全文获取类型
收费全文 | 570篇 |
免费 | 6篇 |
国内免费 | 5篇 |
专业分类
581篇 |
出版年
2025年 | 2篇 |
2024年 | 2篇 |
2023年 | 3篇 |
2021年 | 14篇 |
2020年 | 9篇 |
2019年 | 30篇 |
2018年 | 30篇 |
2017年 | 34篇 |
2016年 | 35篇 |
2015年 | 17篇 |
2014年 | 51篇 |
2013年 | 98篇 |
2012年 | 14篇 |
2011年 | 27篇 |
2010年 | 36篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 22篇 |
2006年 | 20篇 |
2005年 | 22篇 |
2004年 | 16篇 |
2003年 | 15篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有581条查询结果,搜索用时 0 毫秒
531.
Mikkel Vedby Rasmussen 《Defence Studies》2016,16(4):374-389
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy. 相似文献
532.
Jahara Matisek 《Defense & Security Analysis》2018,34(3):267-290
ABSTRACTThe United States has provided substantial amounts of military assistance and aid since the end of World War Two. During the Cold War, it proved vital in protecting numerous regimes from communist takeovers. Successful outcomes occurred when American leaders made large initial aid commitments, and the states had the capacity and political willpower to use it effectively. However, Vietnam was an example of how U.S. support lagged, as leaders in Saigon preferred political survival instead of creating regime legitimacy. Following 9/11, American security aid focused on making weak countries develop stronger security forces. Unfortunately, this created Fabergé egg militaries: expensive and easily broken by insurgents. This article suggests long-term strategic commitments need to be made alongside more resources for the American State Department and similar organizations to focus on the politics of state-building. Finally, this article suggests strategies, such as “whole-of-government” approaches, to improve long-term security and political institution building. 相似文献
533.
Risks are omnipresent in contemporary international security. Despite a long tradition in security studies going at least back to Von Clausewitz, we consider that the topic of risk remains under-examined. This forum seeks to advance the research agenda on risk in security studies by showcasing work of scholars using advanced concepts of risk, based on insights from sociology, biology, psychology, and safety studies, to better understand the role of risk in international security. As a way of introduction, this short article sets out the main debates. 相似文献
534.
Philip Adémọ́lá Ọláyọkù 《African Security Review》2017,26(4):378-398
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security. 相似文献
535.
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures. 相似文献
536.
537.
在美国大力推动下,韩日政府于2016年11月签署《军事情报保护协定》。本文对韩日签署《军事情报保护协定》的背景和过程进行了梳理,指出了韩日政府关于该协定所存在的主要分歧,分析了该协定签署对东北亚乃至亚太地缘政治安全形势产生的深远影响。 相似文献
538.
Matthew Crosston 《Defense & Security Analysis》2017,33(2):94-105
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way. 相似文献
539.
Raul Gouvea 《Defense & Security Analysis》2017,33(3):223-241
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region. 相似文献
540.
Christo Odeyemi 《Defense & Security Analysis》2015,31(4):293-302
This Critical Comment seeks to situate the United Nations Convention on the Law of the Sea (UNCLOS) within the context of South China Sea (SCS) dispute. Bearing in mind that maritime actions of the main disputants – China, Vietnam, and the Philippines – increasingly “securitise” these long-standing disputes and vice versa, the study examines the concept of a maritime “regime complex.” Whereas efforts have being made to examine UNCLOS and indeed the dispute within the framework of a maritime “regime complex,” the key finding shows that the increased “securitisation” of the disputes makes it difficult to envisage effective engagement of UNCLOS as a resolution mechanism. It will also reveal that China's firmly established expansionist agenda in the SCS region is indicative of Beijing's susceptibility to compromise a diplomatic solution to these long-standing disputes. These discoveries are structured around the knowledge that the spatial relation of the SCS critically espouses not only its geo-strategic significance in terms of natural resources endowment, but also the enduring maritime disputes within the region. 相似文献