首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   96篇
  免费   1篇
  2022年   1篇
  2020年   1篇
  2019年   1篇
  2018年   5篇
  2017年   6篇
  2016年   8篇
  2015年   3篇
  2014年   14篇
  2013年   43篇
  2012年   1篇
  2011年   4篇
  2010年   3篇
  2009年   1篇
  2008年   3篇
  2005年   2篇
  1991年   1篇
排序方式: 共有97条查询结果,搜索用时 15 毫秒
11.
In his 2009 Prague speech and the 2010 Nuclear Posture Review, President Barack Obama committed the United States to take concrete steps toward nuclear disarmament while maintaining a safe, secure, and effective nuclear deterrent. There is an inherent tension between these two goals that is best addressed through improved integration of nuclear weapons objectives with nuclear arms control objectives. This article reviews historical examples of the interaction between the two sets of objectives, develops a framework for analyzing opportunities for future integration, and suggests specific ideas that could benefit the nuclear weapons enterprise as it undergoes transformation and that could make the future enterprise compatible with a variety of arms control futures.  相似文献   
12.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system.  相似文献   
13.
This paper models the interactions between the defense needs of the USA and Western Europe, which produce several heterogeneous defense goods, and the defense industry market structure. The results show that net defense costs of the USA and Europe are lower when the number of defense firms in each arms‐producing country is small and when the world prices of the defense goods are high. The model predicts that the increase in world prices will crowd‐out countries in the developing world from the market for modern weapon systems and may force them to develop and use ‘cheap and dirty’ weapon systems.  相似文献   
14.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
15.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   
16.
National security conception or securitization theory frames threats and conceptualizes the responses towards them. But in many cases, and especially in the Israeli context, there is a tendency to blur the nature and essence of different threats; security threats become strategic threats and then existential threats. In the Israeli context, because the broad concept of security is perceived, in most cases, as equivalent to military security, the meaning of the strategic threat will be framed, mostly, militarily, derived from military thought.

The article examines the nature of existential threats in the Israeli context and seeks to find the implications of securitization theory in this regard by analyzing the unique role of the military establishment and the influence of the military thought on strategic thought in Israel. The article also deals with the centrality of ‘military wisdom’ in the Israeli ethos and the sense of insecurity embedded in the Israeli narrative that leads to an ‘intellectual symbiosis’ between the political and the military echelons and finds this phenomenon as one of the major explanations for the influence of the military establishment on defining the nature of security threats as well as on the crucial decision to launch wars.  相似文献   
17.
18.
ABSTRACT

Scholars and practitioners of grand strategy agree that the use of military force should be supplemented by appropriate economic policies. However, strangely few accounts of economic complements to military grand strategies have been presented in recent discourse on US grand strategy. This paper takes a first step to fill this information gap. I first assess the role that could be played by economic measures under two types of grand strategies – one focusing on the balance of power and the other emphasising influence and order. Second, I introduce what I call ‘the influence-capability dilemma’ and discuss tradeoffs in adopting certain economic policies in order to help the US sustain pre-eminence in the international system. Third, I discuss how the US should address this dilemma of economic means in dealing with the rising China.  相似文献   
19.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
20.
美国网络安全战略管理体系分析   总被引:1,自引:0,他引:1  
文章从美国政府颁布的政策文件、法律法规和各机构部门的职能三个方面,对美国网络安全战略管理体系进行了介绍和分析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号