首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   71篇
  免费   6篇
  77篇
  2021年   1篇
  2020年   3篇
  2019年   2篇
  2018年   3篇
  2017年   5篇
  2016年   5篇
  2015年   3篇
  2014年   7篇
  2013年   30篇
  2012年   2篇
  2011年   3篇
  2010年   3篇
  2009年   5篇
  2008年   3篇
  2005年   1篇
  1991年   1篇
排序方式: 共有77条查询结果,搜索用时 9 毫秒
21.

Although a number of studies concerning Turkish defence-growth relation have been published in recent years, little attention is given the demand for Turkish defence expenditure. This is an important issue for understanding which variables contribute to the determination of the demand for military expenditure. However, it is difficult to develop a general theory or a standard empirical approach for the determination of the demand military expenditure. This study models and estimates the demand for Turkish defence expenditure for the period 1951-1998 using autoregressive distributed lag approach to cointegration (ARDL) following the methodology outlined in Pesaran and Shin (1999). This procedure can be applied regardless of the stationary properties of the variables in the sample and allows for inferences on long-run estimates, which is not possible under alternative cointegration procedures. The findings suggest that Turkish defence spending is determined by NATO's defence spending, Greece's defence spending and some security considerations.  相似文献   
22.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
23.
Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems.Smart cities,smart homes,ambient intelligent systems,or network-centric defense systems are among these application domains.Data Distribution Service(DDS)is a communi-cation mechanism based on Data-Centric Publish-Subscribe(DCPS)model.It is used for distributed systems with real-time operational constraints.Java Message Service(JMS)is a messaging standard for enterprise systems using Service Oriented Architecture(SOA)for non-real-time operations.JMS allows Java programs to exchange messages in a loosely coupled fashion.JMS also supports sending and receiving messages using a messaging queue and a publish-subscribe interface.In this article,we pro-pose an architecture enabling the automated integration of distributed real-time and non-real-time systems.We test our proposed architecture using a distributed Command,Control,Communications,Computers,and Intelligence(C4I)system.The system has DDS-based real-time Combat Management System components deployed to naval warships,and SOA-based non-real-time Command and Control components used at headquarters.The proposed solution enables the exchange of data between these two systems efficiently.We compare the proposed solution with a similar study.Our solution is superior in terms of automation support,ease of implementation,scalability,and performance.  相似文献   
24.
This article addresses the concept of quality risk in outsourcing. Recent trends in outsourcing extend a contract manufacturer's (CM's) responsibility to several functional areas, such as research and development and design in addition to manufacturing. This trend enables an original equipment manufacturer (OEM) to focus on sales and pricing of its product. However, increasing CM responsibilities also suggest that the OEM's product quality is mainly determined by its CM. We identify two factors that cause quality risk in this outsourcing relationship. First, the CM and the OEM may not be able to contract on quality; second, the OEM may not know the cost of quality to the CM. We characterize the effects of these two quality risk factors on the firms' profits and on the resulting product quality. We determine how the OEM's pricing strategy affects quality risk. We show, for example, that the effect of noncontractible quality is higher than the effect of private quality cost information when the OEM sets the sales price after observing the product's quality. We also show that committing to a sales price mitigates the adverse effect of quality risk. To obtain these results, we develop and analyze a three‐stage decision model. This model is also used to understand the impact of recent information technologies on profits and product quality. For example, we provide a decision tree that an OEM can use in deciding whether to invest in an enterprise‐wide quality management system that enables accounting of quality‐related activities across the supply chain. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
25.
26.
An extensive literature on the effect of military expenditures on economic growth yields conflicting results. However, a crucial issue that has not been investigated in this context is the possible effect of inequality. The impact of military expenditures on economic growth in Turkey has also received substantial attention. Yet, the majority of these studies are not constructed based on a structural model, but rather examine the causality between the variables in question. Considering these two shortcomings in the literature and the lack of consistent results, this study attempts to provide further evidence for the relationship between military expenditures and economic growth for the case of Turkey by considering income inequality within an augmented Solow growth model. Our findings for the 1963–2008 period show that while income inequality has a positive impact on economic growth, military expenditures have no significant effect.  相似文献   
27.
There is currently a lack of knowledge about how elites rule post-civil war societies without strong state institutions. This paper argues that elites oftentimes overcome such institutional deficiencies by engaging in governance through brokerage. According to this perspective, elites outsource central state functions to influential broker figures. This is particularly true when dealing with war-affected groups that possess much violent agency. By functioning as social membranes, brokers can help elites and war-affected groups to redefine a new social contract. Liberia is employed as an example to illustrate the paper’s central arguments.  相似文献   
28.
We study a war scenario in which the winner occupies the loser’s territory. Attacking a territory increases the chance of winning, but also causes harm, which in turn decreases the territory’s value (i.e. the reward of winning). This paper highlights the effects of this trade-off on the equilibrium strategies of the warring states in a contest game with endogenous rewards. Providing both static and dynamic models, our analysis captures insights regarding strategic behavior in asymmetric contests with such conflict.  相似文献   
29.
ABSTRACT

There have been calls for the abolition of nuclear weapons from the day they were invented. Over the last fifteen years, some indications can be found that such calls have been getting louder, among them Barack Obama's famous 2009 speech in Prague. In this article, we investigate if support for a comprehensive norm that would prohibit development, possession, and use of nuclear weapons is really growing. To assess the current status of that norm, we use the model of a “norm life cycle,” developed by Martha Finnemore and Kathryn Sikkink. We then analyze 6,545 diplomatic statements from the review process of the Treaty on the Non-Proliferation of Nuclear Weapons as well as from the UN General Assembly First Committee on Disarmament and International Security, covering the years 2000 to 2013. The evidence shows that a comprehensive prohibition can be considered an emerging international norm that finds growing support among states without nuclear weapons and nuclear weapon states alike. Only a core group of states invoke the norm consistently, however. This leads us to conclude that the “tipping point” of the life cycle, at which adherence to a new norm starts to spread rapidly, has yet to be reached.  相似文献   
30.
A naval task group (TG) is a collection of naval combatants and auxiliaries that are grouped together for the accomplishment of one or more missions. Ships forming a TG are located in predefined sectors. We define determination of ship sector locations to provide a robust air defense formation as the sector allocation problem (SAP). A robust formation is one that is very effective against a variety of attack scenarios but not necessarily the most effective against any scenario. We propose a 0‐1 integer linear programming formulation for SAP. The model takes the size and the direction of threat into account as well as the defensive weapons of the naval TG. We develop tight lower and upper bounds by incorporating some valid inequalities and use a branch and bound algorithm to exactly solve SAP. We report computational results that demonstrate the effectiveness of the proposed solution approach. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号