首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   0篇
  2021年   1篇
  2020年   3篇
  2019年   10篇
  2018年   6篇
  2017年   2篇
  2016年   3篇
  2015年   2篇
  2014年   2篇
  2013年   18篇
  2012年   1篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2004年   1篇
排序方式: 共有55条查询结果,搜索用时 453 毫秒
21.
This paper investigates what motivates young people to volunteer for peace-keeping or peace-enforcing missions and how their motives change between pre- and post-deployment. Data include information about social and military background, and motives for more than 600 soldiers, 444 of whom answered the survey both before and after deployment. Soldiers are deployed to different missions under the same circumstances. To conceptualize motives among soldiers, we use factor analysis and find three factors: challenge, self-benefit, and fidelity. Challenge represents an occupational orientation; fidelity, an institutional orientation; and self-benefit, a desire for adventure. Exploiting the within-subject design of our data, we find that pre- and post-deployment motives vary significantly according to the type of mission and soldiers’ previous experiences (first-timers or experienced soldiers). Our results suggest that after the mission, peace-keepers are generally more disappointed than peace-enforcers. Our results also show that self-benefit motives are important for younger soldiers with only a high school education, and that this group usually serves as peace-enforcers during their gap year.  相似文献   
22.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
23.

The aim of this paper is to provide insights on war spending using simple tools of financial calculus rather than developing a general theory. Combining Grossman and Han's theory of war finance with the empirical literature that displays a straightforward relationship between the real value of money and wartime military events, we advocate the use of the real option approach of war spending. Some calculations and an empirical example illustrate this approach.  相似文献   
24.
Uruguay is a country with a very unusual profile, since it has just 3.4 million inhabitants but is among the top ten troop contributors to the UN PKO (Peace Keeping Operations) and is the first contributor per capita. In 2002 and 2003 it was the seventh troop contributor to the UN, and by the end of 2005 it was eighth in the UN ranking. Uruguay has never had any imminent external threat to its security after its independence in 1828, and it has had no internal threat since the end of the urban guerrillas’ actions in the 1970s. The country has no defence industry, and has always had an all‐volunteer military service, which presently involves almost 1% of the total population, and about 2% of the labour force. The empirical evidence presented in this paper shows that, in the past decades, Uruguayan defence spending has been influenced mainly by internal factors, most of them of an economic nature. The high participation in PKO has not increased military expenditure and it has produced a positive impact on the country’s economy.  相似文献   
25.
26.
The dielectric constant (DC) is one of the key properties for detection of threat materials such as Improvised Explosive Devices (IEDs). In the present paper, the density functional theory (DFT) as well as ab-initio approaches are used to explore effective methods to predict dielectric constants of a series of 12 energetic materials (EMs) for which experimental data needed to experimentally determine the dielectric constant (refractive indices) are available. These include military grades energetic materials, nitro and peroxide compounds, and the widely used nitroglycerin. Ab-initio and DFT calculations are conducted. In order to calculate dielectric constant values of materials, potential DFT functional combined with basis sets are considered for testing. Accuracy of the calculations are compared to experimental data listed in the scientific literature, and time required for calculations are both evaluated and discussed. The best functional/basis set combinations among those tested are CAM-B3LYP and AUG-cc-pVDZm, which provide great results, with accuracy deviations below 5% when calculated results are compared to experimental data.  相似文献   
27.
28.
We propose a dynamic escape route system for emergency evacuation of a naval ship. The system employs signals that adapt to the causative contingency and the crew's physical distribution about the ship. A mixed‐integer nonlinear programming model, with underlying network structure, optimizes the evacuation process. The network's nodes represent compartments, closures (e.g., doors and hatches) and intersections, while arcs represent various types of passageways. The objective function integrates two potentially conflicting factors: average evacuation time and the watertight and airtight integrity of the ship after evacuation. A heuristic solves the model approximately using a sequence of mixed‐integer linear approximating problems. Using data for a Spanish frigate, with standard static routes specified by the ship's designers, computational tests show that the dynamic system can reduce average evacuation times, nearly 23%, and can improve a combined measure of ship integrity by up to 50%. In addition, plausible design changes to the frigate yield further, substantial improvements. Published 2008 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
29.
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
30.
Based on the first-person account of coauthor Pierre Billaud, a prominent French participant, this article describes for the first time in such detail the history of the development of the French hydrogen bomb in the 1960s and the organization of military nuclear research in France. The authors illustrate the extent to which French defense and governmental authorities did not support research on thermonuclear weapons until 1966. Billaud, a project insider, relates the historical episodes that led to France's successful 1968 thermonuclear test, including the names of the individuals involved and how a timely tip from a foreign source hastened the success of the first H-bomb test.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号