首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   174篇
  免费   2篇
  2020年   3篇
  2019年   7篇
  2018年   8篇
  2017年   5篇
  2016年   5篇
  2015年   5篇
  2014年   3篇
  2013年   65篇
  2012年   2篇
  2010年   1篇
  2009年   1篇
  2008年   3篇
  2007年   1篇
  2006年   2篇
  2005年   1篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   4篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
  1986年   4篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1980年   2篇
  1979年   1篇
  1977年   2篇
  1976年   2篇
  1975年   2篇
  1973年   1篇
  1972年   1篇
  1971年   2篇
  1970年   1篇
  1969年   1篇
  1968年   2篇
  1967年   3篇
  1966年   1篇
排序方式: 共有176条查询结果,搜索用时 343 毫秒
41.
42.

We analyze theoretically and empirically the effects of economic policy and the receipt of foreign aid on the risk of civil war. We find that aid and policy do not have direct effects upon conflict risk. However, both directly affect the growth rate and the extent of dependence upon primary commodity exports, and these in turn affect the risk of conflict. Simulating the effect of a package of policy reform and increased aid on the average aid recipient country, we find that after five years the risk of conflict is reduced by nearly 30%.  相似文献   
43.
We model an oppressor aiming at victimizing an excluded group in his country, with two main variants. A foreign power affects his behaviour using either conditional aid, subject to the dictator’s participation constraint, or the threat of sanctions, broadly defined, subject to the credibility constraint. The choice between the two is either determined by the latter, or by their relative cost. Aid is preferred when the threat of sanctions is ineffective, and sanctions are too expensive. Sanctions might be imposed, if the threat is ineffective. A case study of the Iraqi Kurds after Iraq was subject to sanctions is presented.  相似文献   
44.
ABSTRACT

The recent use of chemicals in warfare in Syria and Iraq illustrates that, despite the important work of the 1997 Chemical Weapons Convention (CWC), the world has not yet been totally successful in stopping the use of indiscriminate toxic agents in conflicts, either by states or non-state actors. Michael Crowley's excellent and timely new book, Chemical Control, analyzes the use of “riot control agents” (RCAs) and “incapacitating chemical agents” (ICAs), including launch and dispersal systems, by police, paramilitary, and military forces over the last decades and raises the challenging question about where the red line might be drawn between banned and permitted uses of chemicals. He discusses this problem not only in the context of the CWC, which allows use of RCAs for civilian riot control, but also in the context of international law, human rights, and criminal justice, including the Biological and Toxin Weapons Convention and other disarmament and abolition regimes. He proposes a “holistic, three-stage approach” to addressing this issue “for effective regulation or prohibition of the weapon or weapon-related technology of concern.” As we approach the global abolition of a whole class of weapons of mass destruction in the next decade or even sooner, Chemical Control is helpful in better understanding and solving the dilemma of what's actually banned or permitted under international law, and precluding states undermining the chemical weapons ban.  相似文献   
45.
46.
Africa is arguably the most important regional setting for United Nations peacekeeping challenges. In the 1990s, extensive efforts have been made by the United Nations in the fleld of peacekeeping with the speciflc aim of reducing the levels of conflicts on the continent. Another significant development relates to the fact that organisations in Africa have started to feature as important peacekeeping instruments in recent years as it is increasingly being accepted that there is a need for such institutions to take care of their own security requirements. However, a key issue at stake is the need to achieve greater consistency with regard to third-party intervention in African conflicts. A look at the more glaring examples of multinational operations in the name of peace and security gives a sense of the magnitude and difficulties often experienced during such endeavours. In addition, both past and current operations have brought to light certain perspectives and lessons that require careful analysis and study. In this article, an overview is given of some of the perils and challenges associated with multinational operations in the realm of peace and security. Specifically, the focus is on Africa and on key issues and challenges regarding the strategic and operational management of such operations in view of the need to consider a more integrated approach towards multinational operations in support of peace and security in Africa.  相似文献   
47.
Warlord is a label that currently besets us on all fronts. The 2001–2002 military action in Afghanistan is illustrative of the West's ambivalent view of armed factions in the developing world in general. The demonisation of the Taliban and the elevation of the former ‘warlords’ of the opposition to the rather more grandiose sounding ‘Northern Alliance’, at once formalising the hitherto informal nature of the warlord system, implies that the term ‘warlord’ is synonymous with anarchy, violence and a breakdown in civilised values. ‘Warlord’ has become an ugly, detrimental expression, evoking brutality, racketeering and terrorism. Analysts referring to violence across developing countries routinely refer to ‘new wars’ and ‘post-modern’ conflict, and yet the language used to describe these phenomena is usually pre-modern (medievalism, baronial rule, new feudalism). This article outlines some examples of historical warlords and draws out the common issues. In particular it emphasises the fact that warlords have been present for centuries and have periodically emerged whenever centralised political-military control has broken down. All that has changed through history is the technology available to each generation and the relative economic base. The article concludes with a series of implications for policy-makers currently considering intervention in warlord-based economies.  相似文献   
48.
49.
ABSTRACT

In 2014, an affiliate of the Islamic State of Iraq and Syria emerged in Afghanistan. Wilayat Khorasan, or ISIS-K, intends to secure Afghanistan to legitimize the Islamic State’s caliphate across the ‘Khorasan Province’ including portions of Central Asia, China, Iran, the Indian Subcontinent, and Southeast Asia. While the group’s intent is clear, its capability confounds analysts. The authors argue that Wilayat Khorasan is likely the Islamic State’s most viable and lethal regional affiliate based on an expansionist military strategy. This is designed to enable the group’s encirclement of Jalalabad City in Nangarhar Province and is foundational to its expanded operational reach, regionalization, and lethality. Since 2016, the US-led Coalition’s counter-terrorism strategy has disrupted ISIS-K’s critical requirements and prevented external attacks. Yet, raids and strikes alone will not defeat ISIS-K. They must be calibrated against an institution-building approach that legitimizes Afghanistan’s government and redresses grievances that ISIS-K exploits to resolve.  相似文献   
50.
This paper considers the contribution of military publishing to the nineteenth-century military revolution leading to the Great War. The subject is addressed in four contexts. The first is informational, analyzing the role of military publications in making available data and ideas that increased military effectiveness. The second is syncretic, evaluating the effect of military publications on cohesion within increasingly large, complex armies, and between armies and their societies. The third is internal. It discusses the contributions to professional insecurity generated by print, and by its electronic extensions the telegraph and the telephone. Finally, the paper considers the print revolution's influence on actual war-fighting  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号