Font Size: a A A

Study On The Construction Of Terrorism Crime Database In China

Posted on:2020-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:M L GongFull Text:PDF
GTID:2416330596468911Subject:Public security
Abstract/Summary:PDF Full Text Request
Although peace and development are the themes of the times,the threat of terrorism crime to the world cannot be underestimated.Since the 21 st century,more and more countries and regions have been attacked by terrorists,and countries with a high security coefficient,such as Norway and New Zealand,have not been spared.The cloud of terrorism is hanging over the whole world.Throughout China,under the comprehensive management of the state,although no serious terrorist attacks have occurred in recent years,However,terrorist organizations such as the "East Turkistan" active in and outside the country are still a huge threat to China.Therefore,in-depth study of terrorism crime has great theoretical and practical significance.The use of a database of terrorism crime to quantify the terrorist attacks and to grasp the crime status,characteristics and laws is the basis for the success of the anti-terrorism struggle.How to construct the database of terrorism crime in China is a subject that needs to be studied deeply.Based on the perspective of criminal sociology,this paper uses the literature research method and comparative analysis method,and based on the experience of foreign database construction and domestic anti-terrorism practical experience,attempts to construct China's database of terrorism crime theoretically(rather than database technology),so as to provide reference for the researchers actually construct database.This article is divided into six parts: The first part introduces the research background,significance and methods of this paper.The second part defines the concept of terrorism crime and database.The concept of terrorist crime is defined in detail from the four aspects of subject,purpose,means and object,and introduces the relevant content of variable.The third part analyzes the situation of domestic and foreign terrorism crime databases,compares the foreign GTD,RDWTI and TWEED databases,summarizes their advantages and disadvantages and the enlightenment to China.The fourth part introduces the basis and principles to follow when selecting variables.The variables in the database constructed in this paper are selected according to the general research methods of criminal sociology on crime phenomena,and follow the principles of purposiveness,scientificity,feasibility and comparability.The fifth part is to specifically design the variables in the database under the guidance of theoretical basis and principles.From the aspects of event number,crime type,criminals,criminal behavior,criminal object,criminal consequences and event description,In view of the lack of terrorist characterization in foreign databases,this paper includes variables related to terrorist demographic characteristics in the database.The sixth part is aimed at the problems that need to be paid attention to during the actual operation phase of the database.This paper proposes to continuously enrich the variables in the database,establish a professional data collection team,and constantly improve the database system,so that the database can better serve the terrorist crime research.
Keywords/Search Tags:Terrorism crime, Crime database, Database variables
PDF Full Text Request
Related items