首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   475篇
  免费   10篇
  2021年   6篇
  2019年   17篇
  2018年   10篇
  2017年   16篇
  2016年   12篇
  2015年   10篇
  2014年   3篇
  2013年   90篇
  2011年   6篇
  2010年   8篇
  2009年   5篇
  2008年   3篇
  2007年   7篇
  2006年   9篇
  2005年   12篇
  2004年   11篇
  2003年   6篇
  2002年   7篇
  2001年   4篇
  2000年   10篇
  1999年   6篇
  1998年   7篇
  1997年   9篇
  1996年   3篇
  1994年   3篇
  1993年   5篇
  1991年   6篇
  1990年   5篇
  1989年   4篇
  1986年   9篇
  1985年   13篇
  1984年   10篇
  1983年   9篇
  1982年   6篇
  1981年   9篇
  1980年   12篇
  1979年   7篇
  1978年   8篇
  1977年   8篇
  1976年   10篇
  1975年   8篇
  1974年   13篇
  1973年   10篇
  1972年   9篇
  1971年   16篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
  1948年   2篇
排序方式: 共有485条查询结果,搜索用时 15 毫秒
71.

The original Olson and Zeckhauser model of alliance burden‐sharing was based on the following four assumptions: (1) alliance defence is a pure public good; (2) allied nations make their security contribution decisions without consulting the other allies; (3) alliances produce only a single public good; and (4) alliance defence is produced with equal degrees of efficiency in all alliance nations. But while the first of these assumptions has received a great deal of attention in the alliance literature, the remaining ones have received comparatively less attention, particularly in terms of empirical analyses. This paper synthesizes a varied literature developed around these four assumptions, both substantively and theoretically, and shows that when these assumptions are brought closer to real world approximations, hypotheses regarding the potential for security cooperation with less free‐riding result. This article also provides a simple test of Western alliance burden‐sharing in the areas of military spending, development resources spending, and research and development spending that supports the hypothesis positing more equitable burden‐sharing.  相似文献   
72.
Abstract

From the 1982 Maitatsine Uprising to the 2009 Kala Kato Riot, Nigeria has been bedevilled by ethno-religious uprisings with devastating human and material losses. In almost all these crises the police and the military have featured prominently as agencies tasked with the responsibility of maintaining law and order and suppressing insurrection. While it was not alleged that they precipitated some of these risings perhaps in their attempts to stem or nip them in the bud, they have been accused of escalating the conflict either by their slow and inadequate responses, their partisanship and their arbitrary responses, or by their slackness in managing the crises and their aftermath. However, but for their efforts the security basis of the Nigerian state would have been considerably compromised by religious fundamentalism given the level of preparedness of the groups involved, their resistance and, more importantly, the recurrent nature of the uprisings. This article reflects on the management of ethno-religious uprisings in Nigeria by the police and the military. It considers the nature of the security agencies' involvement in the crises and examines the factors both within the agencies and in the larger Nigerian society which have aided or hindered their effective management of the conflicts.  相似文献   
73.
74.
75.
76.
Book Reviews     
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X.

Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3.

Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1.

Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X.

Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4.

Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115.

T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8.  相似文献   
77.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   
78.
79.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
80.
The British provided unprecedented shelter, training and supplies that made possible the revival of a new and better Belgian Army after the crushing German victories in 1940. Starting in Wales in 1940 as a small and disunited group, the Belgians improved more than any of the Allied exile ground forces. By 1944, their independent brigade fought well in Normandy and Belgium, restoring national pride and proving the worth of British help. The parallel and interdependent processes between the British and their Continental guests allows this analysis of the Anglo‐Belgian experience to be useful in considering British Army interactions with the other exiles as well.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号