首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
  2020年   1篇
  2017年   1篇
  2014年   1篇
  2013年   6篇
  2011年   1篇
  2009年   1篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
2.
Previous research has shown that the duration of a civil war is in part a function of how it ends: in government victory, rebel victory, or negotiated settlement. We present a model of how protagonists in a civil war choose to stop fighting. Hypotheses derived from this theory relate the duration of a civil war to its outcome as well as characteristics of the civil war and the civil war nation. Findings from a competing risk model reveal that the effects of predictors on duration vary according to whether the conflict ended in government victory, rebel victory, or negotiated settlement.  相似文献   
3.
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones.  相似文献   
4.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   
5.
This article uses a novel database of 1,625 posthumously published biographies of members of two Islamist militant organizations (Lashkar-e-Taiba (LeT) and Hizb-ul-Mujahideen (HM)), all of whom were killed in the course of carrying out militant attacks. In general, each biography provides data on the militant’s birthplace, education, recruitment, and training. The number of observations in this database is a full order of magnitude larger than those of previous databases assembled from militant biographies. While the sample of militants in this database is the product of multiple selection effects, analysis of the database undermines many common myths about Pakistani militants and casts doubt on current policy approaches to mitigating Islamist militancy in Pakistan.  相似文献   
6.
Terrorist attacks adversely affect the Pakistani stock market. However, such effect is short-lived: the market recovers from terrorist shocks in one day. The impact of attack depends on the locations and types of attack. The more severe the attack (i.e. more people killed), the more negative is the KSE-100 index return. Most interestingly, stock market contains information about future attacks. In sum, different tactics of terrorists have varied effects on financial markets, which in turn can predict terrorist attacks.  相似文献   
7.
This study documents that unforeseen events like terrorist attacks can be linked to the formation of Economic Sentiment after controlling for sentiment’s economic drivers. By utilizing dynamic panel techniques, the Economic Sentiment Indicator, as well as one of its constituents Consumer Sentiment, for a pan-European panel of 27 countries appear to be negatively influenced by terrorism activity. Moreover, these negative effects are significant only in the post-9/11 era.  相似文献   
8.
In the course of the last few years, the Islamic sect Boko Haram has become of great interest to academics, researchers and analysts. At the same time, experts, especially at the European Union (EU) level, have been reluctant to include Boko Haram in the EU list of terrorist organisations, despite the fact that this group has clearly demonstrated its transformation into a terrorist organisation. Security challenges and threats are, by definition, subject to change, and it is the task of security institutions to create policies to address these challenges and threats. Terrorism cannot be addressed in isolation, and policymakers are confronted at all levels with the difficult task of making sense of this evolution. By assessing the current security situation in Nigeria, this commentary tries to ascertain the potential repercussions to regional stability from the Boko Haram phenomenon. Insurgencies have often been initiated from and supported by neighbouring countries and have expanded conflicts across borders. Countering Boko Haram will require various institutions to conduct similar and concurrent counter-insurgent and counter-terrorist operations. At the global level, such co-ordination has often proven difficult. The EU has to keep the pace in this case.  相似文献   
9.
"人质事件"的应急处置策略、过程和结果,不仅关系着人质的安全与利益,也直接影响到政府的反恐政策及立场、能力与施政水平,关系到政府在民众心目中的权威、地位和形象。处置恐怖劫持人质事件中现场指挥员面临着巨大的压力和挑战。能否采取武力强攻以及何时采取武力强攻,是指挥员运筹决策的关键点,权衡利弊、对比分析,按照"两害相权取其轻、两利相权取其重"的原则,进行量化评估,寻求最佳方案。  相似文献   
10.
在环新疆经济圈新疆主体功能区的建设中,恐怖主义犯罪对该经济圈的建设构成重大威胁。本文就上海合作组织框架下新疆及周边国家的恐怖主义犯罪活动对环新疆经济圈的危害,以及如何有效打击该地区的恐怖主义犯罪进行了分析并提出相应的对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号