首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   4篇
  2015年   1篇
  2014年   17篇
  2013年   62篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2009年   6篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
41.
This paper presents a game‐theoretic model of suicide terrorism containing three agents: the terrorist leader; a targeted government; and potential terrorist supporters. Supporters join the terrorist group if they gain more from their participation than from their economic opportunities. Preemptive measures by the government can result in a backlash that encourages recruitment through new grievances. Suicide attacks can also lead to recruitment. Increases in preemption costs and/or economic opportunities can reduce the overall level of terrorism, while increasing the proportion of suicide to normal attacks. An increase in the effect of preemption on recruitment, or the propaganda effect of suicide bombings has the opposite effect of increasing normal and suicide attacks, but decreasing the proportion of suicide to normal attacks in the terrorist organization’s strategy profile.  相似文献   
42.
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild.  相似文献   
43.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism.  相似文献   
44.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
45.
On Nuclear Terrorism, by Michael Levi. Harvard University Press, 2007. 210 pages, $24.95.  相似文献   
46.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   
47.
ABSTRACT

This study seeks to evaluate the threat of malicious chemical use by non-state actors. It finds that non-state actors have primarily turned to ready-to-use crude chemical weapons (CW) instead of traditional CW agents. Interestingly, the worst crude CW attacks have been more destructive than those employing traditional CW. Scenarios for catastrophic consequences exist, but chemical attacks have typically been used to accomplish tactical goals, which leverage psychological and economic impacts. Therefore, successful efforts to counter CW proliferation by non-state actors must be substantially different from those targeting states.  相似文献   
48.
ABSTRACT

The recent use of chemicals in warfare in Syria and Iraq illustrates that, despite the important work of the 1997 Chemical Weapons Convention (CWC), the world has not yet been totally successful in stopping the use of indiscriminate toxic agents in conflicts, either by states or non-state actors. Michael Crowley's excellent and timely new book, Chemical Control, analyzes the use of “riot control agents” (RCAs) and “incapacitating chemical agents” (ICAs), including launch and dispersal systems, by police, paramilitary, and military forces over the last decades and raises the challenging question about where the red line might be drawn between banned and permitted uses of chemicals. He discusses this problem not only in the context of the CWC, which allows use of RCAs for civilian riot control, but also in the context of international law, human rights, and criminal justice, including the Biological and Toxin Weapons Convention and other disarmament and abolition regimes. He proposes a “holistic, three-stage approach” to addressing this issue “for effective regulation or prohibition of the weapon or weapon-related technology of concern.” As we approach the global abolition of a whole class of weapons of mass destruction in the next decade or even sooner, Chemical Control is helpful in better understanding and solving the dilemma of what's actually banned or permitted under international law, and precluding states undermining the chemical weapons ban.  相似文献   
49.
Data from a cross-sectional survey of 176 Lebanese Shiis living in Metropolitan Beirut have been used to investigate the relationship between social and religious variables and attitudes toward Lebanon's “Party of God” (Hezbollah). The results indicate that Islamic religiosity, political discontent, and access to social welfare are positively associated with endorsement of the party. The implications of these findings for the party's future in light of recent political developments are discussed.  相似文献   
50.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号