scholarly journals Autocrats versus terrorists : what Conditions authoritarian counter-terrorism?

2021 ◽  
Author(s):  
◽  
Barbara Elisabeth Alexandra Korte

This dissertation explores the breadth and variation of authoritarian counter-terrorism strategies and their legitimacy-related origins to challenge prevailing assumptions in Terrorism Studies. Research and analysis are conducted in the form of a Structured Focused Comparison of domestic counter-terrorism strategies in two electoral autocracies. The first case is Russia’s domestic engagement against a mix of ethno-separatist and Islamist terrorism emanating from its North Caucasus republics between 1999 and 2018. The second case is China’s engagement vis-à-vis a similar type of terrorism in its Xinjiang Uyghur Autonomous Region between 1990 and 2018. The comparison shows that, contrary to prevailing assumptions, the two strategies differ immensely from one another while containing significant if not predominant non-coercive elements. It further shows that the two strategies are closely related to the two states’ sources and resources of legitimacy, both in their original motivation to tackle the terrorist threat and in the design of counter-terrorism strategies. Drawing on David Beetham’s theory of The Legitimation of Power and on the Comparative Politics, Terrorism Studies and Civil War literatures, the dissertation explores the influence of five sources and (re)sources of legitimacy on the two counter-terrorism strategies: responsiveness, performance legitimacy, ideology, discursive power and co-optation. While governmental discursive power is discarded as a source of variation, findings are significant with respect to the influence of ideology and performance legitimacy. Reliance on ideology or related patterns for legitimation raise vulnerability to terrorism and constrain or facilitate the adoption of communicative and preventive measures that accommodate the grievances of potentially defective or even violently terrorist groups. Performance legitimacy is a key motivator in counter-terrorism and an influence on certain types of counter-terrorism policies. Responsiveness and co-optation are identified as potential sources of variation, based on idiosyncratic concurrence with policy choices.

1995 ◽  
Vol 38 (2) ◽  
pp. 521-529 ◽  
Author(s):  
J. E. Morrison Jr. ◽  
J. Lemunyon ◽  
H. C. Bogusch Jr.

2014 ◽  
Vol 2014 (DPC) ◽  
pp. 000545-000566
Author(s):  
John Hunt ◽  
Adren Hsieh ◽  
Eddie Tsai ◽  
Chienfan Chen ◽  
Tsaiying Wang

Nearly half a century ago the first die bumping was developed by IBM that would later enable what we call Wafer Level Packaging. It took nearly 40 years for Wafer Level Chip Scale Packaging (WLCSP), with all of the “packaging” done while still in wafer form to come into volume production. It began with very small packages having solderball counts of 2–6 I/Os. Over the years, the I/O count has grown, but much of the industry perception has remained that WLCSPs are limited to low I/O count, low power applications. But within the last few years, there have been growing demands for WLCSP packages to expand into applications with higher levels of complexity. With the ever increasing density and performance requirements for components in mobile electronic systems, the need has developed for an expansion of applicability for Wafer Level Package (WLP) technology. Wafer Level packaging has demonstrated a higher level of component density and functionality than has been traditionally available using standard packaging. This has led to the development of WLCSPs with larger die and increasing solderball connectivity counts. Development activity has been ongoing for improved materials and structures to achieve the required reliability performance for these larger die. For this study, we have evaluated several different metallic structures used for polymer core solderballs with two different WLCSP structures. The WLCSP structures which were evaluated included a standard 4-mask design with redistribution layer (RDL), using a Polymer 1, Metal RDL, Polymer2, and Under Bump Metallization (UBM); as well as a 3-mask design with RDL, using a Polymer 1, Metal RDL, and Polymer 2. In the first case, the solderballs are bonded to the UBM, while in the second case the balls are bonded to the RDL, using the Polymer 2 layer as the solder wettable defining layer. All of the combinations are tested using the standard JEDEC Temperature Cycling on Board (TCOB) and Drop Test (DT) methodologies. The two different metallurgies of the polymer core solderballs appear to react differently to the two different WLCSP structures. This suggests that the polymer core solderball compositions may perform best when optimized for the specific WLCSP structures that are manufactured. We will review the results of the impact of the different polymer core metallurgies on the TCOB and DT reliability performance of the WLCSPs, showing the interactions of these materials with the two WLCSP structures.


2002 ◽  
Vol 53 (1) ◽  
pp. 41 ◽  
Author(s):  
R. A. Richards ◽  
Z. Lukacs

The early growth of wheat is slow compared with that of barley and triticale. This is expected to limit the yield of wheat in environments where greater seedling vigour is advantageous. To overcome the slow growth of wheat, genetic sources of seedling vigour are required for use in breeding programs, and/or ways to increase seedling growth by manipulating seed characteristics. This study reports (i) new sources of and 3 heights at cutting (cutting was done when the grass reached 0.5, 1, and 1.5 m above the ground). The N fertiliser treatment did not yield any significant difference in DMD, ND, or IVDMD. Height at cutting had a significant (P < 0.05) effect on rumen DMD and ND and their degradability characteristics for all incubation times. There was a reduction in DMD and ND and their degradability characteristics as plant height increased at cutting. Similarly, as height at cutting increased there was a decline in IVDMD. There was a positive linear correlation between IVDMD and both DMD and ND at 48, 72, 96, and 120 h (r = 0.917, 0.923, 0.921, and 0.850 for DMD; r = 0.795, 0.814, 0.787, and 0.787 for ND). Hence, further study on intake and performance of animals is suggested to develop Napier-based diets for smallholders.


Author(s):  
Aryya Gangopadhyay ◽  
Zhensen Huang

In this paper we study the behavior and performance of bilingual users in using an electronic catalog. The purpose of this research is to further the knowledge required for building electronic commerce systems that operate in multiple languages in global settings. We describe a bilingual electronic catalog that can be used by online retailers for selling products and/or services to customers interacting in either English or Chinese. We investigate into the nature of user interactions in multilingual electronic catalogs. We have defined three different groups of users: only Chinese speaking, only English speaking, and bilingual. We are specifically interested in investigating into the language preferences of the third group of users. In order to test language preferences, we have selected two types of products: office supplies and ethnic food. We hypothesize that bilingual users will exhibit differential language preferences for the type of products and the tasks performed in using the electronic catalog. Furthermore, learning curves and interaction effects are also tested. Three different task categories have been designed: browsing, directed search, and exact matches. In the first case, the user is a general browser who is looking for what is available in the catalog. In the second case, the user is looking for a class of products but is unsure of the exact item. In the third case the user knows exactly what item he/she is looking for. We propose to test the efficiency of usage by measuring the time as well as studying the path followed by the user in retrieving product information. This research will shed light on the important issue of designing multilingual electronic catalogs for both local and global applications.


Author(s):  
Denis M. Provencher

In this chapter, I present and analyze photographer and performance artist “2Fik” (pronounced “Toufik”), one of the Maghrebi French interlocutors from my fieldwork.I situate 2Fik as the first case study because his personal story and creative work provide a very poignant example of the convergence of all three driving threads of the book – language, temporalities, filiations – and the emergence of a transfilial model that draws significantly on his mastery of electronic technologies.


Author(s):  
Audrey Kurth Cronin

In order to assess terrorist groups within a broad historical and strategic framework, it is vital to assess how and why terrorist campaigns end. Moreover, if effective counter-terrorism is to be developed, then serious reflection is required regarding what happens during the final phase of terrorist campaigns, and why. This chapter therefore: first, analyses four classic strategies of terrorism and considers why Western democracies have particular difficulty responding to them; second, it reviews six historical patterns of endings for terrorist organisations that have emerged from scholarly research on hundreds of groups; third, it assesses (in light of these six patterns) which counter-terrorism policies have hastened al-Qaida’s demise and which have not, while also reflecting upon the rise of ISIS and its potential future significance.


Author(s):  
Rashmi Singh

The unprecedented overlap between terrorism and insurgency in India represents a key challenge to formulating an understanding of terrorism and counter-terrorism (CT) in this region. This chapter discusses the emergence and evolution of key terrorist threats in the country to illustrate how terrorism in the subcontinent falls into two distinct categories, i.e. ‘pure terrorism’ as practiced by what are best described as ‘incorrigible terrorist groups’ and ‘hybrid threats’, a complex amalgamation of insurgency and terrorism utilised by what are essentially ‘corrigible’ groups. I then discuss how India’s inability to distinguish between these two very different threats results in what tends towards a lethal, kinetic response characteristic of counter-terrorism even as its language remains within a population-centric ‘hearts and minds’ framework more obviously associated with traditional counter-insurgency (COIN). This tendency to ‘act CT but speak COIN’ is a key reason both India’s CT and COIN strategies remain short-sighted, muddled and under-developed. However, newly emergent threats make it imperative that India urgently recalibrate and reconsider these responses.


Author(s):  
A.M. Ponamareva

The article reveals the mechanisms of transformation of the counter-terrorism policy in Spain after the tragic events of March 11, 2004 (11-М). Based on the analysis of national regulations, global ratings, reporting documents of the largest Western think tanks, specialized counter-terrorism agencies, materials from foreign and domestic media, the author concludes that there is a shift in the focus of the authorities’ attention from internal ethno-separatism and related threats to the challenges of international terrorism in its Islamist version. Also, a number of the most acute challenges to the security of the population are highlighted, first of all – the joining of Spanish citizens to terrorist groups in the Middle East. The assessment of the threats emanating from the Basque and Catalan separatism is given. It is indicated that Spain, in which not a single terrorist attack has occurred in recent years, quite skillfully copes with the task of countering terrorism, adapting the experience of combating ETA to the challenges of the new time, but the «zone of risk» remains the space of linking radicalization leading to terrorism with unsettled migration, the weakness of the integration practices of immigrants of different cultural backgrounds and the indirect impact of the consequences of regional conflicts, resulting in the emergence of failed and fake states, posing new security threats.


2021 ◽  
Vol 13 (1) ◽  
pp. 9-19
Author(s):  
Michael Clarke

Abstract The Xinjiang Uyghur Autonomous Region (xuar) is the site of the largest mass repression of an ethnic and/or religious minority in the world today characterised by extra-judicial detention of Uyghurs in ‘re-education’ centres, pervasive surveillance, and repression of Uyghur ethnic identity. While Beijing frames such draconian measures as necessary ‘counter-terrorism’ measures, the intersection between concern for the ‘welfare’ of subject populations and the desire to eradicate ‘defective’ elements of cultural identity central to the ‘re-education’ system in Xinjiang betray the fundamentally colonial nature of the Chinese Communist Party’s (ccp) endeavours in the region.


2007 ◽  
Vol 51 (2) ◽  
pp. 89-100 ◽  
Author(s):  
Edmund H. Mantell

This paper applies game theory to explore the economic incentives facing foreign nations sheltering terrorists. The players are a nation that has been a target of international terrorist activities and a nation that is a host (willing or unwilling) of international terrorists. The economics of multinational terrorism involve the costs to host nations of sanctions imposed by the U.S. and others, as well as the economic benefits transferred to the host nations by terrorist groups that they shelter. The main result shows that coalitions between international terrorists and their host nations allow the latter to sell licenses to terrorists thereby frustrating the counter-terrorist activities of victim nations.


Sign in / Sign up

Export Citation Format

Share Document