首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   3篇
  2009年   2篇
  2008年   1篇
排序方式: 共有11条查询结果,搜索用时 281 毫秒
1.
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   
2.
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy.  相似文献   
3.
随着中越关系的正常化和边境贸易的迅速发展,两国边民的交往更加密切。由于地缘条件、经济发展不平衡、民族传统习惯、人口性别比例等因素的影响,造成了广西边境地区非法跨国婚姻大量存在。不仅破坏了正常的出入境管理秩序,给边境地区的安全与稳定带来了隐患,而且也给公安边防部门的人口清查、遣返工作带来了很大压力。因此,在对非法跨国婚姻问题的治理上必须采取有效对策,使跨国婚姻朝着有序化、正规化方向发展,进而促进广西边境地区的和平与安全。  相似文献   
4.
我国跨境恐怖主义犯罪日益猖獗,不仅造成了大量的无辜平民伤亡和公私财产的损失,而且侵害了其他国家的利益和国际社会的共同秩序。防范和惩治我国跨境恐怖主义犯罪活动,应当坚持经济和社会的协调发展,消除恐怖主义滋生的土壤;积极参与多边安全合作,探寻维护我国安全利益的新途径;完善我国反恐怖主义犯罪的刑事立法。  相似文献   
5.
In both Afghanistan and Iraq, US landpower was able to gain control rapidly over terrain. However, that control ebbed as US presence weakened. Non-state actors, such as the Taliban, the Haqqani network, the Islamic State, and Al Qaeda, gained control of segments of the population. Transnational Criminal Organizations capitalized on this permissive environment to strengthen their networks, often eroding the legitimacy of the host nation government, fueling regional instability, and, ultimately, undermining US policy objectives. The proliferation of deviant globalization, or the connectedness of subversive elements, is a key indicator of future conflict. Strategic landpower is uniquely positioned to influence the physical, psychological, economic, and social interactions of various non-state actors and their association with deviant globalization. It is no longer enough to seize and hold terrain. Landpower must also have the capability to influence the actions and attitudes of populations on that terrain wherever and whenever these interactions occur.  相似文献   
6.
This paper is the first global investigation of the relationship between remittances and terrorism. To discern this relationship, we draw terrorism event data from the Global Terrorism Database and International Terrorism: Attributes of Terrorism Events. When a host of standard terrorism controls is employed, lagged remittances as a share of gross domestic product have a positive and significant impact on both domestic and transnational terrorist attacks. For the venue country’s viewpoint, lagged remittances have a greater marginal impact on domestic than on transnational terrorism. However, when we investigate remittances to the home country of the perpetrator, lagged remittances have the greatest marginal impact on transnational terrorism. Throughout our investigation, standard terrorism controls perform according to our priors and those of the literature, lending credence to the isolation of the impact of remittances. We also account for endogeneity concerns.  相似文献   
7.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   
8.
Africa has emerged as a strategic location for transcontinental narcotics trade. Particularly the West African subcontinent has turned into a cocaine warehousing and trans-shipment hub along the way to the European underground markets. At this juncture, African drug networks (ADNs) began to play a momentous role in global drug trade, and pose a considerable threat to international security, as they operate in more than 80 countries. The United Nations Office on Drugs and Crime, Interpol, and Europol perceive ADNs as one of the primary issues in international counter-narcotics policy. These agencies have launched several multilateral initiatives to contain the West African threat. None of these initiatives, however, retarded the expansion of the problem. Indeed, the containment efforts turned out to be quite embryonic. The ADNs eventually entered the Turkish market by the early 2000s. West African drug networks (WADNs) in particular have begun to operate within Turkey extensively, often supplying and distributing drugs. The gravity of the threat became ever more serious by 2012. The upsurge of the new threat has compelled the Turkish drug-law enforcement agencies to adopt new policies and counter-strategies. These policies have to be based upon proper strategic analysis of the threat. This paper seeks to address the need for a threat assessment of ADNs. It investigates the dimensions of the problem, profiles the members of WADNs, their modes of operation, and the factors that compelled them to exploit the illicit Turkish drug markets. The analyses are based upon the scrutiny of 227 narcotic interdictions files and statements from the African individuals in these case files. The paper concludes by presenting policy implications and recommendations for the Turkish security and foreign-policy institutions to cope with this impending threat.  相似文献   
9.
After the fall of the Taliban regime in 2001, several thousand Afghan Taliban forces fled across the border to Pakistan, and the area became a safe haven for Afghan insurgents. In 2014, the transnational dimension of the insurgency is still highly prominent. Although regional support for insurgents is not uncommon, how to counter this aspect is mostly ignored in counterinsurgency (COIN) theory and doctrines. In this article, a regional counterinsurgency framework is developed, using the regional counterinsurgency efforts in Afghanistan as an example. The framework will facilitate the systematic inclusion of regional COIN measures in theory and doctrine.  相似文献   
10.
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号