首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   0篇
  2019年   3篇
  2018年   5篇
  2017年   6篇
  2016年   5篇
  2014年   4篇
  2013年   52篇
  2012年   2篇
排序方式: 共有77条查询结果,搜索用时 15 毫秒
31.
Developing literature on Operation Banner, the codename for the British military operation in Northern Ireland, has indicated that the conduct of soldiers deployed was not always in line with principles of minimum force. Adherence to these principles would seem to have been essential to the success of the operation given the initial deployment of the soldiers was in the role of military aid to the civil power. This article will examine the role of one of the British Army’s most aggressive units, the Parachute Regiment, and will show how the responses of the regiment to the demands of the operation in Northern Ireland were frequently in contravention of minimum force principles.  相似文献   
32.
While terrorist and insurgent groups have often combined anti-state subversion with ‘purely‘ criminal activities in order to obtain the financial means to wage their ideological struggle, little is known about the transformation of such groups into non-ideological organised crime groups (OCG) with close links to authorities. This holds particularly for jihadist groups that have on ideological grounds ruled out collaboration with their archenemies – ‘infidels’ and ‘apostates’. Using unique ethnographic data from Russia’s Dagestan, this article explores the causes and contexts of the gradual transformation of some of Dagestan’s jihadist units – jamaats – into organised crime groups collaborating with local authorities.  相似文献   
33.
This study examines the unintended consequences of decapitation strategies. Two Islamist terror networks in Spain have been used to critically evaluate theories of leadership removal guided by large-N cross-sectional research. Arguably, current models neglect to include relational variables that constitute the foundation for policies of network disruption. Spanish terror networks are mapped out over a 10-year period (1995–2004) to demonstrate the importance of network variables. Policies meant to disrupt militant networks can generate unintended consequences, as was the case with Spain’s Operation Dátil following the 9/11 attacks on the Twin Towers and the Pentagon in the United States. The Madrid train bombing network developed in the vacant political space following the counterterrorism operation that targeted radical Islamists in Spain.  相似文献   
34.
For six years, India has sought to implement an army doctrine for limited war, ‘Cold Start’, intended to enable a Cold War era force optimised for massive offensives to operate under the nuclear threshold. This article asks whether that is presently feasible, and answers in the negative. Doctrinal change has floundered on five sets of obstacles, many of which are politically rooted and deep-seated, thereby leaving the Army unprepared to respond to challenges in the manner envisioned by the doctrine's architects.  相似文献   
35.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   
36.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   
37.

Deterrence has been a crucial element in fighting terrorism, both in actual politics and rational choice analyses of terrorism. But there are superior strategies to deterrence. One is to make terrorist attacks less attractive. Another to raise the opportunity cost - rather than the material cost - to terrorists. These alternative strategies effectively dissuade potential terrorists. The strategies suggested here build on the "benevolence" system and tend to produce a positive sum game among the interacting parties. In contrast, the deterrence system is based on "threats" and tends to produce a negative sum game interaction.  相似文献   
38.
This article identifies and evaluates likely challenges facing NATO today and into the next millennium. These contingencies include ethnic‐based civil wars in Europe, transnational terrorism, rogue states, increased world income inequality, out‐of‐area conflicts, and environmental and resource security. Using concepts and tools from collective action, I assess these challenges and suggest effective policies for addressing them. NATO still has a crucial role to play in maintaining world security in the post‐Cold War era.  相似文献   
39.
This paper analyses public policy choices in the security economy from an economic perspective. It discusses the role of public goods for national and global security and identifies the importance of the first‐ and second‐order indirect effects of insecurity on economic activity, which include the behavioural responses of agents and the government to security measures, akin to such effects in insurance economics. Furthermore, key public policy trade‐offs are outlined, in particular between security and efficiency, globalisation, equity and freedom. The analysis identifies suitable policy options for raising security in the national and international contexts and in view of these trade‐offs. A balance between market and non‐market instruments in achieving security should be aimed for in order to minimise the adverse effects of aiming for higher security. In addition, the public good nature of security implies that international coordination of security policies is important, despite this process being fraught with enforcement problems.  相似文献   
40.
In February 1998, Osama Bin Laden published a signed statement calling for a fatwa against the United States for its having ‘declared war against God’. As we now know, the fatwa resulted in the unprecedented attack of 9/11. The issue of whether or not 9/11 was in any way predictable culminated in the public debate between Richard Clarke, former CIA Director George Tenet and the White House. This paper examines whether there was any evidence of a structural change in the terrorism data at or after February 1998 but prior to June 2001, controlling for the possibility of other breaks in earlier periods. In doing so, we use the standard Bai–Perron procedure and our sequential importance sampling (SIS) Markov Chain Monte Carlo (MCMC) method for identifying an unknown number of breaks at unknown dates. We conclude that sophisticated statistical time‐series analysis would not have predicted 9/11.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号