共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
姜官颖 《中国人民武装警察部队学院学报》2009,25(11):93-96
我国跨境恐怖主义犯罪日益猖獗,不仅造成了大量的无辜平民伤亡和公私财产的损失,而且侵害了其他国家的利益和国际社会的共同秩序。防范和惩治我国跨境恐怖主义犯罪活动,应当坚持经济和社会的协调发展,消除恐怖主义滋生的土壤;积极参与多边安全合作,探寻维护我国安全利益的新途径;完善我国反恐怖主义犯罪的刑事立法。 相似文献
4.
Todd Sandler 《Defence and Peace Economics》2013,24(3):533-548
This article puts forth collection action as a unifying theme for the conference essays on arms trade, control, and production. For each of these topics, collective action failures are related to group size and group composition considerations. Other issues are also examined including the manner in which individual contributions determine the overall level of the associated collective good ‐ the so‐called aggregation technology of public supply. Based on alternative aggregation technologies, the game‐theoretic underpinnings of these arms issues are explored. 相似文献
5.
进入新世纪以来,世界主要军事大国纷纷制定各自的空间战略,推动本国外空军事化进程,外空领域军事竞争愈演愈烈,国际安全面临新的挑战.文章从宏观着眼,综述了主要军事国家的外空领域发展态势,分析了外空军事竞争对国际政治、军事、军控的影响. 相似文献
6.
随着信息技术的发展和应用,人类面临的网络电磁空间安全问题日益突出,正在催生新的战争对抗形式,网络电磁空间安全已成为世界各国国家安全新的焦点。改革开放之后,我国的信息化程度提升很快,来自网络电磁空间的安全威胁骤然增大,而应对网络电磁空间安全威胁却能力不足。文章提出,我们必须加强战略统筹谋划,创新发展装备技术,建立科学评测机制,建设高水平的网络电磁战队伍,形成网络电磁领域的危机管理机制,大力提升我国网络电磁空间安全的防御能力。 相似文献
7.
8.
9.
田源 《中国人民武装警察部队学院学报》2008,24(11):5-10
移民具有经济、社会、政治等多重属性,其对国家安全的影响也涉及多个领域,且具有很强的不确定性。而地缘政治地位关键、领土存在国际争议、非劳动力要素供给缺乏弹性、族群认同超越国家认同和政府履行社会管理职能存在结构性缺陷等条件变量的作用,会显著增加移民的安全风险。这意味着控制移民安全风险的关键在于抑制或消除这些条件变量的作用。 相似文献
10.
Malcolm Mercer 《Arms and Armour》2018,15(1):1-21
During the first half of the 19th century substantial quantities of Oriental and Asiatic arms and armour first began to appear in Britain. On the one hand they certainly reflected the expansion of empire but their wider significance has yet to be discussed. This article seeks to address that omission by exploring the growth of interest in these objects within military circles, what they represented to the individuals who acquired them, and how they fitted into the wider collecting strategies of military officers as a group. 相似文献
11.
Oriana Skylar Mastro 《战略研究杂志》2013,36(2):219-244
On 8 March 2009, five Chinese vessels shadowed and aggressively maneuvered in close proximity to the US Naval Ship (USNS) Impeccable. This paper seeks to explain the incident and its aftermath in the context of Chinese coercive diplomacy. China's strategy, designed to motivate the US to cease surveillance operations near its militarily sensitive areas in the South China Sea, included three components: (1) the use of military provocation, (2) a coordinated media campaign, and (3) a challenge to US interpretations of the United Nations Convention on the Law of the Seas (UNCLOS). This study goes beyond traditional research on Chinese use of force to explain why China's coercive diplomatic campaign took the form it did. Only by understanding the nature and factors affecting Chinese coercive diplomacy can the US design the effective counter strategy needed to protect US regional and global interests. 相似文献
12.
杨海兰 《中国人民武装警察部队学院学报》2013,(12):65-67
广大农村的安全可持续发展是当前经济社会发展和扶贫攻坚战略实施的一项重大课题.以湘西自治州山区农村消防工作为研究对象,对其消防工作发展现状和存在的突出问题进行了认真思考,在此基础上就如何解决当前山区农村消防工作的瓶颈性问题提出了意见和建议. 相似文献
13.
Prakash Singh 《Low Intensity Conflict & Law Enforcement》2002,11(1):94-115
Migrations have taken place from the beginning of history. There has been a general impression that the free movement of people contributes to economic growth. Europe's economic recovery after the Second World War was fuelled in large part by the labour of immigrants. The pendulum has, however, now swung to the other extreme. There is pressure on land, resources are getting scarce and employment opportunities are limited. As a consequence, there is anti-immigrant feeling in several countries. In 1947, when British India was partitioned, Hindus moved out in large numbers from what was carved out as East Pakistan. After the liberation of Bangladesh in 1971, Hindus and Muslims continued to cross over to India for a variety of reasons. It is estimated that about 16 million Bangladeshis have managed to infiltrate into India. The presence of such a large body of immigrants is a strain on India's economy. What is worse, with the rise of Islamic fundamentalism in Bangladesh, the immigrants are also being looked upon as a security threat. 相似文献
14.
15.
16.
Secure second strike nuclear forces are frequently held to be easy to procure. Analysts have long argued that targeting intelligence against relocatable targets like submarine launched and land mobile ballistic missiles is difficult to obtain. However, the scholarly consensus on intelligence for counterforce operations is seriously overdrawn. Both during and after the Cold War, the United States developed substantial intelligence capabilities to track and target submarines and mobile missiles. These efforts achieved important and under-appreciated success. Second strike forces have been far more vulnerable than most analysts are willing to credit. 相似文献
17.
《战略研究杂志》2012,35(5):663-687
Abstract In Western operations in Afghanistan, small European powers escalate in different ways. While Denmark and the Netherlands have contributed to Western escalation through integration with British and US forces, Norway and Sweden have done so by creating a division of labour allowing US and British combat forces to concentrate their efforts in the south. These variations in strategic behaviour suggest that the strategic choice of small powers is more diversified than usually assumed. We argue that strategic culture can explain the variation in strategic behaviour of the small allies in Afghanistan. In particular, Dutch and Danish internationalism have reconciled the use of force in the national and international domains, while in Sweden and Norway there is still a sharp distinction between national interest and humanitarianism. 相似文献
18.
19.
20.
美军信息化联合作战战略新拓展——数据战略与元数据实施研究 总被引:1,自引:0,他引:1
数据战略是信息化条件下美军联合作战战略的新拓展,也是关军未来建军的重点军事战略之一,而元数据是确保数据战略目标实现的核心实施方法。文章从美军数据战略的基础概念起步,介绍了数据战略的三大目标——数据的可视化、可获取和可利用,并围绕这三大目标,分别探索研究其具体实施元数据的功能及结构,最后指出制定数据战略在我军信息化建设中的紧迫性和现实意义。 相似文献