首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
高秀用 《国防》2006,(4):21-22
国防建设是国家为提高国防能力而进行的综合性建设,是国家建设的重要组成部分。由于国防建设受到国家政治制度、国家发展战略、国防战略、经济实力、科技水平、地理条件、文化传统和国际战略环境等因素的影响和制约,因此,国防建设既有许多和社会其他领域建设的共同点,也有自身的特殊性。国防建设的特征,主要表现在阶级性、政治性、经济性、对抗性、高效性、威慑性、时代性等方面。  相似文献   

2.
国防科技工业作为国家战略性产业,不仅承担着为国防建设提供先进武器装备的神圣使命,也承担着为国民经济建设服务的重任。党的十八大提出,坚持走中国特色军民融合式发展路子,坚持富国和强军相统一,加强军民融合式发展  相似文献   

3.
声音     
《国防科技工业》2013,(7):12-12
中国航天逐渐从以实验为主的探索,向为民众提供服务、创造价值的产业转变。中国人以独立自主、不畏艰险、永不放弃的精神,闯出了一条独具特色的飞天之路。航天事业不断取得的里程碑式突破,极大推动了国家经济实力、科技实力和民族凝聚力的增强。让我们沿着中国道路,弘扬中国精神,凝聚中国力量,不懈探索,奋发图强,把绚丽的梦想写在更高远的天空。——人民日报  相似文献   

4.
军人是国家和平的保卫者、承担着比普通公民更多的义务和责任。因此,当他们服役期满退出现役时,社会应当给予特殊的回报。这既是现役军人安心服役的重要社会条件,也是军人为国家  相似文献   

5.
陈定定  季澄 《环球军事》2014,(17):66-66
对于美国来说,其自身是否愿意让中国分担更多国际责任成为一个棘手的问题.尤其涉及向海外派遣部队。责任心与领导力是相辅相成的,你不能在仅要求中国承担更多责任的同时,拒绝赋予其履行责任所需要的领导力和地位。  相似文献   

6.
具有类似利益的国际事务参与者越来越多。表明中国面对像利比亚这样的冲突时,需要运用更灵活的外交努力和更大的金融参与。在这种情况下.原本旨在减少中国全球参与和责任的不干涉政策,已经演变为一种不利的外交政策,会对中国追求自身利益的活动产生不利影响。而且,外部世界要求中国承担更多责任,在国际舞台上发挥积极作用的呼声也越来越强烈...  相似文献   

7.
《国防科技工业》2013,(7):38-39
承担着推进国民经济信息化和保障国家信息安全的重任,中国电子组织"三大战役",着力加强自主创新,突破产业"缺芯少屏"、信息安全堪忧等核心问题,推动国防建设和社会信息化发展当今世界在经济全球化的同时,信息社会已悄然来临。信息技术和产业已经成为推动世界经济发展的重要动力,成为衡量国家综合实力的重要标志。作为我国最大的国有电子信息企业掌门人,中国电子信息产业集团有限公司董事长、党组书记芮晓武深感重任在肩,他提  相似文献   

8.
<正>党的十八届三中全会把军民融合深度发展上升为国家战略。高等军事院校是国家创新体系重要部分,具有很强的科研实力,优质的科技资源和大量特色鲜明、技术独特的军民两用高科技成果。加快军事院校科技成果转化,对加强军民技术融合,培育和扶持军民融合产业,搭建军民融合的技术平台,推动军民融合深度发展具有重要意义。近年来,随着军事斗争准备和武器装备建设的快速发展,军事院校的建设发展不断得到加强,一大批重点学科、重点实验室得到重点建设,办学实力和科研水平快速提升。除了军事人才培养和军事科研任务外,还承担着与其学科专业相关  相似文献   

9.
余勇 《中国军转民》2013,(11):49-51
近年来,伴随着经济社会的飞跃式发展和全球化进程的进一步加快,国际关系更加复杂,国家利益的拓展己超出了传统的疆域范畴,非传统安全威胁明显增多,与此同时,社会矛盾日益凸显,使得军队承担的非战争军事行动越来越多,如:索马里海域护航、国际维和、新疆西藏反恐维稳、雨雪冰冻和地震灾害抢险救灾等,体现了国家意志,维护了国家利益。  相似文献   

10.
空间技术代表着现代高技术的最新发展水平,世界新闻和舆论经常把空间活动中的事件与一个国家的综合实力和国际地位联系在一起,把空间技术比作当今信息社会中综合国力的增长源,经济及社会发展不可缺少的推动力,现代军事力量的倍增器。中国作为发展中国家,通过发展航天技术和开展航天的应用,可以加速解决资源的有效和合理利用问题、减灾和环保问题、缓解沉重的通信问题、扩大受教育面的问题、摆脱贫穷与落后问题,以及促进科学研究和科技创新,以迎接知识经济的挑战。 运载火箭是确保进入空间的能力,是发展空间技术的基础,夺取空间优势的主要…  相似文献   

11.
International Atomic Energy Agency (IAEA) safeguards are under more stress today than at any time in their history. Compliance concerns, a shortage of resources and technology, and growing responsibilities threaten to undermine the effectiveness and credibility of this vital and fundamental pillar of the nonproliferation regime. To address this challenge, the United States recently launched the Next Generation Safeguards Initiative. The goal of this initiative is to ensure the IAEA makes the fullest possible use of its existing authority to prevent the diversion of safeguarded material and to investigate suspicious activities. The initiative will advance state-of-the-art technology, foster the development of a new generation of safeguards experts, and promote technology collaborations and safeguards-conscious infrastructure in states using or pursuing nuclear power. Although it has a domestic focus, the initiative's intent is to catalyze a much broader commitment to international safeguards in partnership with other governments and the IAEA.  相似文献   

12.
This paper studies a strategic conflict between a state and a non-state military organization. The non-state military organization decides whether to attack or not to attack the state, while the state decides on its counter-measure. If the state uses a high level of violence against the non-state organization, it may be accused by the international community of ‘non-proportional’ use of force, and both sides of the conflict take this possibility into account. The model predicts that it may be rational for the non-state organization to attack the state, even if as a reaction the state will militarily destroy this organization, due to a positive probability the state will be punished by the international community for non-proportional use of violence.  相似文献   

13.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   

14.
Recently, post-explosion nuclear forensics, or nuclear attribution, has gained a new spotlight within the nuclear weapons scientific and policymaking community. Academics are beginning to ask whether post-explosion forensics might create a replacement for an international nonproliferation regime, or at least offer a fallback option to deter states and individuals from selling nuclear materials. This paper examines current attribution technology from unclassified literature and finds the technology to be well developed but not foolproof, such that nuclear attribution currently provides little deterrent value. If current capabilities were publicized more thoroughly and if the post-explosion process of assessing the evidence were internationalized, states and intermediate actors might be deterred more effectively. Developing a nuclear fingerprint database is also discussed. While useful, its impact on deterrence would be minimal.  相似文献   

15.
王宝磊  刘杨钺 《国防科技》2021,42(6):129-134
随着人工智能技术的发展,当前国际社会对管控以“杀手机器人”为代表的致命性自主武器系统的呼声日益强烈,对于这类武器系统可能在未来引发伦理和安全危机的担忧逐渐增多。针对致命性自主武器,最严格的观点是全面禁止其研发和使用,以防止“杀手机器人”的出现;较宽松的观点是限制其使用、转让、扩散和购买;介于两者之间的观点是暂停其研发或使用,待相关管控规则形成后,再开展相关活动。本文认为,目前,国际社会就这一军控问题达成共识依然任重道远。根据现实情况,我国不宜过早寻求限制相关技术的研发工作,而应力求先确立管控致命性自主武器部署、使用、流通等方面的规则。  相似文献   

16.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   

17.
社区体育发展理论与实践不仅关系到人们身体健康大事,更关系到和谐社会的大事。随着我国城市化进程的加快,我国社区体育无论从理论还是实践都有较大的发展,但还有许多不足之处,正确认识我国社区体育现状有利于其更加健康的发展。  相似文献   

18.
How are refugees mobilised in identity based conflicts? How do internally displaced persons and refugees become utilised as a multidimensional source of agitation and escalation? Are there steps the international community can take to limit the political radicalisation and militarisation of refugees? The research and policy recommendations that arise in addressing these broad-based research questions represent a test of how the assistance the international community provides to transitional states operates in relation to the internal dialectic of national security. Specifically, a detailed case study of the Abkhaz-Georgian conflict and the degree of refugee militarisation is analysed through a series of state-centric, sociological and military models in order to form a basis for creating new US policy options able to demilitarise existing demographic pressures.  相似文献   

19.
近年来以“东突”为主的恐怖势力在新疆边境地区活动十分猖獗,呈现出联合,渗透对象多元、低龄等特点。公安边防部队地处边境一线,任务艰巨,责任重大,要通过加强反恐情报建设、健全装备保障体制、加强战法研究与战术训练、加强边境管理以及加强国际警务合作等多种对策,不断提高部队打击和防范恐怖活动的能力与水平,为维护边疆稳定做出贡献。  相似文献   

20.
World political events since 9/11 have refocused attention in the development, foreign and security policy spheres on ‘poor performing’ countries, owing to the possible threat that some countries pose to the international community. These countries, referred to by the World Bank as low-income countries under stress (LICUS), are both countries that lack a certain minimum of effective governmental authority and countries that have sufficient effective governmental authority but fail to use it for purposes of development. There is a pronounced global interest in integrating poor performers into the world community and its structures. The stress here is on using development co-operation and to identify meaningful points of departure for co-operation with poor performers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号