首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   63篇
  免费   2篇
  2021年   1篇
  2019年   3篇
  2017年   2篇
  2016年   7篇
  2015年   3篇
  2013年   18篇
  2012年   2篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2008年   3篇
  2007年   1篇
  2006年   3篇
  2005年   3篇
  2004年   4篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1997年   1篇
  1986年   2篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有65条查询结果,搜索用时 171 毫秒
61.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
62.
In 2014, Colonel M. Shane Riza published an article in this journal arguing that remotely piloted aircraft (RPA) and robotic weapons threaten the US Air Force’s warrior ethos. Riza has clearly articulated the sentiments of one side of a vibrant debate within our service. This paper presents an alternative view; a view held by some who have experienced these new forms and tools of war, and who have wrestled with their implications first-hand. In this paper, we address some methodological concerns with Riza’s approach and then engage some misunderstandings about RPA’s relationship to military history and to risk. The second part of this paper takes a close look at some of the early Just War thinkers to determine what implications the tradition may have on the warrior ethos. We propose, as an alternative to Riza’s position, a return to an ethos grounded in humility, charity, and a conception of war as a last resort; in short, a return to the Just Warrior Ethos.  相似文献   
63.
ABSTRACT

Increasing attention paid to US casualties in far-flung places such as Tongo Tongo, Niger, and headlines claiming ‘secret wars’ have fueled discussion about American military’s involvement in Africa. Though the continent has been a part of the American way of war since the beginnings of the US – consider the early combat actions of US Marines in Tripoli –, current African conflicts are challenging our understanding of war and approaches to winning it. This article examines the ways America seeks to achieve its ends in Africa with a particular focus upon the last 10 years of US counter-terrorism and stability operations in Niger and the Sahel Region. The author proposes unifying American, Allied, and partner efforts through a strategy of Active Containment.  相似文献   
64.
65.
Military operations increasingly require cooperation between agencies within the same nation, but also collaboration with security and military organizations internationally. Throughout history multinational military cooperation has often been an appropriate way to conduct major operations; national manpower and material resources are generally insufficient to address the demands of missions worldwide. The desire to optimize the use of scarce research and development and investment capabilities, the need for international legitimacy and political support, and the fact that today’s risks transcend national borders, have rendered multinational cooperation in the security domain unavoidable. With joint operations comes the requirement for multi-partner- and multinational information sharing. However, information sharing has both advantages and costs, and is subject to both enabling factors as well as barriers. This paper reflects on theories, both classical and current, as well as empirical case studies, to examine the pros and cons of multinational information sharing, and the factors that conduce or interfere with the transmission and the receipt of intelligence. The importance of a holistic approach and of learning lessons learned are two key lessons gleaned from the analysis, along with an emphasis on developing both the organizational and the interpersonal enablers of information sharing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号