and doctrine contribute to the threat of nuclear terrorism in several ways. First, the U.S. nuclear stockpile presents opportunities for nuclear terrorists to seize the materials they need. Second, U.S. nuclear forces remain a key justification for Russia's maintenance of similar nuclear forces that are less well protected. Third, America's continued embrace of nuclear weapons encourages and legitimizes other states to seek nuclear weapons that they will have difficulty securing from terrorists. The national security interests of the United States would be better served by a strategy to shrink the global footprint of nuclear weapons and provide the highest possible levels of security for the most minimal possible deterrent forces. Given the inability to secure nuclear weapons and materials perfectly or to eliminate terrorism in the foreseeable future, reducing the global inventory of nuclear weapons and materials is the most reliable way to reduce the chances of nuclear terrorism.  相似文献   

17.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   

18.
Counter-ideological work is touted as crucial in combating terrorism. This article attempts to analyse the role of counter-ideology in dealing with a particular type of terrorism: Muslim jihadist extremism. This paper reiterates findings from existing research, in arguing that counter-ideology is indispensable for three reasons: firstly, to prevent Muslims from genuinely believing that terrorism is sanctioned by the faith; secondly, it is instructive to assure non-Muslims that Islam per se, is not the problem; and finally, it can be used to ‘rehabilitate’ terrorists who are in detention. However, this paper also suggests four criticisms of many counter-ideological efforts, and posit that in order for such work to be truly effective, the following shortcomings need to be rectified: firstly, the creation of unnecessary frontiers that may alienate potential allies; secondly, the inability to ‘preach to the right crowd’; thirdly, the perils of promoting ‘moderate’ and ‘progressive’ Islam; and finally, credibility issues associated with the people spearheading such works. An underlying factor that lurks in the background of all of these is the role of the ulama, or Islamic religious scholars. This article further hopes to contribute to the literature on counter-terrorism by exercising more scrutiny on the role of the ulama.  相似文献   

19.
1 1This research was funded in part by a grant from the Lowe Institute of Political Economy. The corresponding author is S. Brock Blomerg. We thank Chris Blomberg and Brianna Loyosa for their excellent research assistance on the project. This paper presents an empirical analysis of what drives congressional legislation on terrorism during the period 1995 to 2010. We utilize and augment current methodology to compile and analyze data on sponsorship and cosponsorship of terrorism related data. Our results on the sources of legislation on terrorism are largely in line with past examinations of the importance of committee membership and leadership, party majority-ship, and other political factors. Further, we find that the most significant and robust drive for legislation on terrorism is the September 11th attacks. And while the impact of 9/11 affected legislative productivity everywhere, we find that it most significantly affected states surrounding New York and Washington D.C. Our results indicate that the economy may be one factor motivating politicians to legislate on terrorism; however, these results are not robust.  相似文献   

20.
ABSTRACT

In May 2018, the Basque insurgent group Euskadi Ta Askatasuna (ETA) officially disbanded after a 60-year struggle. This inquiry assesses ETA’s violent campaigns using recent conceptual and theoretical advancements from the field of terrorism studies. Three conclusions concerning the group’s strategies of terrorism are advanced. First, ETA regularly targeted civilians to achieve goals other than coercing the Government of Spain; these objectives included outbidding rival separatist groups and spoiling negotiation processes. Second, ETA’s most rapid period of organizational growth occurred as the result of an aggressive terrorist campaign, demonstrating that civilian targeting can serve as a stimulus to rebel group recruitment. Finally, while terrorism did not advance ETA’s primary political objective of creating an independent Basque state, it did enable the group to assume a leading position within the radical Basque separatist movement, helping extend ETA’s lifespan and making the group an embedded actor within the contentious political processes surrounding the question of Basque self-determination. Collectively, these conclusions support recent theoretical findings arguing that non-state terrorism often enables insurgent groups to prolong their lifespans while paradoxically making it more difficult for them to advance their long-term political objectives.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号