首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   179篇
  免费   40篇
  国内免费   4篇
  2023年   1篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   11篇
  2018年   12篇
  2017年   14篇
  2016年   19篇
  2015年   11篇
  2014年   13篇
  2013年   60篇
  2012年   7篇
  2011年   8篇
  2010年   5篇
  2009年   8篇
  2008年   2篇
  2007年   2篇
  2006年   5篇
  2005年   3篇
  2004年   7篇
  2003年   5篇
  2002年   8篇
  2001年   5篇
  2000年   3篇
  1997年   1篇
  1996年   3篇
  1992年   1篇
  1989年   1篇
排序方式: 共有223条查询结果,搜索用时 375 毫秒
201.
The growth and survival of the field of conflict resolution can only be attained if practice is used to generate theory, rather than a reliance on the current situation where theory attempts to direct practice. Some conflict resolution practitioners believe that theory and practice cannot be separated. This article evaluates the art of mediation using Zimbabwe as a case study, where the strategy was used in an attempt to resolve the Zimbabwean conflict that began in 1999. Employing primary and secondary sources, the article delineates the major characteristics of mediation and clarifies principles of the strategy. It further establishes the affinity and dissonance between practice and theory. In addition, it asserts that in the Zimbabwean case, the achievements of insider-partial mediation as a strategy were limited. In the long term the mediation strategy failed because the Government of National Unity did not fulfil all the outstanding issues enunciated by the global political agreement as a precursor to free and fair, credible and legitimate elections. In opposition to the mediation targets towards sustainable peace, Zimbabwe witnessed rushed elections before the accomplishment of the issues at stake, leading to the overall failure of the insider-partial mediation.  相似文献   
202.
Orde Wingate’s Special Night Squads played a key role in defeating the Great Arab Revolt of 1936–1939. Wingate’s Night Squads were distinctive in their approach to counter-insurgency warfare; in addition to bringing Arab insurgents to battle, the Night Squads proved their mettle by ‘flying the flag’ and by improving cooperation between Jewish settlers and British servicemen. Nevertheless, the Night Squad’s accomplishments and legacy must be properly situated within the broader wave of tactical innovations undertaken by the British Army throughout the Rebellion.  相似文献   
203.
ABSTRACT

There is a dearth of studies on indirect victims of sexual violence in counter-terrorism efforts. Using Nigeria as a case study, this paper argues that global and state-level counter-terrorism policies have generally failed to account for the psychological effects of the engagement of female NGO workers in counter-terrorism operations or mitigating the effects of terrorism in conflict zones. Specifically, there has been an increase in sexual violence perpetrated by some members of the security agencies involved in counter-terrorism operations in North-eastern Nigeria. As a result, female NGO workers carry out Medicare, psychosocial counselling and advocacy for these victims. Female NGO workers become exposed to the trauma of victims of sexual violence, which affects their mental health and thus performances in counter-terrorism activities in the country. This altered their worldview on issues of safety even among secured locations or among the presence of security agents and reinforced feelings of powerlessness.  相似文献   
204.
对雷达线性调频脉冲压缩信号进行分析以及仿真,在雷达信号模拟领域中是非常重要的.给出了常规调频脉冲压缩信号以及匹配滤波器模型及仿真结果,并在对某X波段雷达调频脉冲压缩信号处理特点研究的基础上,分析了距离分辨率对不同距离目标分辨的影响,并进行了仿真验证.  相似文献   
205.
针对敌方飞行器隐身、伪装技术的日趋成熟,致使我方由侦察设备获取的电磁信号严重变形,特别是物理特征在目标类型识别中的作用日趋减弱的现实问题,提出了一种融合目标战术特征修正物理特征证据的目标战术类型识别方法。该方法从目标战术类型识别的军事需求出发,提出对冲突物理特征证据的阶梯式修正规则,以及对冲突证据折扣因子的优化方法,并将修正后的证据重新组合得到识别结果。仿真实例证明该方法在处理目标冲突物理特征证据时具有高准确率的特点。该方法为复杂环境下的目标战术类型识别问题提供一种新的解决思路。  相似文献   
206.
The jus ad bellum criterion of right intention (CRI) is a central guiding principle of just war theory. It asserts that a country’s resort to war is just only if that country resorts to war for the right reasons. However, there is significant confusion, and little consensus, about how to specify the CRI. We seek to clear up this confusion by evaluating several distinct ways of understanding the criterion. On one understanding, a state’s resort to war is just only if it plans to adhere to the principles of just war while achieving its just cause. We argue that the first understanding makes the CRI superfluous, because it can be subsumed under the probability of success criterion. On a second understanding, a resort to war is just only if a state’s motives, which explain its resort to war, are of the right kind. We argue that this second understanding of the CRI makes it a significant further obstacle to justifying war. However, this second understanding faces a possible infinite regress problem, which, left unresolved, leaves us without a plausible interpretation of the CRI. This constitutes a significant and novel reason for leaving the CRI out of the international law of armed conflict (LOAC).  相似文献   
207.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   
208.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
209.
This article explores how transnational borderlands matter for conflict prevention and, in particular, so-called upstream engagement, which aims to reduce threats to global stability and security that arise from the world’s increasing interconnectedness. Accounting for transnational borderlands in vulnerable regions is crucial for conflict prevention as pursued by the defence and security sector because borderlands are catalysts of the negative side of global interconnectedness: they are business hubs for transnational organised crime, sites of retreat for conflict actors, and safe havens for terrorists. The border areas’ proneness to impunity and the ability of violent non-state actors to govern these spaces illicitly contribute to the emergence of these characteristics. I therefore argue that upstream conflict prevention needs to do two things to address these risks: first, to overcome a national security approach centred on the borderline and instead acknowledge transnational security dynamics in borderlands on both sides of the border; second, to overcome the state-centred governance lens to also consider governance exerted by non-state actors. The article draws on empirical data from a six-year study including over a year of fieldwork in and on Colombia’s borderlands.  相似文献   
210.
ABSTRACT

The European Union Police Mission for the Palestinian Territories (EUPOL COPPS) was established in 2006 to contribute to the establishment of effective policing in support of an independent and democratic Palestinian state. EUPOL COPPS is often commended for its contribution to the professionalization of the Palestinian security sector under local ownership. Drawing on 40 interviews, we argue that the mission can be considered effective and locally owned only from a narrow technocratic perspective, which denies the political reality of continued occupation and absence of democracy. A broader analysis, which includes the voices of ordinary Palestinians, reveals that EUPOL COPPS contributed to the professionalization of authoritarian policing under continued Israeli occupation. Our findings show the limits of technocratic approaches to peacebuilding interventions and call for a stronger engagement with the ultimate beneficiaries of peacebuilding missions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号