Srl | Item |
1 |
ID:
119035
|
|
|
2 |
ID:
154005
|
|
|
3 |
ID:
109809
|
|
|
Publication |
2012.
|
Summary/Abstract |
Several measures are being initiated by the international community to secure sensitive materials. Al Qaeda's open interest in acquiring nuclear weapons and the rise of terrorist activity in nuclear-armed Pakistan have triggered a global interest in the need to secure nuclear weapons and materials. In April 2010 President Obama invited some key countries and international organisations in Washington to frame a new regime for nuclear security. The emerging regime includes some older initiatives as well as some new mechanisms, and it must address a number of issues. These range from defining nuclear security threats to finding the right kind of institution promoting nuclear security. The enthusiasm for the 2012 Nuclear Security Summit will depend on how the participating countries and the international community deal with these challenges.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
132336
|
|
|
Publication |
2014.
|
Summary/Abstract |
Recent work on borders has tended to overlook border control actors, practices and rationalities in West Africa. States in this region are considered origin and transit countries for irregular migration, and the Sahel region that they straddle is widely seen as an emerging haven of terrorist activity. This article discusses one response to these migration and terrorism threats by the Islamic Republic of Mauritania: a programmme to build new border posts with help from global partners that include the European Union and the International Organization for Migration. The article builds on Bourdieusian approaches in critical security studies, but draws on concepts from actor-network theory to account for the heterogeneity of border control actors and the mobility of different knowledges about how to control borders. Drawing on ethnographic research in Mauritania, the article discusses four 'actants' of border security: the border posts, the landscape, the biometric entry-exit system and training practices. Throughout, the article highlights field dynamics of competition, cooperation and pedagogy, also emphasizing the role of non-human agency. The article concludes with a reflection on the link between border control and statebuilding, suggesting that this fusion is a broader paradigm of security provision in the global South.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
087917
|
|
|
Publication |
2009.
|
Summary/Abstract |
The recent terrorist murders of two soldiers and a police officer in Northern Ireland brought a harsh reminder that the peace process is not infallible. But the response to the killings showed unprecedented unity. Margaret Gilmore investigates the fallout from the murders, and in an interview with the chief constable examines whether the increase in dissident republican violence poses a threat to lasting peace.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
140829
|
|
|
Summary/Abstract |
This study documents that unforeseen events like terrorist attacks can be linked to the formation of Economic Sentiment after controlling for sentiment’s economic drivers. By utilizing dynamic panel techniques, the Economic Sentiment Indicator, as well as one of its constituents Consumer Sentiment, for a pan-European panel of 27 countries appear to be negatively influenced by terrorism activity. Moreover, these negative effects are significant only in the post-9/11 era.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
119313
|
|
|
8 |
ID:
120440
|
|
|
Publication |
2013.
|
Summary/Abstract |
This article tests the application of contagion/diffusion theories of political violence to terrorist activity. In order to apply theories of contagion/diffusion to terrorism, Granger causality analysis of terrorist activity in three state dyads-Lebanon-Israel, Peru-Colombia, India-Pakistan-is conducted. Within each dyad, terrorist activities in general and specific terrorist tactics in particular are analyzed. The test results show that there are correlations of terrorist events that indicate evidence of contagion and/or diffusion in all three dyads tested, although the patterns of contagion/diffusion are different for each dyad.
|
|
|
|
|
|
|
|
|
|