English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 111206/142126 (78%)
Visitors : 48125743      Online Users : 384
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/95764


    Title: 國際恐怖主義的資金流動
    Other Titles: The Capital Flow of International Terrorism
    Authors: 林泰和
    Lin, Tai-Ho
    Keywords: 恐怖主義;洗錢;資金流動;跨國犯罪;911事件
    terrorism;terrorism financing;counter-terrorism financing;money laundering
    Date: 2011-03
    Issue Date: 2016-05-09 16:58:03 (UTC+8)
    Abstract: 21 世紀開始以來,國際上發生了許多重大的恐怖攻擊事件,例如2001年911 恐怖攻擊事件、2002 與2003 年兩次峇里島爆炸事件、2004 年馬德里火車爆炸事件,2005 年倫敦地鐵攻擊事件、2008 年孟買攻擊事件。這些恐怖攻擊事件因為造成眾多人死傷,加上國際媒體晝夜強力放送,使閱聽大眾至今記憶猶新。但是,這些恐怖攻擊事件都只是整個恐怖組織活動的最終「產品」。\\r 國際恐怖行動若分成上、中、下游。上游是資金的供給,中游是人員招募與訓練,下游是恐怖活動的執行。其中最為關鍵的面向無疑是對恐怖組織的資助與資金的募集。一旦獲得資金,並不一定保證能夠馬上運用,因為有些資金的來源屬於非法,必須透過國際金融體系的流 通甚至洗錢的過程,才能將資金轉變成實質的購買力,以遂行恐怖行動。本文的主要目的在於試圖瞭解國際恐怖組織資金的流動方式及國際社會的回應。\\r 本文分成五大部分。導言部分由全球化理論與背景出發,敘述恐怖主義資金流動在全球化現象下的複雜性與重要性。第二章開始分析恐怖主義資金流動的兩大方向:需求面與供給面。第三章討論恐怖組織如何將所得到的金錢資助,透過洗錢的過程,轉化為實質的購買力,以 應付必要的支出。因應恐怖組織資金流動對國際安全的威脅,第四章討論國際社會如何對此回應。第五章則是綜合本研究所做成的結論。
    Since the beginning of the 21st century, many deadly terrorist attacks have taken places, such as the 9-11 attacks in 2001, Bali terrorist attacks in 2002, Madrid train bombings in 2004, and London suicide bombings in 2005. The images of these terrorist attacks on the audience around the globe are readily recalled due to casualties and broadcasting by the international media. In actuality, the attacks are the “final products” of a whole series of activities conducted by international terrorism. If terrorist activities were to be described by the analogy of a river, the terrorist financing can be ordered upstream, recruitment and training at midstream, and implementation of terrorist act downstream. The key part of the whole terrorist activity would be financing and fund raising. Successful fund raiseing does not tranlanste to successful use of the fund. If terrorist funds are originate from illegal sources, it must be financially channeled or even laundered into real purchasing power for the purpose of conducting terrorist attacks. This article attempts to clear the funding sources of terrorist groups: how these funds are transformed into purchasing power and how international community and national respond. The article unfolds in three main parts. The first part deals with the financing of terrorism; the second part inquires the financial flow of terrorist groups, and the final part summarizes the key measures of counter-terrorism through finance implemented by the international community and national governments.
    Relation: 問題與研究, 50(1), 97-141
    Issues & studies
    Data Type: article
    Appears in Collections:[問題與研究 TSSCI] 期刊論文

    Files in This Item:

    File Description SizeFormat
    50-1-4.pdf2858KbAdobe PDF2264View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback