首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28篇
  免费   0篇
  2020年   2篇
  2018年   1篇
  2017年   2篇
  2015年   1篇
  2014年   2篇
  2013年   16篇
  2000年   1篇
  1996年   1篇
  1986年   1篇
  1981年   1篇
排序方式: 共有28条查询结果,搜索用时 15 毫秒
1.
Abstract

This introduction to the double special issue on the theme of rebels and legitimacy aims to set out the parameters for the discussion. It looks at legitimacy as a concept and at legitimation as a process. To date most of the literature on legitimacy has focused on the state. However, rebel groups such as insurgents, terrorists, warlords and guerrillas have all had claims, and continue to claim, legitimacy as well. How and when are these rebels seen as legitimate actors? Existing suggestions of rebel legitimacy focus heavily on state models of social order and the social contract. This first contribution discusses how to conceptualize legitimacy and how to make it operational. A two-pronged approach, borrowing heavily from Max Weber, is proposed. Legitimacy is investigated based on beliefs and belief systems about what is considered legitimate. This is combined with practices whereby legitimacy is enacted, copied and emulated by the population the rebels claim to represent.  相似文献   
2.
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40.  相似文献   
3.
4.
5.
6.
7.
8.
9.
This article considers the preventive flow interception problem (FIP) on a network. Given a directed network with known origin‐destination path flows, each generating a certain amount of risk, the preventive FIP consists of optimally locating m facilities on the network in order to maximize the total risk reduction. A greedy search heuristic as well as several variants of an ascent search heuristic and of a tabu search heuristic are presented for the FIP. Computational results indicate that the best versions of the latter heuristics consistently produce optimal or near optimal solutions on test problems. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 287–303, 2000  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号