期刊文献+
共找到2,809篇文章
< 1 2 141 >
每页显示 20 50 100
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
1
作者 Mohammed Abdalsalam Chunlin Li +1 位作者 Abdelghani Dahou Natalia Kryvinska 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1427-1467,共41页
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier. 展开更多
关键词 Artificial intelligence machine learning natural language processing data analytic DistilBERT feature extraction terrorism classification GTD dataset
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
2
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 Cyber-Attacks CYBERCRIME CYBERSECURITY Cyber Threats Domestic terrorism
下载PDF
Disaster preparedness, pediatric considerations in primary blast injury, chemical, and biological terrorism 被引量:14
3
作者 Mitchell Hamele William Bradley Poss Jill Sweney 《World Journal of Critical Care Medicine》 2014年第1期15-23,共9页
Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the Wor... Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the World Trade Center on September 11 th, 2001. The modalities used to perpetrate these terrorist acts range from conventional weapons to high explosives, chemical weapons, and biological weapons all of which have been used in the recent past. While these weapons platforms can cause significant injury requiring critical care the mechanism of injury, pathophysiology and treatment of these injuries are unfamiliar to many critical care providers. Additionally the pediatric population is particularly vulnerable to these types of attacks. In the event of a mass casualty incident both adult and pediatric critical care practitioners will likely be called upon to care for children and adults alike. We will review the presentation, pathophysiology, and treatment of victims of blast injury, chemical weapons, and biological weapons. The focus will be on those injuries not commonly encountered in critical care practice, primary blast injuries, category A pathogens likely to be used in terrorist incidents, and chemical weapons including nerve agents, vesicants, pulmonary agents, cyanide, and riot control agents with special attention paid to pediatric specific considerations. 展开更多
关键词 terrorism BIOterrorism CHEMICAL terrorism Blast injuries Mass CASUALTY incidents DISASTERS PEDIATRICS
下载PDF
The Impact of the Collapse of the IS on the Environment of International Terrorism 被引量:1
4
作者 Li Wei 《Contemporary International Relations》 2017年第6期126-143,共18页
Recently, the international campaign against terrorism has made great achievements, with Abu Bakr al-Baghdadi, the leader of the Islamic State(IS) killed, the last city Mosul the IS controlled in Iraq liberated and it... Recently, the international campaign against terrorism has made great achievements, with Abu Bakr al-Baghdadi, the leader of the Islamic State(IS) killed, the last city Mosul the IS controlled in Iraq liberated and its so-called capital Raqqa in Syria besieged. The visible"Caliphate"of the IS is breaking up with an obvious trend of declining, which will return to a normal terrorist group from a new-type and semi-militarized terrorist organization with an independent army, territories and administrative systems. Such a change will bring about new uncertainties to the IS itself and the environment of international terrorism. For some time to come in the future, how to cope with the impact brought about by such a change of the IS will become a major issue of the international community. 展开更多
关键词 IS international terrorism international security
下载PDF
U.S. Financial War on Terrorism vs. International Financial System 被引量:1
5
作者 Su Jingxiang Associate Research ProfessorDeputy Director at Division for World Economics Studies, China Institute of Contemporary International Relations. 《Contemporary International Relations》 2002年第4期21-32,共12页
After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also... After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also exert great 展开更多
关键词 FATF International Financial System Financial War on terrorism vs U.S
下载PDF
Trojan Terrorism:Revenge Colonists or Condition of Evolution? (To the Problem "Your/Alien") 被引量:1
6
作者 Menshikova Elena Rudolfovna 《Journal of Philosophy Study》 2018年第4期191-208,共18页
Thinking about the problem of terrorism, the author finds its origins in the myth of the Trojan War, treating it as a battle for space, which was the primary basis for the civilizational leap--the expansion of the Gre... Thinking about the problem of terrorism, the author finds its origins in the myth of the Trojan War, treating it as a battle for space, which was the primary basis for the civilizational leap--the expansion of the Greek world to the east, which led to the flourishing of Greek culture, creating a precedent of justified colonialism, provided strategy and tactics-the causal apology of violence-all subsequent wars, colonial campaigns, which was no exception for the migratory flows of the XX century, as a result of which the word "terrorism" sounded with by force of the song of B. Brecht. The theme of "space"-chucked away, lost, taken away, destroyed, compressed, anarchic, empty, boundless, virtual-remains vital in our time, when the limitless possibilities lead to the limitation of man himself, his emptiness, and "complete shortuess" (Platonov), when the treaty as the basis of human existence is rejected, and when you become the Other yourself. The metaphysics of "violence" is buried in anthropology-in ignorance of one's limits by man, in denying the boundaries of "another's," in unwillingness to ask a question mad find the answer, in laziness and, in fact, in the loss of oneself. 展开更多
关键词 MYTH space terrorism Own/Alien's TREATY another happiness
下载PDF
On Uzbekistan's Experience Countering Religious Extremism and Terrorism
7
作者 Mirgiyos Azimov 《Contemporary International Relations》 2017年第5期150-154,共5页
Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of ... Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of this problem,Uzbekistan is comprehensively combating expressions of extremism and terrorism. 展开更多
关键词 Uzbekistan experience religious extremism terrorism
下载PDF
Media Coverage of Terrorism and Mental Health Concerns among Youth: Testing Moderated Mediation by Spirituality and Resilience
8
作者 Mian Ahmad Hanan Arooj Arshad +1 位作者 Noshina Saleem Shamaila Asad 《International Journal of Mental Health Promotion》 2021年第4期565-575,共11页
Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this tr... Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this traumatic era has also been explored internationally.However,some studies have been conducted on the effect of media coverage of national terrorism on people that have endured a nearby terrorist attack.Moreover,knowledge about how the media coverage of terrorism,as a secondary source of evidence,can have devastated effects on native’s mental health and how resilience work in this relationship is rather limited.For example,it is possible that different cultures have their own coping strategies(resilience&spirituality)to be adopted as they perceive and respond to terrorism coverage on media differently.Hence,this study examines the moderated role of spirituality as an adaptive mechanism along with resilience as a mediating factor in the relationship between media coverage of terrorists’incidents and mental health concerns such as perceived stress,generalized anxiety and perceived fear among Pakistani youth.Thefindings show significant results as expected,people having high level of spirituality effectively cope with the media coverage of terrorist incidents by facing the situation with more resilient personality and therefore experience less mental health concerns compared to those with low level of spirituality. 展开更多
关键词 Anxiety FEAR online terrorism exposure psychological concerns RESILIENCE stress terrorism coverage
下载PDF
Perception on Cyber Terrorism: A Focus Group Discussion Approach
9
作者 Rabiah Ahmad Zahri Yunos +1 位作者 Shahrin Sahib Mariana Yusoff 《Journal of Information Security》 2012年第3期231-237,共7页
Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study... Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact. 展开更多
关键词 CYBER terrorism COMPONENTS Framework FOCUS GROUP
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
10
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra terror TROJAN terrorism TIMOR PIRACY technology of lies Myth
下载PDF
INTERNATIONAL TERRORISM:NEW TRENDS
11
作者 Qin Xingda Qin Xingda Research Professor,Division for Social Studies,China Institute of Contemporary International Relations. 《Contemporary International Relations》 1998年第2期1-8,共8页
New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculia... New trends have surfaced in a variety of international struggles and contradic-tions coupled with marked alternations in their manifestations since the end ofthe Cold War.Similarly.international terrorism as a peculiar phenomenon in con-temporary world politics has also been spreading with some new characteristicsmainly in the following aspects. 展开更多
关键词 In OVER INTERNATIONAL terrorism
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part Ⅱ
12
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2020年第9期409-417,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra terror “Trojan terrorism PIRACY technology of lies Myth
下载PDF
Awareness of the Potential Threat of Cyberterrorism to the National Security
13
作者 Abdulrahman Alqahtani 《Journal of Information Security》 2014年第4期137-146,共10页
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of sec... The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries, who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This paper uses qualitative data to develop a conceptual framework for awareness of cyberterrorism threat from the viewpoint of experts and security officials in critical infrastructure. Empirical data collected from in-depth interviews were analysed using grounded theory approach. This study applied to Saudi Arabia as a case study. 展开更多
关键词 CYBERterrorism terrorism National Security Critical Infrastructure CONCEPTUAL Framework
下载PDF
The Application of Mixed Method in Developing a Cyber Terrorism Framework
14
作者 Rabiah Ahmad Zahri Yunos 《Journal of Information Security》 2012年第3期209-214,共6页
Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of... Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution. 展开更多
关键词 MIXED Method Research METHODOLOGY DATA Analysis DATA COLLECTION CYBER terrorism
下载PDF
Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning
15
作者 Nasir Mahmood Muhammad Usman Ghani Khan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4411-4428,共18页
This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,location... This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,locations,communication,and spatiotemporal characters on different social media groups,the proposed architecture will spawn beneficial information.This useful information will,in turn,help the police both in predicting potential terrorist events and in investigating previous events.Furthermore,this architecture will aid in the identification of criminals and their associates and handlers.Terrorism is psychological warfare,which,in the broadest sense,can be defined as the utilisation of deliberate violence for economic,political or religious purposes.In this study,a supervised learning-based approach was adopted to develop the proposed architecture.The dataset was prepared from the suicide bomb blast data of Pakistan obtained from the South Asia Terrorism Portal(SATP).As the proposed architecture was simulated,the supervised learning-based classifiers na飗e Bayes and Hoeffding Tree reached 72.17%accuracy.One of the additional benefits this study offers is the ability to predict the target audience of potential suicide bomb blasts,which may be used to eliminate future threats or,at least,minimise the number of casualties and other property losses. 展开更多
关键词 EXTREMISM terrorism suicide bombing crime prediction pattern recognition machine learning supervised learning
下载PDF
An Evolving Security Dilemma: Adopting a Comprehensive Approach to the Changing Dynamics of Terrorism in Africa
16
作者 Emmanuel Kotia Mustapha Abdallah 《International Relations and Diplomacy》 2016年第2期85-94,共10页
This article examines the threat of terrorism, its changing dynamics and manifestations, constituting a major security dilemma for Africa. It begins with a conceptual discussion of the term "Jihad" and how it is con... This article examines the threat of terrorism, its changing dynamics and manifestations, constituting a major security dilemma for Africa. It begins with a conceptual discussion of the term "Jihad" and how it is contributing to recent upsurge in terrorism among the Muslim youth in Africa. The article argues that the concept has largely been misunderstood, misinterpreted by some Muslims and non-Muslims alike and as a consequence "hijacked" and misapplied by extremists to achieve ideological and political goals. While the perpetration of terrorist act is undermining political stability of African states, the involvement of the youth does not only make the enterprise a dangerous one, but also questions the effectiveness of education and training being pursued, especially in Muslim communities across many states in Africa. The article thus suggests that, curbing the threat of terrorism arising out of wrong interpretation of the concept of Jihad will require adopting a comprehensive educational approach aimed at reforming and transforming the character of the Muslim youth. This should include religious, moral, secular and peace education. It concludes that failure to adopt such holistic approach will mean African states will continue to battle with terrorism as an evolving security dilemma for years to come and the name Islam will continue to be denigrated as a religion that is more susceptible to violence. 展开更多
关键词 terrorism security ISLAM JIHAD education
下载PDF
The Origins of the War on Terrorism Paradigm
17
作者 Alex Hobson 《International Relations and Diplomacy》 2020年第3期120-125,共6页
It is now widely accepted among scholars that a new national security paradigm emerged in the United States after 9/11.This paradigm shift accompanied the George W.Bush administration’s declaration of a“global war o... It is now widely accepted among scholars that a new national security paradigm emerged in the United States after 9/11.This paradigm shift accompanied the George W.Bush administration’s declaration of a“global war on terror”and consisted of new interpretations of domestic and international law,new recognition of the threats posed by non-state actors,and a stated determination to eradicate threats everywhere before they emerged.Yet most scholarship has neglected examination of this paradigm’s origins.It became dominant after 9/11,but it did not originate then.Examination of these origins and the original context shows that the war on terrorism paradigm was not created in response to a catastrophic attack on the American“homeland”;rather it arose out of anxieties about U.S.capacity exert its will in the Third World.Its foundations were established long before its post-9/11 revival.This paper places these origins within the context of U.S.-Middle East relations in the 1980s.It reads together the public discourses of Lebanese Hizbullah and of U.S.Secretary of State George P.Shultz who,more than any other U.S.official,promulgated the justifications for the war on terrorism,to show that the notion of a jihad aimed at American power and of a war on terrorism had a basis in anxieties about the capacity of American power in the Middle East.The article uses the author’s original translation of the Hizbullah’s 1985“Open Letter to the Oppressed”alongside George Shultz’s public pronouncements between the start of the U.S.intervention in Lebanon in 1982 and the climax of the Iran-Contra scandal.It argues that provocations of the war on terrorism and the war on terrorism itself emerged out of emotions connected to the efficacy of American power in the Middle East. 展开更多
关键词 terrorism COUNTERterrorism WAR
下载PDF
Terrorism as a Threat to the European and Global Order
18
作者 Fatmir Rrahmanaj 《History Research》 2016年第2期116-120,共5页
In this paper we will discuss about terrorism as a global threat. Currently in the New World Order concepts such as terrorism has entered the field of security. Terrorism as a notion and as an activity is defined diff... In this paper we will discuss about terrorism as a global threat. Currently in the New World Order concepts such as terrorism has entered the field of security. Terrorism as a notion and as an activity is defined differently by different authors. As a concept, historically it has been used during the French Bourgeois Revolution, in terms of sentences imposed by the revolutionary courts against the enemies of the Republic. The word terrorism derives from the Latin word "terror" which means horror, sadness, intimidation and tremble, political violence or physical destruction of the opponent. With the end of the Cold War, the emergence of several concepts that previously did not exist, or were at a low level, changed the position and turned into one of the main threats worldwide. This was the trigger that forced states to reconsider the mechanisms of national and international security. After the events of September 11 and the attack on the twin towers in New York, it was proved that no country in the world is safe now, including those who claim to have created a modern defence system. Therefore, nowadays the challenge for countries and international organizations remains the identification of terrorists, the tools they have, where, when and how they will strike. 展开更多
关键词 terrorism SECURITY THREAT NATIONAL INTERNATIONAL
下载PDF
Jean Baudrillard's Encounter With Anthropology: Toward A Radical Understanding of Marxism and Terrorism
19
作者 Gerry Coulter 《Journalism and Mass Communication》 2016年第7期420-425,共6页
Jean Baudrillard (1929-2007), a leading contemporary theorist from the 1970s to the present, was deeply influenced by anthropological thought. As an outcome of his prolonged encounter with anthropology he was able t... Jean Baudrillard (1929-2007), a leading contemporary theorist from the 1970s to the present, was deeply influenced by anthropological thought. As an outcome of his prolonged encounter with anthropology he was able to devise a unique approach to the world. This approach enabled him to play a leading role in surpassing Marxist thought and in explaining contemporary terrorist attacks such as those of September 11, 2001 in the United States. Baudrillard, who is often correctly seen as making a contribution to contemporary anthropology, is also someone who is deeply indebted to anthropology. This aspect of Baudrillard is less well understood. 展开更多
关键词 BAUDRILLARD ANTHROPOLOGY symbolic exchange REVERSIBILITY terrorism MARXISM
下载PDF
Trade Isolation Effect of Terrorism Risks along the"Belt and Road"Route
20
作者 张晓磊 张二震 《China Economist》 2017年第6期114-125,共12页
Rising terrorism risks are a major obstacle for Belt and Road countries to integrate into the global trade network. Based on the cross-country panel data of the now 66 Belt and Road countries during 2000-2013, this pa... Rising terrorism risks are a major obstacle for Belt and Road countries to integrate into the global trade network. Based on the cross-country panel data of the now 66 Belt and Road countries during 2000-2013, this paper carries out an empirical study on the trade isolation effect of terrorism risks with the following findings: Rising terrorism risks will indeed give rise to a significant "trade isolation effect" with greater negative impact on a country's export than on import. After taking into account the endogeneity of the variable of terrorism risks and heterogeneous casualties of terrorist attacks, this conclusion remains robust. In addition, the trade isolation effect of terrorism risks is also characterized by heterogeneous targets under attack, i.e. the degree of trade isolation effect is positively correlated with the randomness of targets under terrorist attacks. 展开更多
关键词 terrorism risks Belt and Road Initiative trade isolation effect trade endence
下载PDF
上一页 1 2 141 下一页 到第
使用帮助 返回顶部