首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Extant literature documents a relationship between military deployment and the risk of an international terrorist attack against citizens of the deploying country. It appears that deployment significantly increases the possibility of terrorist actions in the home country. In particular, if country A decides to send troops to nation B, then citizens of the former country are more likely to fall victim of an attack carried out by a terrorist organisation originating from the latter country. Contributing to this line of literature, we further refine this relationship by distinguishing between regions where the troops are sent as well as by introducing differences between types of deployment. Our results indicate that missions to Asia and the Middle East are more dangerous than missions to other regions as reflected by the terrorist threat in the home country. Robustness tests do however show that the significance of the location variable Asia is predominantly attributed to the mission to Afghanistan. As for types of deployment, only ad hoc missions seem to increase the risk of an attack, whereas no significant results are found for other missions such as operations under UN and NATO flag. Leaving out the missions to Iraq and Afghanistan however also increases the danger resulting from missions by fixed coalitions. Our results find however no evidence that ‘wearing a blue helmet’ increases the probability of a terrorist attack at home.  相似文献   

2.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

3.
In this paper we develop an empirical model for transnational terrorist activity for a panel consisting of 139 countries over the period 1985–1998. Essentially, we attempt to sketch the profile of the average terrorist attack venue. Our findings suggest that the terrorist attack venue is, on average, characterized by low economic openness, high demographic stress, and a high level of international disputes. Furthermore, we document a strong regional component suggesting the presence of infectious contagion on a spatial level. Our results also support the presence of addictive contagion captured by a strong autoregressive component in each country’s terrorist activity. Finally, we find a weak statistical link between the level of democracy and terrorist activity, although the level of democracy is a significant determinant of the potential under‐reporting bias of terrorist activity.  相似文献   

4.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   

5.
A cost–benefit analysis of terrorist attacks is developed and placed within a systematic theoretical structure. For the target or object of the attack, we consider the lost value of human lives, lost economic value, and lost influence value, counted as benefits for the terrorist. The corresponding losses for the terrorist are counted as costs. The terrorist attacks if benefits outweigh costs. Bounded rationality is enabled where the three kinds of benefits and costs can be weighted differently. We account for two ex ante probabilities of successful planning and attack, and enable the terrorist to assign different weights to its multiple stakeholders. We introduce multiple time periods, time discounting, attitudes towards risk, and subcategories for the benefits and costs. The cost–benefit analysis is illustrated with the 11 September 2001 attack, and 53 incidents in the Global Terrorism Database yielding both positive and negative expected utilities. The paper is intended as a tool for scientists and policy-makers, as a way of thinking about costs and benefits of terrorist attacks.  相似文献   

6.
重大活动警卫工作头绪多、任务重、影响大,面临的恐怖袭击风险高。警卫部门必须清醒认识当前反恐形势的严峻性,认真研究重大活动警卫工作的反恐防范措施:完善情报工作机制,实现预警预控;强化社会治安综合整治,夯实警卫基础工作;严格各项警卫安全措施,确保绝对安全;加强反恐力量建设,增强反恐处突能力;加强国际合作,借鉴其他国家的先进经验。  相似文献   

7.
2008年11月,发生在印度最大的海港城市孟买的恐怖袭击事件,引起人们普遍关注。从分析印度应对此次袭击事件的行动入手,总结了印度反恐行动失败的教训和暴露出的问题,并着重阐述了印度处置孟买恐怖袭击事件对我国反恐力量建设及做好反恐斗争准备工作的几点启示。  相似文献   

8.
This article concerns scheduling policies in a surveillance system aimed at detecting a terrorist attack in time. Terrorist suspects arriving at a public area are subject to continuous monitoring, while a surveillance team takes their biometric signatures and compares them with records stored in a terrorist database. Because the surveillance team can screen only one terrorist suspect at a time, the team faces a dynamic scheduling problem among the suspects. We build a model consisting of an M/G/1 queue with two types of customers—red and white—to study this problem. Both types of customers are impatient but the reneging time distributions are different. The server only receives a reward by serving a red customer and can use the time a customer has spent in the queue to deduce its likely type. In a few special cases, a simple service rule—such as first‐come‐first‐serve—is optimal. We explain why the problem is in general difficult and we develop a heuristic policy motivated by the fact that terrorist attacks tend to be rare events. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   

9.
10.
我国反恐怖斗争对策研究   总被引:1,自引:0,他引:1  
随着以美国为首的国际反恐怖战争在全球的迅速展开 ,以基地组织为代表的国际恐怖组织实施恐怖袭击的行动能力受到一定的削弱和限制。但同时 ,在世界各地尤其是中东、中亚等热点地区的恐怖事件却愈演愈烈 ,并且恐怖袭击的目标、采用的方式更趋于多样化、复杂化 ,造成的危害更加严重。  相似文献   

11.
Many studies of terrorism explain the use of violence against civilians with political or economic forces, often relegating social variables to the margins. Social factors, specifically societal-level social capital, play a far more important role in explaining patterns of terrorist activity than previously recognized. Social capital can exert pressures that act as both restraint and catalyst for terrorism, making explicit exposition of these differential effects critical. Analysis shows that higher stocks of social capital positively correlate with the number of terrorist groups, but the average attack activity of those groups increase as measures of social capital decline. The complex relationship makes it difficult to draw simple policy implications, but it does offer insight into the role that social dynamics play in terrorist activity.  相似文献   

12.
对生化恐怖袭击抢险救援的思考   总被引:1,自引:0,他引:1  
消防部队担负着处置生化恐怖袭击事件的抢险救援任务。在分析生化灾害及处置生化灾害的特点的基础上 ,提出提高消防部队处置生化灾害综合能力的措施。  相似文献   

13.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   

14.
针对美国Google公司依靠其"Google Earth"免费卫星图片浏览软件将大量涉及我军事设施的高清晰度卫星图片公布到互联网上的严重泄密问题,从分析我军营区易暴露的征候出发,探索能够混淆视听、有效规避光学卫星侦察的营区规划对策,为应对战时敌人的攻击、防范平时敌对情报人员的侦察以及恐怖组织的袭击提供一定的技术保障。  相似文献   

15.
This paper analyzes the determinants of the probability of US citizens being victims of terrorist attacks in European countries, taking into account uncontrolled heterogeneity of the data. The analysis employs ITERATE data from February 1968 to December 2002 to ascertain significant characteristics that influence the probability (e.g. location, type of casualties, type of attack, and type of terrorists). To deal with the unobserved heterogeneity a random‐parameter logit model (mixed logit) is used. Some policy implications are presented.  相似文献   

16.
生化恐怖袭击及其应对策略   总被引:1,自引:0,他引:1  
本文指出了生化恐怖活动发展的历史趋势、分析了大规模生化恐怖活动兴起的原因 ,并分析了恐怖分子获得生化武器的可能性 ,对于可能发生的大规模生化恐怖活动提出了的应对策略  相似文献   

17.
Terrorist attacks adversely affect the Pakistani stock market. However, such effect is short-lived: the market recovers from terrorist shocks in one day. The impact of attack depends on the locations and types of attack. The more severe the attack (i.e. more people killed), the more negative is the KSE-100 index return. Most interestingly, stock market contains information about future attacks. In sum, different tactics of terrorists have varied effects on financial markets, which in turn can predict terrorist attacks.  相似文献   

18.
We study the spatial and temporal determinants of terrorism risk in Israel, using a geocoded database of Israeli terrorist attacks from 1949 to 2004. In selecting targets, terrorists seem to respond rationally to costs and benefits: they are more likely to hit targets more accessible from their own homebases and international borders, closer to symbolic centers of government administration, and in more heavily Jewish areas. We also examine the waiting time between attacks experienced by localities. Long periods without an attack signal lower risk for most localities, but higher risk for important areas such as regional or national capitals.  相似文献   

19.
The July 2005 terrorist attacks in London demonstrated the resilience of Western society in the face of low-level conventional terrorism. But the psychological damage from the London bombings would likely pale next to the severe, unpredictable, long-lasting effects of a radiological attack. One unique hazard of radiation exposure beyond the obvious physiological effects is that it is colorless, odorless, and tasteless, making it difficult for ordinary citizens to evaluate, quantify, and rationally understand the dangers confronting them. Radiological weapons stand out among the tools available to terrorists for their capacity to inflict far-reaching psychological damage to civilian populaces well beyond the immediate victims. A possible solution to mitigate the psychological consequences is to build a “resilience culture,” an interlocking set of beliefs, attitudes, approaches, and behaviors that help people fare better in any disaster or extraordinary circumstance. The “all-hazards approach,” which emphasizes the identifiable similarities among the “disaster triad”—that is, natural, accidentally man-made, and intentionally man-made disasters—extends to acts of terrorism and could help demystify the fears associated with radiological terrorist weapons.  相似文献   

20.
Nuclear proliferation, lax security standards in the storage of fissile materials, and international apathy in the prosecution of terrorists make nuclear terror a serious threat to the United States and its allies, yet no doctrine of retaliation has been established. To decrease the probability of terrorist use of nuclear weapons, a doctrine of retaliation—a negligence doctrine—should be considered. If the United States can distinguish whose fissile material was used for a nuclear terror event, a negligence doctrine would prescribe retaliation against that state. Where the proximate cause—terrorists—is unavailable for deterrent retaliation, deterring an accessible mediate cause—a state that has failed to adequately secure its fissile material—is one of a few effective alternatives. In the absence of such a negligence doctrine, the United States and its allies are increasingly vulnerable to a nuclear terror attack and the ensuing negative consequences.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号