首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   414篇
  免费   28篇
  国内免费   6篇
  2023年   4篇
  2021年   9篇
  2020年   9篇
  2019年   13篇
  2018年   9篇
  2017年   20篇
  2016年   20篇
  2015年   14篇
  2014年   34篇
  2013年   130篇
  2012年   17篇
  2011年   23篇
  2010年   26篇
  2009年   24篇
  2008年   13篇
  2007年   23篇
  2006年   8篇
  2005年   14篇
  2004年   5篇
  2003年   4篇
  2002年   4篇
  2001年   8篇
  2000年   5篇
  1999年   2篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
排序方式: 共有448条查询结果,搜索用时 15 毫秒
91.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
92.
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change.  相似文献   
93.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
94.
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。  相似文献   
95.
This article compares the profitability of two pervasively adopted return policies—money‐back guarantee and hassle‐free policies. In our model, a seller sells to consumers with heterogeneous valuations and hassle costs. Products are subject to quality risk, and product misfit can only be observed post‐purchase. While the hassle‐free policy is cost advantageous from the seller's viewpoint, a money‐back guarantee allows the seller to fine‐tune the consumer hassle on returning the product. Thus, when the two return policies lead to the same consumer behaviors, the hassle‐free policy dominates. Conversely, a money‐back guarantee can be more profitable even if on average, high‐valuation consumers experience a lower hassle cost than the low‐valuation ones. The optimal hassle cost can be higher when product quality gets improved; thus, it is not necessarily a perfect proxy or signal of the seller's quality. We further allow the seller to adopt a mixture of these policies, and identify the concrete operating regimes within which these return policies are optimal among more flexible policies. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 403–417, 2014  相似文献   
96.
The authors propose five principles for addressing the major deficiencies of the current treaty-based approach to nonproliferation. These involve: effectively closing the door to withdrawals from the Treaty on the Non-Proliferation of Nuclear Weapons (NPT); defining which nuclear technologies fall within the NPT's “inalienable right” provision, so as to maintain a reasonable safety margin against possible military application; expansion of International Atomic Energy Agency inspections to include greater readiness to use its “special” inspection authority; creation of an NPT enforcement regime, to include a secretariat; and universalizing the NPT so as to apply to all states, while creating a path for current non-parties to come into compliance. There is no illusion here about the prospects for the adoption of this approach. At a minimum, the world needs to be frank about the gap between nuclear programs and current nonproliferation protection. Encouragement of greater use of nuclear power should be predicated on closing that gap.  相似文献   
97.
We investigate whether differences in terrorism risk are mirrored on terrorism risk perception across European countries for the period 2003–2007. We find that the average propensity for terrorism risk concern is affected by actual risk levels. Country and individual heterogeneity contribute substantially to the variation of observed risk perception. Singles and individuals with white collar jobs are less likely to mention terrorism as one of the most pressing issues their country faces, while political positioning towards the right makes it more likely to be concerned about terrorism. As far as competing risks are concerned, we find that the likelihood terrorism is mentioned, decreases with spending on pensions as a percentage of GDP being higher. Finally, based on the Bayesian framework, we also examined the formation of terrorism risk perceptions, and decompose the observed country-level time series of terrorism activity into a long- and a short-run component. We concluded that the observed risk perception variation is only explained by the long-term trend of terrorism activity countries face.  相似文献   
98.
The funding of international nuclear risk mitigation is ad hoc, voluntary, and unpredictable, offering no transparent explanation of who is financially responsible for the task or why. Among many non-nuclear-armed states, this exacerbates a sense of injustice surrounding what they see as a discriminatory nuclear regime. The resulting erosion of the regime's legitimacy undermines support for efforts to prevent nuclear weapons dissemination and terrorism. This article proposes a transparent, equitable “nuclear-user-pays” system as a logical means of reversing this trend. This system envisions states contributing financially to international efforts to mitigate nuclear risks at a level relative to the degree of nuclear risks created by each state. “National nuclear risk factors” would be calculated by tabulating the risks associated with each state's civilian and military nuclear activities, as well as advanced dual-use and nuclear-capable missile activities, multiplying the severity of each risk by the probability of it occurring, and combining these results. A nuclear-user-pays model would create financial incentives for national and corporate nuclear risk mitigation, boost legitimacy and support for nuclear control efforts among non-nuclear-armed states, assist in preventing nuclear weapons dissemination and terrorism, and advance nuclear disarmament by helping progressively devalue nuclear weapons.  相似文献   
99.
The Obama administration has made a great effort to increase the role of advanced conventional weaponry in US national security thinking and practice, in part to help reinvigorate the global nuclear disarmament agenda by reducing the role played by nuclear weapons in the US defense posture. However, such a strategy is fundamentally flawed because increases in US conventional superiority will exacerbate US relative strength vis-à-vis other powers, and therefore make the prospect of a nuclear weapon-free world seem less attractive to Washington's current and potential nuclear rivals. Consequently, it is highly likely that the impact of efforts to increase US advanced conventional superiority through ballistic missile defense and a conventional “prompt global strike” program will ensure that the Obama administration is adopting a pathway to nuclear abolition on which it is the sole traveler for the foreseeable future.  相似文献   
100.
ATOMS FOR PEACE     
Atomic Assistance: How “Atoms for Peace” Programs Cause Nuclear Insecurity, by Matthew Fuhrmann, Cornell University Press, 2012, 344 pages, $29.95.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号