欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    国际政治相关外文资料翻译

    • 资源ID:125485       资源大小:108.50KB        全文页数:9页
    • 资源格式: DOC        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    国际政治相关外文资料翻译

    1、 毕业 论文 外文资料翻译 题 目 恐怖网络的控制 :借鉴 9 11 委员会的报告 学 院 政治与公共管理学院 专 业 国际政治 班 级 国 政 0702 学 生 孙 镇 学 号 20072303049 指导教师 刘 雨 辰 二一 一 年 三 月 二十 日 济南大学毕业 论文外文资料翻译 - 1 - CONTROL OF A TERRORIST NETWORK: LESSONS FROM THE 9/11 COMMISSION REPORT RENATE MAYNTZ International Public Management Journal, 9(3), pages 295311 THE

    2、 REPORT After the attacks on the World Trade Center and the Pentagon on September 11,2001, two urgent questions were raised both in private and public discussions: why do they hate us so much to conceive of such a heinous deed, and why was it not prevented?The second question was asked most insisten

    3、tly by the families of 9.11 victims, and it was a group of them who formed an organization and pressured Congress to institute, against the wishes of the Bush administration, a commission examining in detail the history of the attack and what the competent American authorities had done and had faile

    4、d to do in order to prevent it. The bipartisan National Commission on Terrorist Attacks upon the United States, called the 9.11 Commission for short, embarked upon a sweeping investigation and produced a 567-page report that was published in 2004. The report traces the actions of the Al Qaeda terror

    5、ists that led up to the 9.11 attacks, and describes in detail the counter-terrorism activities of the various bodies and organizations in the American security community. Focusing on the missed opportunities to prevent the attacks, the report indirectly points out the conditions of effective control

    6、 of terrorist organizations of the kind represented by Al Qaeda. Having previously studied, on the basis of an extensive literature search, the organizational forms of both national and international terrorism (Mayntz 2004), I analyzed the results of the9.11 Report in order to find out what we may l

    7、earn from it about the preconditions, and the chances, of controlling a terrorist network. This requires a sort of backward reasoning: by identifying the deficits responsible for the failure of prevention, we can derive the factors that would make for successful preventionbut we can also recognize c

    8、onstraints and restrictions that are difficult to overcome. The following observations are based on a single source, the 9.11 Report. Of the rich literature spawned by the event, I have only used two additional publications that cover the same subject (Posner 2003, Clarke 2004). Though more critical

    9、 than the 9.11 Report, which deliberately uses a matter-of-fact approach, neither of these publications contradicts its findings in points that would be important for the following analysis. 济南大学毕业 论文外文资料翻译 - 2 - CONTROL STRATEGIES There are two basic approaches to control: law enforcement and preve

    10、ntion. Law enforcement, or the strategy to discover and destroy as the commission calls it, means to treat terrorists in the same way as criminals, and terrorist acts like criminal acts. Action is taken after the fact, by police forces (or the military). The criminal must be identified, in order to

    11、be hunted, caught, judged, and finally, sentenced. Law enforcement is a measure of last resort if prevention has failed. Prevention takes place before the fact. Legal rules backed up by the threat of sanctions presumably serve the purpose of prevention by making norm violation a costly risk. A gener

    12、al threat of sanctions attached to given categories of acts is, however, unable to prevent specific incidents, for instance of murder, robbery, embezzlement, or terrorism. Terrorists do behave rationally, but for many of them being caught, detained, or even killed are discounted costs; here the Law

    13、and available law enforcement measures have no preventive effect. Prevention strategies can be either defensive, trying to protect the potential victim from attack, or offensive, trying to incapacitate the potential perpetratoreither directly by physically destroying him, or indirectly by making him

    14、 unable to act and starving him out. There is a fluid boundary between these seemingly clear-cut categories. Border controls, for example, are both a defensive and an offensive measure: they protect the potential victim, but they also constrain the action space of terrorists. Promising control strat

    15、egies of both types depend on the kind of threat. If the threat is a specific one, i.e., if it is possible to anticipate who might do what, where, and when, a feasible offensive strategy could be to detain the person or persons about to commit the act, and protection (sealing-off) of the threatened

    16、site would be a sensible defensive strategy. This strategy has been successful in the case of the so-called Millennium scare. Here at least the critical time was known (around New Years Eve), and certain sites such as computer centers and places of celebration appeared to be especially threatened. A

    17、ll agencies in the security community were on alert, and all threatened sites were highly protected. In the end, nothing happened. One terrorist who planned to bomb the Los Angeles airport was caught when he tried to enter at the Canadian border. The 9.11 attack was not a specific threat; when it ha

    18、ppened, it came as a complete surprise to mostnot so much with respect to the organization behind it, but with respect to the time, the place, and above all the kind of attack, i.e., by using hijacked civilian aircraft as missiles. If there is no credible lead as to the place, the time, the kind of a threat, and the identity of the potential terrorists, only highly general defensive measures such as


    注意事项

    本文(国际政治相关外文资料翻译)为本站会员(泛舟)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583