首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   63篇
  免费   0篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   4篇
  2013年   33篇
  2012年   1篇
  2011年   1篇
  2009年   1篇
  2006年   2篇
  2004年   1篇
  2003年   2篇
  1997年   1篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1989年   1篇
  1987年   1篇
  1979年   1篇
  1975年   1篇
  1970年   1篇
排序方式: 共有63条查询结果,搜索用时 281 毫秒
31.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   
32.
In this contribution, Jones focuses initially on the experience of Arms Control and Regional Security (ACRS) and the reasons why this group stalled. The sources of tension that emerged in ACRS, and which ultimately led to its suspension, derived mainly from different views on the relationship between the nuclear and other issues in these talks, as well as the composition of ACRS and its role as a group of the multilateral track of the peace process. Jones emphasizes that regional security discussions in the Middle East must address multiple threats on multiple levels, and ACRS was never politically equipped to do so. Thus, despite the real, if limited, success of ACRS, any real security regime in the Middle East will be the product of a much more inclusive process which recognizes the essential importance of cooperatively addressing multiple security challenges, including those related to the problems of social and economic upheaval in the region. Jones concludes with an argument that the time may be ripe to embark on such a process in the wake of the war in Iraq and other far-reaching indicators of change in the region.  相似文献   
33.
By way of an evolutionary game model we show that mediation in international conflicts might be harmful to the conflicting parties. In fact, under anarchy both parties can be better off than under an international regime if mediation reduces the parties’ reactive capacities (i.e. their abilites to respond to an aggression). This result is applied to issues currently discussed in the literature on international relations such as the role of the United Nations as a mediator of international conflicts.  相似文献   
34.
While popular narratives about success in South Africa focus on individual effort, accidents of birth continue to determine life prospects. Inequalities in early childhood development, health, and education narrow the range of possibilities that young people have available to them, and this impacts on their risk appetite, including, through the workings of the maturing brain, a propensity to violence, substance abuse, and unsafe sex. New technology offers young people an unprecedented ability to organise and network. This fact, combined with high levels of youth dissatisfaction, unemployment, and marginalisation, leads many to worry that the young are “ticking time bombs”. While there certainly are risks, great unused pools of youth labour also present an opportunity for engaging them in social advancement programmes. Structured youth service is a tried and tested policy option that, when implemented as part of an integrated youth development strategy, can enlist thousands of young people in devoting their considerable energies to leadership for the public good.  相似文献   
35.
This article examines the role military intelligence played in the Dhofar campaign between 1970 and 1976. Drawing on an array of sources, it examines not only the crucial role played by military intelligence in prosecuting a successful operational campaign against a Marxist inspired insurgency, but equally, the importance that intelligence played in consolidating the Al Bu Said dynasty when across Oman and Dhofar itself, the material benefits to be had from the discovery and production of oil had yet to be realised.  相似文献   
36.
By drawing on the literature about security regimes, this article posits the idea that a particular type of regime, which can be termed a “tacit security regime” (TSR), has begun to emerge between Israel, on the one hand, and several Gulf Arab states, on the other. It is a regime which, unlike liberal institutional variants that attempt to privilege the promotion of collective norms, remains configured around perceptions of threats to be countered and strategic interests to be realized. By examining the development, scope, and scale of this nascent TSR, this article explores the extent to which Israel, mindful of Washington, DC’s regional retrenchment, sees the emergence of such a regime as redefining the political and strategic contours of Israel’s relations with much of the Middle East.  相似文献   
37.
We develop and estimate optimal age replacement policies for devices whose age is measured in two time scales. For example, the age of a jet engine can be measured in the number of flight hours and the number of landings. Under a single‐scale age replacement policy, a device is replaced at age τ or upon failure, whichever occurs first. We show that a natural generalization to two scales is to replace nonfailed devices when their usage path crosses the boundary of a two‐dimensional region M, where M is a lower set with respect to the matrix partial order. For lifetimes measured in two scales, we consider devices that age along linear usage paths. We generalize the single‐scale long‐run average cost, estimate optimal two‐scale policies, and give an example. We note that these policies are strongly consistent estimators of the true optimal policies under mild conditions, and study small‐sample behavior using simulation. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 592–613, 2003.  相似文献   
38.
In this article, we study the Shewhart chart of Q statistics proposed for the detection of process mean shifts in start‐up processes and short runs. Exact expressions for the run‐length distribution of this chart are derived and evaluated using an efficient computational procedure. The procedure can be considerably faster than using direct simulation. We extend our work to analyze the practice of requiring multiple signals from the chart before responding, a practice sometimes followed with Shewhart charts. The results show that waiting to receive multiple signals severely reduces the probability of quickly detecting shifts in certain cases, and therefore may be considered a risky practice. Operational guidelines for practitioners implementing the chart are discussed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
39.
This article examines the debates in Israel between 2009 and 2013 over Iran’s nuclear programme as a reflection of a particular type of civil–military or civil–security relationship. It analyses how key actors within that relationship – particularly those with an intelligence background – engaged with media outlets in Israel and further afield to influence domestic and international opinion over how best to contain Iran’s nuclear ambitions. In so doing, it seeks to address one fundamental question: are governments in Jerusalem any longer the final arbiters over deciding what is in the national security interests of the State of Israel?  相似文献   
40.
Many studies of terrorism explain the use of violence against civilians with political or economic forces, often relegating social variables to the margins. Social factors, specifically societal-level social capital, play a far more important role in explaining patterns of terrorist activity than previously recognized. Social capital can exert pressures that act as both restraint and catalyst for terrorism, making explicit exposition of these differential effects critical. Analysis shows that higher stocks of social capital positively correlate with the number of terrorist groups, but the average attack activity of those groups increase as measures of social capital decline. The complex relationship makes it difficult to draw simple policy implications, but it does offer insight into the role that social dynamics play in terrorist activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号