首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   758篇
  免费   51篇
  国内免费   41篇
  2022年   1篇
  2021年   29篇
  2020年   32篇
  2019年   39篇
  2018年   30篇
  2017年   55篇
  2016年   39篇
  2015年   12篇
  2014年   92篇
  2013年   100篇
  2012年   36篇
  2011年   42篇
  2010年   54篇
  2009年   42篇
  2008年   32篇
  2007年   34篇
  2006年   35篇
  2005年   31篇
  2004年   32篇
  2003年   16篇
  2002年   13篇
  2001年   16篇
  2000年   8篇
  1999年   7篇
  1998年   3篇
  1997年   5篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   5篇
  1991年   1篇
  1990年   1篇
排序方式: 共有850条查询结果,搜索用时 15 毫秒
841.
The paper adds to the debate on the relationship between military spending and economic growth by analysing the contribution of a military university centre to regional economic development. It goes beyond traditional economic impact studies by including research related effects and integrating “third stream” activities. Conceptualization and categorization are carried out to thoroughly analyse the different dimensions of knowledge and “third stream” actions. The analysis is performed from its settlement and during its first 5 years of existence which allows showing how the strategy of community engagement is developed. The conclusion suggests that, as traditional military roles extend, and military education institutions become higher education institutions, a comprehensive evaluation should be taken into account to enrich the public debate on government spending.  相似文献   
842.
ABSTRACT

The paper’s goal is to analyses the potential of the Iranian defence industry, including both research-and-development and production capabilities. It is argued that, despite official statements about the great power and sophistication of the Iranian defence industry, in reality its capabilities are very limited and cannot meet the operational needs of the Iranian armed forces. At the same time, it is argued that many official releases, which are abundantly available in the Iranian press and often unthinkingly repeated by the Western media, do not present the real and value of military products, but are rather a tool for deception and propaganda.  相似文献   
843.
ABSTRACT

This article analyses findings from an original survey of 187 private military contractors on their incentives for working in the industry. Perceptions of contractors as “greedy, ruthless, and unscrupulous mercenaries” shape both public and military opinions of outsourcing and may impact U.S. military effectiveness, civil–military relations, and contractor identity. We find that contractors are motivated by a range of factors and that their financial experiences are not clearly more positive than that of state military troops. We recommend broad education of military and defense officials and the public in the U.S. and other relevant nations, regarding the true incentives of modern-day, Western contractors, in an effort to dispel misperceptions, increase effective utilisation of contractors, and beneficially shape PMC-military coordination. DoD may consider integrating such training into its current efforts to improve outsourcing, including its Joint OCS Planning and Execution Course, pre-deployment fora, and curricula of advanced military studies schools.  相似文献   
844.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   
845.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   
846.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
847.
ABSTRACT

The separation of the Indonesian national police (POLRI) from the military (ABRI), now named the TNI, in 1999 led to transfer of domestic security role from the armed forces to POLRI. On one hand, POLRI has a greater role in internal security, particularly in countering terrorism. On the other hand, TNI continually attempts to reassert its dominance in the field of counter-terrorism. Previous studies on the subject place the issue in the context of the early days of democratisation. This paper aims to contribute by counting latest developments, notably the rise of new terrorist groups and recent counter-terrorism legislations. We argue that institutional rivalries between the POLRI and the TNI, and the military's determination to reclaim a greater role in domestic security have become an impediment to achieving successful counterterrorism efforts. This article also examines the development of military reform against the backdrop of the military's disproportionate and growing influence.  相似文献   
848.
ABSTRACT

This paper examines the career of one of the most notable of Chinese state officials in the mid-nineteenth century, General Zuo Zongtang (1812–1885) at a time when the Qing Empire was beset by enemies on all sides along with the massive Taiping Rebellion (1851–65). The paper explores how Zuo created a coherent and flexible counter-insurgency doctrine that underpinned his suppression of the Taipings, the Nian, Muslim rebels of the northwest and the defeat of a massive Sufi revolt in Central Asia. The paper also shows how Zuo helped convince the Russians to return territory they occupied in Central Asia, thereby preserving the territorial integrity of the Qing Empire in the region.  相似文献   
849.
相对固定的军力部署会提前暴露军事意图。为避免此种情况,美军在2018年《国防战略报告》中提出要实现作战的不可预见性。未来美军不可预见的动态军事力量部署一定程度上增加了军事斗争准备难度。为提升军队机场阵地战场生存能力,有必要针对性地调整应对策略,增强对抗“不可预见作战”的能力。本文着眼军用机场阵地,从三个方面分析对抗不可预见作战的伪装策略:首先阐述不可预见作战的特点,其次分析在“不可预见作战”条件下,现有机场阵地在伪装方面的短板,最后提出对抗“不可预见作战”的伪装策略。通过分析认为,为对抗美军新的作战构想,军事机场阵地伪装策略应从战时应用调整为平战结合,应更加侧重平时的伪装训练和伪装工程建设。  相似文献   
850.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号