首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   4篇
  2015年   1篇
  2014年   17篇
  2013年   62篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2009年   6篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
11.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
12.
Neo-conservation     
Africa's wildlife is in danger. The last couple of years have been disastrous for the African elephant as poaching for ivory reached record numbers. Rhinos have been hit hard with several sub-species becoming extinct. The current anti-poaching and anti-trafficking operations lack the sophistication and determination that is found abundantly within criminal organisations immersed in this illicit trade. Terrorism, rebellious elements and corrupt officials all benefit from the destruction of Africa's eco-system and the inaction or lack of efficient action thereof by law enforcement officials. This commentary suggests new courses of action using methods from the fields of counter-terrorism and special operations.  相似文献   
13.
ABSTRACT

Widespread and often exaggerated generalizations about the global spread weapons of mass destruction (WMDs) have proven to be not only misleading and technologically naïve, but also unhelpful in formulating effective policies to counter their threat. The new book by George Mason University's Sonia Ben Ouagrham-Gormley dispels the popular narrative that governments and terror groups can easily—and inevitably will—develop WMDs, particularly biological weapons, by exploring the complex external and internal conditions that such programs require, as demonstrated by the Cold War-era biological weapon programs of the superpowers. This empirically grounded and realistic assessment of how states try—and often fail—to develop such programs offers a more reliable basis to craft realistic counterproliferation policies that can elicit international support.  相似文献   
14.
Abstract

In this research, we analyzed how Turkish financial markets and foreign investors in the stock market reacted to the terror attacks in Turkey. Our analysis, which was performed using the terror index for the stock market and the foreign exchange market, revealed that returns, abnormal returns, and cumulative abnormal returns were not affected by the terror attacks; however, foreign investors in the stock market were affected. When the geographic regions of the terror attacks were analyzed, the findings showed that foreign investors were negatively affected mainly by the terror attacks that occurred in southeast Anatolia. Attack type and target type were important only for foreign investors. An evaluation of the interaction between the terror attacks and the markets with the involvement of the terrorist organizations indicated that only the foreign investors in the stock market were affected by Al-Qaeda and PKK-linked terror attacks. An evaluation of the effect of terror attacks in foreign countries on Turkish financial markets revealed no effect on the domestic stock market and foreign exchange markets. We also examined the volatility spillovers from the terror index to the stock market and found that terrorist attacks increased the volatility of the stock market.  相似文献   
15.
This paper studies a strategic conflict between a state and a non-state military organization. The non-state military organization decides whether to attack or not to attack the state, while the state decides on its counter-measure. If the state uses a high level of violence against the non-state organization, it may be accused by the international community of ‘non-proportional’ use of force, and both sides of the conflict take this possibility into account. The model predicts that it may be rational for the non-state organization to attack the state, even if as a reaction the state will militarily destroy this organization, due to a positive probability the state will be punished by the international community for non-proportional use of violence.  相似文献   
16.
AFRICA     
Political violence, at times perceived as terrorism, remains a major security challenge in Swaziland. The common view is that this violence is perpetrated by those who feel marginalised from the political process. Central to the hypothesis advanced in this paper is that any effective solution to the menace of political violence and the security challenges it poses begins with an awareness of the symbiotic relation between security, human rights and democracy. It has been empirically proven that abuse of human rights can lead to violence, which negates peace and security in any society. In terms of content the paper looks at the shape of political violence in Swaziland. Next, it discusses the strategies and ideas behind efforts by the Swazi state to combat political violence and the counter-arguments. The final section shows the inextricable link between security, human rights and democracy; and argues that recognising this linkage can provide the key to unlocking the security puzzle in Swaziland.  相似文献   
17.
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   
18.
As part of the next phase of the Global Jihad, al Qaeda has been committed to winning popular support among Muslims. Ayman al-Zawahiri and the al Qaeda inner circle recognise that a global terror movement and civil conflicts in the Middle East, brought about by the Arab revolutions, necessitate different operational methods. As such, they have disavowed the Islamic State of Iraq and al-Sham for their insubordination and unconstrained tactics, a move that has implications for the Middle East, international relations, the legitimacy of the al Qaeda leadership, and the future of the Global Jihad.  相似文献   
19.
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
20.
ABSTRACT

Sectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号