主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院

Moran Process Stochastic Evolution Model of Anti-terrorism De-extremalization Source Governance Strategy

  • Shan-song WU ,
  • De-hai LIU ,
  • Lei WANG
Expand
  • 1.School of Management Science and Engineering, Dongbei University of Finance & Economics, Dalian 116025, China
    2.School of Public Administration, Dongbei University of Finance & Economics, Dalian 116025, China
    3.School of Drug Control and Public Security, Criminal Investigation Police University of China, Shenyang 110854, China

Received date: 2020-09-28

  Revised date: 2021-01-08

  Online published: 2023-11-20

Abstract

China's Xinjiang region has gradually explored a successful experience of “de-extremization” to remove the ideological roots of terrorism and extremists by “combining attack and prevention, focusing on prevention”. In accordance with the relevant laws and regulations, through the establishment of vocational skills education and training center in Xinjiang, the source control of de radicalization for the groups participating in terrorist activities and extremist activities is realized. Due to the different degree of influence of extreme thoughts on trainees, their behavioral motivations for training are also quite different. The degree of cooperation of trainees is affected by the efficiency and effect of vocational skills training, the degree of fanaticism of extreme thoughts and the coercion of overseas religious extremist forces. However, this successful anti-terrorism experience has been maliciously discredited by the United States and other western countries. For the first time, the successful experience of “de-extremization” activities such as establishing vocational skills education and training centers in accordance with the law in Xinjiang is systematically demonstrated.According to the decision-making motivation of three different types of students, such as mild extreme behavior, severe extreme behavior and being coerced by overseas extremism, the expected return function is expanded into irrational factors and external random interference factors respectively. The stochastic evolutionary game model of limited group is established, and the dominant condition of “active cooperation” strategy becoming evolutionary stable strategy in student group is discussed. In this paper, Hetian vocational skills training center as a case, the relevant data and content are from the “vocational skills education and training in Xinjiang” white paper and other public information channels.The research shows that the strategy evolution of trainees mainly depends on the effect and efficiency of training, the development benefits of eliminating extremes and the scale of training center. For the students with mild extreme behavior, the positive cooperation strategy needs to meet certain income conditions to become the evolutionary stable strategy. For the students with severe extreme behavior, the negative treatment strategy is always an evolutionary stable strategy. When the external random interference factors occupy the dominant position, these interference factors will seriously hinder the de extreme teaching and training work. The above research results show that the combination of economic motivation means to improve the training effect and efficiency with non economic motivation means such as criminal investigation, intelligence interception and training scale is conducive to the development of de-extremization.The following problems have not been considered in this paper. First of all, there is no in-depth discussion on the infiltration process of overseas extremism, that is, the types of external interference factors and the ways to deal with them. The incentive of students' behavior is often the entanglement of economic interests, ideology and external random factors. Secondly, in the aspect of data analysis, it is helpful for the international community to formulate anti-terrorism de-extremization measures according to local conditions by analyzing the real behavior characteristics of students based on big data. Third, in the practice of international anti-terrorism de radicalization, countries are constantly exploring the source governance path in line with their own national conditions. In the future research, a comparative analysis can be made from a horizontal perspective, and strong theoretical proof and guidance can be provided for China's anti-terrorism “de-extremization” work in the next step.

Cite this article

Shan-song WU , De-hai LIU , Lei WANG . Moran Process Stochastic Evolution Model of Anti-terrorism De-extremalization Source Governance Strategy[J]. Chinese Journal of Management Science, 2023 , 31(11) : 300 -311 . DOI: 10.16381/j.cnki.issn1003-207x.2020.1860

References

1 新疆维吾尔自治区人大常委会.《关于修改〈新疆维吾尔自治区去极端化条例〉的决定》[EB/OL].(2018-10-09)[2019-09-07]..
1 Standing Committee of the Xinjiang Uygur Autonomous Region People's Congress. Decision on Amending the Regulations on De-Extremization in Xinjiang Uygur Autonomous Region [EB/OL].(2018-10-09) [2019-09-07]. .
2 中华人民共和国国务院新闻办公室. 《新疆的反恐、去极端化斗争与人权保障》白皮书[EB/OL]. (2019-03-18) [2019-09-21]. .
2 Information Office of the State Council of the People's Republic of China. White Paper on Counter-terrorism, the Struggle against Extremism and Human Rights Protection in Xinjiang [EB/OL]. (2019-03-18) [2019-09-21]. .
3 央视网.筑牢根基, 源头治理[EB/OL].,2018-10-16.
3 CCTV. Building a firm foundation, governance at source [EB/OL]., 2018-10-16.
4 人民日报评论员. 决不容许任何人为恐怖势力撑腰[N]. 人民日报,2019-12-05(01).
4 People's Daily Commentator. No one will be allowed to back up terrorist forces [N]. People's Daily,2019-12-05(01).
5 李德龙, 刘德海. 特殊时期地铁二级分流-联防安检优化模型[J].中国管理科学,2019,27(12):127-135.
5 Li Delong, Liu Dehai. Optimization model of secondary diversion-joint security check for subway in special period[J]. Chinese Journal of Management Science,2019,27(12):127-135.
6 项寅. 模糊环境下边境反恐交通网络设计模型及应用[J].中国管理科学,2021,29(11):237-248.
6 Xiang Yin. Design model and application of border anti-terrorism traffic network in fuzzy environment [J]. Chinese Journal of Management Science,2021,29(11):237-248.
7 柴瑞瑞, 刘德海, 陈静锋. 恐怖袭击事件的时空差异特征分析及内生性VAR模型[J].中国管理科学,2016,24(S1):281-288.
7 Chai Ruirui, Liu Dehai, Chen Jingfeng. Analysis of spatio-temporal variation characteristics of terrorist attacks and endogeneity VAR model[J]. Chinese Journal of Management Science,2016,24(S1):281-288.
8 Wang Siyuan, Wang Gang, Zhang Jiarui. Data Analysis method of terrorist attacks based on AHP-DBSCAN method[J]. Journal of Physics Conference Series, 2019, 1168(3):1-8.
9 刘德海, 柴瑞瑞, 韩呈军. 基于心智模型的恐怖主义袭击扩展式演化博弈分析[J]. 中国管理科学,2018,26(2):71-78.
9 Liu Dehai, Chai Ruirui, Han Chengjun. Extended evolutionary game analysis of terrorist attacks based on mental models[J]. Chinese Journal of Management Science,2018,26(2):71-78.
10 白云涛,刘德海.具有不同时间偏好的反恐重复博弈分析[J]. 系统工程理论与实践, 2018, 38(10):2620-2628.
10 Bai Yuntao, Liu Dehai. Analysis of repeated games with different time preferences for counter-terrorism[J]. Systems Engineering-Theory & Practice, 2018, 38(10):2620-2628.
11 赵静梅, 申宇, 吴风云. 天灾、人祸与股价:基于地震、群体骚乱事件的研究[J]. 管理科学学报, 2014, 17(4):19-33.
11 Zhao Jingmei, Shen Yu, Wu Fengyun. Natural disasters, man-made disasters and stock prices:a study based on earthquakes and mass unrest events[J]. Journal of Management Science, 2014, 17(4):19-33.
12 刘泽照, 朱正威. 公共管理视域下风险及治理研究图谱与主题脉系——基于国际SSCI的计量分析(1965—2013)[J]. 公共管理学报, 2014, 11(3):127-138.
12 Liu Zezhao, Zhu Zhengwei. Mapping and thematic lineage of risk and governance research in public management perspective: an international SSCI-based econometric analysis (1965-2013) [J]. Journal of Public Administration, 2014, 11(3):127-138.
13 Paul J, Bagchi A. Civil Liberties and terrorism in middle east, north africa, afghanistan, and pakistan[J]. Annals of Operations Research, 2019, 275(2):126-144.
14 郑君君, 邵祥民, 韩笑, 等.认知层次与信念更新对博弈合作行为影响研究[J]. 系统工程理论与实践,2016,36(1):113-120.
14 Zheng Junjun, Shao Xiangmin, Han Xiao, et al. A study on the influence of cognitive hierarchy and belief updating on cooperative behavior of games[J]. Systems Engineering-Theory & Practice,2016,36(1):113-120.
15 Meftah J. Roots of sadistic terrorism crimes:is it Islam or Arab culture?[J]. Aggression and Violent Behavior,2018,42(5):52-60.
16 刘义. 信仰与暴力——关于宗教恐怖主义的一般理论[J]. 宗教学研究, 2010(3):135-141.
16 Liu Yi. Faith and violence: a general theory of religious terrorism [J]. Studies in Religion, 2010(3):135-141.
17 Lis P. The impact of armed conflict and terrorism on foreign aid:a sector-level analysis[J].World Development,2018, 110(10):283-294.
18 王茜.“东突”问题的发展演变与中东恐怖主义的相关性透视[J].阿拉伯世界研究, 2008(6):31-37.
18 Wang Xi. The evolution of the “East Turkestan” issue and the relevance of terrorism in the Middle East [J]. Arab World Studies, 2008(6):31-37.
19 Moran P. The statistic processes of evolutionary theory[M]. Oxford :Clarendon Press,1962.
20 Souza E, Ferreira E, Neves A. Fixation probabilities for the Moran process in evolutionary games with two strategies[J]. Journal of Mathematical Biology, 2018, 78(8):1033-1065.
21 Nishimura T, Okada A, Shirata Y. Evolution of fairness and coalition formation in three-person ultimatum games[J]. Journal of Theoretical Biology, 2017, 420(2):53-67.
22 曹志刚, 杨晓光. 系统科学视角下中国群体性事件治理[J].战略与管理,2011, 7(8):99-111.
22 Cao Zhigang, Yang Xiaoguang. System science perspective on mass event governance in China[J]. Strategy and Management, 2011, 7(8):99-111.
23 徐贵相. 冲破极端主义的精神牢笼[N]. 人民日报,2019-3-19(16).
23 Xu Guixiang. Breaking through the spiritual prison of extremism [N]. People's Daily,2019-3-19(16).
24 中华人民共和国国务院新闻办公室. 《新疆的职业技能教育培训工作》白皮书[EB/OL]. (2018-08-16)[2019-10-11]..
24 Information Office of the State Council of the People's Republic of China. White Paper on Vocational Skills Education and Training in Xinjiang [EB/OL]. (2018-08-16) [2019-10-11]. .
25 王先甲, 全吉, 刘伟兵. 有限理性下的演化博弈与合作机制研究[J]. 系统工程理论与实践, 2011(S1):82-93.
25 Wang Xianjia, Quan Ji, Liu Weibing. Research on evolutionary games and cooperative mechanisms under finite rationality [J]. Systems Engineering-Theory & Practice, 2011(S1):82-93.
26 柴彩春, 肖条军, 许甜甜. 基于Moran过程的制造商生产策略演化动态[J]. 系统工程理论与实践, 2015, 35(9): 2262-2270.
26 Chai Caichun, Xiao Tiaojun, Xu Tiantian. Evolutionary dynamics of manufacturers' production strategies based on Moran process[J]. Systems Engineering-Theory & Practice, 2015, 35(9): 2262-2270.
27 吴宁, 周艳华. 恐怖主义中的非理性因素及其对策[J]. 湖北文理学院学报, 2005, 26(6):15-19.
27 Wu Ning, Zhou Yanhua. The irrational factor in terrorism and its countermeasures [J]. Journal of Hubei Academy of Arts and Sciences, 2005, 26(6):15-19.
28 Taylor C, Fudenberg D, Sasaki A, et al. Evolutionary game dynamics in finite populations[J]. Bulletin of Mathematical Biology, 2004, 66(9): 1621-1644.
29 寇明婷, 杨海珍, 杨晓光. 中国股票市场的“塔西陀陷阱”效应研究[J]. 系统工程学报, 2018, 33(6):83-93.
29 Kou Mingting, Yang Haizhen, Yang Xiaoguang. A study of the “Tahitian trap” effect in the Chinese stock market[J]. Journal of Systems Engineering, 2018, 33(6):83-93.
30 Traulsen A, Shoresh N, Nowak M. Analytical results for individual and group selection of any intensity[J]. Bulletin of Mathematical Biology, 2008, 70(11):1410-1424.
31 孙淑慧,朱立龙.消费者反馈下企业质量改进投入决策Moran演化分析[J].中国管理科学,2022,30(2):244-255.
31 Sun Shuhui, Zhu Lilong. Moran evolutionary analysis of enterprise quality improvement input decision under consumer feedback[J]. Chinese Journal of Management Science,2022,30(2):244-255.
32 王天华, 刘德海, 王雷. 不确定环境下国际反恐联盟随机演化博弈模型[J]. 系统工程理论与实践, 2019, 39 (12): 3139-3150.
32 Wang Tianhua, Liu Dehai, Wang Lei. Stochastic evolutionary game model of international counterterrorism coalition under uncertain environment[J].Systems Engineering-Theory & Practice, 2019, 39(12): 3139-3150.
33 新华网.喀什和田:疆独暴恐分子最活跃的地区[EB/OL].,2014-5-28.
33 Xinhua.com. Kashgar and Hotan: The most active region for Xinjiang's independent rioters [EB/OL]. , 2014-5-28.
34 中华人民共和国人力资源社会保障部. 关于新疆维吾尔自治区最低工资标准调整方案,[EB/OL].,2013-5-13.
34 Ministry of Human Resources and Social Security of the People's Republic of China. On the adjustment plan of minimum wage standard in Xinjiang Uygur Autonomous Region,[EB/OL]. ,2013-5-13.
Outlines

/