首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   148篇
  免费   3篇
  国内免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   5篇
  2015年   4篇
  2014年   18篇
  2013年   62篇
  2012年   3篇
  2011年   4篇
  2010年   3篇
  2009年   7篇
  2008年   3篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2000年   1篇
  1999年   1篇
排序方式: 共有152条查询结果,搜索用时 15 毫秒
41.
The Pakistani security forces have won their fight against the insurgency of the Pakistani Taliban, though terrorism will remain a serious problem for the foreseeable future. Victory was won not chiefly on the basis of new tactics, but of the recovery of legitimacy for the campaign among the population and the armed forces. This occurred when the war came to be seen as one waged not in the interests of the USA, but for the defence of Pakistan. In Balochistan, the nationalist insurgency has been different from and weaker than that of the Taliban—but may prove longer lasting. Military tactics in Balochistan have closely resembled those of the British Raj, and have been based with some success on fomenting tribal divisions and co-opting tribal elites.  相似文献   
42.
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy.  相似文献   
43.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
44.
John Brown is usually not considered to have been a terrorist, and even recent analyses of his activities consider him to be a guerrilla fighter or insurgent in his activities in Kansas. Brown, however, meets the criteria of a terrorist more than a guerrilla fighter when his activities in the Kansas Territory are considered. His raid on Harpers Ferry, however, is more in line with guerrilla operations or insurgent activities.  相似文献   
45.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
46.
Separatist terrorism has been a severe problem for Turkey since the mid-1980s. The conventional wisdom contends that economic deprivation in southeastern Turkey is the fundamental reason for the long-running battle against the Kurdish rebels. Considering that there is limited empirical literature on the roots of terrorism in Turkey, yielding conflicting results about the claim that the main cause of terrorism is deprived economic conditions, this study aims to answer whether there is a causal relationship between income inequality and separatist terrorism in Turkey. To this end, the Global Terrorism Data Base for the period of 1973–2006, two Theil indices of pay inequality as proxy for income inequality, and the vector autoregression and Autoregressive Moving Average (ARMA) methods are utilized. The results support the early findings that income inequality, a particular focus in this paper and an essential indicator of economic deprivation, is not a main cause of escalation of separatist terrorism in Turkey.  相似文献   
47.
This paper presents a game‐theoretic model of suicide terrorism containing three agents: the terrorist leader; a targeted government; and potential terrorist supporters. Supporters join the terrorist group if they gain more from their participation than from their economic opportunities. Preemptive measures by the government can result in a backlash that encourages recruitment through new grievances. Suicide attacks can also lead to recruitment. Increases in preemption costs and/or economic opportunities can reduce the overall level of terrorism, while increasing the proportion of suicide to normal attacks. An increase in the effect of preemption on recruitment, or the propaganda effect of suicide bombings has the opposite effect of increasing normal and suicide attacks, but decreasing the proportion of suicide to normal attacks in the terrorist organization’s strategy profile.  相似文献   
48.
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild.  相似文献   
49.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism.  相似文献   
50.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号