排序方式: 共有28条查询结果,搜索用时 15 毫秒
1.
Isabelle Duyvesteyn 《Small Wars & Insurgencies》2017,28(4-5):669-685
AbstractThis introduction to the double special issue on the theme of rebels and legitimacy aims to set out the parameters for the discussion. It looks at legitimacy as a concept and at legitimation as a process. To date most of the literature on legitimacy has focused on the state. However, rebel groups such as insurgents, terrorists, warlords and guerrillas have all had claims, and continue to claim, legitimacy as well. How and when are these rebels seen as legitimate actors? Existing suggestions of rebel legitimacy focus heavily on state models of social order and the social contract. This first contribution discusses how to conceptualize legitimacy and how to make it operational. A two-pronged approach, borrowing heavily from Max Weber, is proposed. Legitimacy is investigated based on beliefs and belief systems about what is considered legitimate. This is combined with practices whereby legitimacy is enacted, copied and emulated by the population the rebels claim to represent. 相似文献
2.
Heather Williams 《The Nonproliferation Review》2013,20(3):493-498
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40. 相似文献
3.
4.
5.
6.
7.
8.
9.
This article considers the preventive flow interception problem (FIP) on a network. Given a directed network with known origin‐destination path flows, each generating a certain amount of risk, the preventive FIP consists of optimally locating m facilities on the network in order to maximize the total risk reduction. A greedy search heuristic as well as several variants of an ascent search heuristic and of a tabu search heuristic are presented for the FIP. Computational results indicate that the best versions of the latter heuristics consistently produce optimal or near optimal solutions on test problems. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 287–303, 2000 相似文献
10.