首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83篇
  免费   0篇
  2020年   1篇
  2019年   1篇
  2018年   7篇
  2017年   7篇
  2016年   10篇
  2014年   8篇
  2013年   48篇
  2007年   1篇
排序方式: 共有83条查询结果,搜索用时 18 毫秒
21.
In this paper I shift the focus of real exchange rate analysis from conventional macroeconomic variables, which have failed to explain changes in floating real dollar exchange rates, to military security variables, which show an uncanny ability to explain the pattern of floating real exchange rate changes among NATO‐area floating currencies from early 1973 through the failed Soviet coup of August, 1991.  相似文献   
22.
This article argues that aspirations of maintaining a dominant influence over sub-Saharan security issues has spurred the French and British leadership of European Union (EU) foreign and security policy integration, just as it has informed military capability expansions by the armed forces of the main EU powers. While Europe's initial African focus was on stabilising a continent marred by state failure, civil wars and genocides, changes in the global security context, especially the shift towards multipolarity manifest in China's growing engagement, has prompted a complementary focus on deterring other powers from making military inroads into the subcontinent. Hence Europe's sub-Saharan security focus is shifting from stabilisation towards deterrence. This helps explain recent military procurements which, in spite of the extremely challenging fiscal position of most EU member states, feature large-scale investments in long-range deterrence capabilities.  相似文献   
23.
24.
The Soviet Biological Weapons Program: A History. by Milton Leitenberg and Raymond A. Zilinskas (with Jens H. Kuhn), Harvard University Press, 2012. 921 pages, $55.  相似文献   
25.
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   
26.
ABSTRACT

Since the 1950s, the United States has engaged in nuclear sharing with its NATO allies. Today, 150-200 tactical nuclear weapons remain on European soil. However, the Treaty on the Non-proliferation of Nuclear Weapons (NPT) prohibits the transfer of nuclear weapons to non-nuclear weapon states. The potential discrepancy between text and practice raises the question of how the NPT's negotiators dealt with NATO's nuclear-sharing arrangements while drafting the treaty that would eventually become the bedrock of the international nonproliferation regime. Using a multitiered analysis of secret negotiations within the White House National Security Council, NATO, and US-Soviet bilateral meetings, this article finds that NATO's nuclear-sharing arrangements strengthened the NPT in the short term by lowering West German incentives to build the bomb. However, this article also finds that decision makers and negotiators in the Lyndon B. Johnson administration had a coordinated strategy of deliberately inserting ambiguous language into drafts of Articles I and II of the Treaty to protect and preserve NATO's pre-existing nuclear-sharing arrangements in Europe. This diplomatic approach by the Johnson administration offers lessons for challenges concerning NATO and relations with Russia today.  相似文献   
27.
ABSTRACT

The 1993 Highly Enriched Uranium (HEU) Purchase Agreement between the United States and Russian Federation is often described as one of the world's most successful nuclear nonproliferation programs. In 2013, the two states achieved the agreement's major goals of downblending 500 metric tons of Russian weapon-origin HEU to low enriched uranium (LEU) and delivering all resultant LEU to the United States. At one time, the LEU delivered under the agreement generated nearly 10 percent of all electricity in the United States. The agreement achieved its nonproliferation goals through a unique government/industry partnership. Commercial executive agents contracted for the annual sale and delivery of downblended LEU, while the US and Russian governments exercised reciprocal transparency monitoring measures to demonstrate that all LEU delivered under the agreement was derived from Russian weapons-origin HEU, and that the same LEU was used for exclusively peaceful purposes in the United States. The commercial development, negotiations, and implementation of the agreement have been well documented. This article describes the scope of US transparency monitoring activities in Russian HEU processing facilities, as well as Russian monitoring in the United States. In addition, it discusses the results of twenty years of reciprocal transparency monitoring and data analysis, and outlines lessons learned that are potentially applicable to future transparency monitoring and verification regimes and similar cooperative efforts.  相似文献   
28.
The roots of the information technology Revolution in Military Affairs (RMA) can be traced to the mid-1970s, when the West capitalized on scientific-technological developments to neutralize the threat posed by Soviet second echelons. However, the cultivation of the technological seeds of the American RMA preceded the maturation of the conceptual ones. Although it was the US that was laying the technological groundwork for the RMA, Soviet, rather than the American military theorists, were the first to argue that the new range of technological innovations constituted a fundamental discontinuity in the nature of war, which they dubbed the ‘Military-Technical Revolution’ (MTR). About a decade later, this fundamental Soviet approach to the transformations in military affairs was analyzed, adapted and adopted by the US, and designated the RMA. This article deals with the intellectual history of the Soviet MTR and the American RMA.  相似文献   
29.
Since Operation Enduring Freedom, Central Asian militants, such as the Islamic Movement of Uzbekistan, have fled to Pakistan from their previous strongholds in Afghanistan. However, many militants have begun returning to Central Asia. Thus questions are raised as to what extent militancy has the potential to thrive with the pending North Atlantic Treaty Organization withdrawal from Afghanistan set for 2014? Is militancy a legitimate security threat to Central Asia? What strategies might militants implement? Thus, this article examines the current state of militancy, analyzes militant trends, introduces Afghanistan and Pakistan into the Central Asian equation, and determines the militants' capability and overall strategy. The article concludes that militant Islam, regardless of its current numbers, remains a viable threat to regional security, Afghanistan will be an essential factor for the future of Central Asian militancy, and the form this re-emergence will take becomes apparent.  相似文献   
30.
Drawing on evidence collected from eyewitness interviews, new Russian secondary sources, as well as recently declassified documents from both sides, the author significantly widens the academic understanding of the maritime dimension of this gravest crisis of the Cold War. Most significant is her conclusion that Soviet commanders were led by complex and challenging tactical circumstances, including unreliable communications and malfunctioning equipment, which might have prompted them to contemplate a resort to tactical nuclear weapons on more than one occasion. Almost as disturbing is the revelation that US forces were not aware of this particular threat. This research reveals how a chain of inadvertent developments at sea could have precipitated global nuclear war, underlining the extreme danger of the crisis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号