首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283篇
  免费   2篇
  国内免费   1篇
  286篇
  2021年   3篇
  2020年   17篇
  2019年   26篇
  2018年   24篇
  2017年   28篇
  2016年   21篇
  2015年   4篇
  2014年   27篇
  2013年   73篇
  2012年   11篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有286条查询结果,搜索用时 15 毫秒
11.
从体育比赛的角度,以“体育比赛是战争”这一概念出发,浅谈体育新闻报道军事化倾向及其产生的文化渊源,同时就英汉体育用语军事化程度进行比较,进一步探讨军事化用语应该把握的尺度。  相似文献   
12.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
13.
吴起是战国时期伟大的军事家,他在继承前人兵学理论、总结当时战争经验的基础上,系统地论述了其战争观念,并形成了许多新的见解。其战争观丰富了中国古代的兵学理论,在中国兵学发展史上具有重大的意义。  相似文献   
14.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
15.
ABSTRACT

This article analyses the positions of the Chinese civilian leaders and military elites on Military Operations Other Than War in order to shed light on their preferences about the use of the armed forces in foreign policy between the late 1990s and the early 2010s. Over time, a significant divergence developed between civilians and soldiers until 2011, when the Libyan crisis happened. The study also prompts important considerations about our understanding of civil–military relations in China and future role of the People’s Liberation Army as a tool of statecraft in foreign policy.  相似文献   
16.
    
ABSTRACT

The post-Cold War period nearly up to the present has been characterised as the age of liberal wars, yet key facets of the liberal guidance of war remain under appreciated. This article seeks to address this wider gap with regard to the particular concern of war termination and the fulfilment or failure of policy. First, it develops characterisations of liberal wars based on the existing literature, identifying three broad types through consideration of context—defensive versus offensive—and of political and strategic agency, particularly regarding the motives for and intents of action. Three types of liberal wars result: defensive liberal wars, offensive liberal wars with humanitarian motive and geopolitical intent, and offensive liberal wars with geopolitical motive and humanitarian intent. The article then presents one exemplary case for each liberal war with an emphasis on how liberal strategy required an illiberal ally and that ally's effect on the subsequent peace.  相似文献   
17.
    
ABSTRACT

Today, it is widely held that while authorization may be helpful in assuring that the other jus ad bellum criteria are met, legitimate authority is not itself a condition for just recourse to war. Or, if it is necessary, it is said to be a trivial requirement, as mobilization for war requires some political authorization. Those who would retain the legitimacy requirement have differing views about who the proper authority is. I argue that, reasonably understood, legitimate authorization is necessary for jus ad bellum. Considerations of agency and consent in force combine with the social contract to commit us to deferring to recognized authorities. These obligations are strengthened by the epistemic reliability and pragmatic value conferred by governing institutions and procedures limiting recourse to war. These same rationales imply that the U.N. Security Council should regulate the international use of force. I qualify that if higher authorities fail to act, other subsidiary authorities may then authorize force. However, the move to each subsequent level of authorization must be justified. Understood in this way, the requirement that wars not be fought without legitimate authorization is a non-trivial, necessary procedural jus ad bellum condition.  相似文献   
18.
    
ABSTRACT

The legitimate authority principle has become reduced to the issue of state authority. In its current formulation, the state has the sole authority to wage war, and because non-state actors, by their very definition, cannot satisfy this principle, their use of force is inherently unethical. This does not reflect the reality that non-state actors are increasingly engaging in the use of force, sometimes legitimately. As a result, the legitimate authority principle can and should look beyond the state. This article navigates a terrain in which non-state actors engage in the use of force, and in which revisionist just war thinking proposes that the concept of legitimate authority is irrelevant to thinking about the ethics of war. It proposes a principled approach to the inclusion of some non-state actors under the rubric of legitimate authority. This approach draws upon the historical development of the legitimate authority principle and incorporates the factors important to early writers on the subject.  相似文献   
19.
    
ABSTRACT

This article argues that the US Navy’s roles (which have historically been bifurcated between warfighting and political use of force) manifest in its organisational culture as two different concepts of war: the US Navy as diplomatic actor and the US Navy as warfighting force. The conflict between these different concepts of war can be seen in the current debate about the definition and function of presence. The debate about presence is not just theoretical, but represents a deep and enduring conflict within the Navy as an organisation about its concept of war. Since the end of WWII, the Navy has been designing its fleet architecture according to a Mahanian concept of war, despite the preponderance of non-lethal missions and activities. The result is a mismatch between platforms and tasks.  相似文献   
20.
当前,边境安全形势复杂、训练理念陈旧、部队勤训矛盾突出、训练内容与安排不合理、训练保障能力有限等主客观因素,制约着公安现役部队非战争军事行动训练的开展,对公安现役部队形成非战争军事行动战斗力构成了挑战。树立科学的非战争军事行动训练指导思想与理念,创新训练方法和手段,优化训练内容,加强教员队伍建设和训练基地建设,是改进非战争军事行动训练的有效对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号