首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   1篇
  2020年   1篇
  2019年   1篇
  2017年   3篇
  2015年   2篇
  2014年   1篇
  2013年   1篇
排序方式: 共有9条查询结果,搜索用时 15 毫秒
1
1.
The swearing in of Donald Trump as the 45th President of the United States presages, at the very least, a period of flux in American strategy with respect to the relationship between nuclear weapons and alliances. In this response to three thoughtful rejoinders to our article, “Nuclear weapons, the United States and alliances in Europe and Asia: Toward an institutional perspective,” we clarify key aspects of our argument and discuss why alliance institutions are likely to be relatively robust in the face of change, how they can influence national decision-making, and argue that they may exert a moderating influence over the new administration.  相似文献   
2.
Stephan Rosiny 《Civil Wars》2015,17(4):485-502
Most countries of the Arab Mashrek are multi-ethnic and multi-sectarian. In recent years, most of them have experienced violent clashes between groups that frame their conflicts along ethnic-sectarian lines. This article investigates the Lebanese Ta’if Agreement of 1989 as a crucial case study of how to manage such conflicts through a transitory power-sharing arrangement. It presents several provisions of this agreement that adhere to three different approaches of how to deal with such conflicts: the consociational and the centripetal models of power-sharing as well as the integrationist paradigm. It thereby seeks to develop a theoretical argument about chances and risks of transitory power-sharing in deeply divided societies and derives some general lessons for managing conflicts in the Middle East.  相似文献   
3.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
4.
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change.  相似文献   
5.
The UN asks governments to report key figures of their annual military budgets with the aim of creating trust among member states. This goal can only be achieved if the data reported is accurate. However, although there are many reasons for governments to falsify data, the UN does not check for manipulation. In this paper, we apply Benford’s law to the military expenditure data of 27 states taken from the UN register. Our analysis of the first digits shows that the states with the greatest deviations from the expected Benford distribution and therefore the lowest data quality are the USA and the UK.  相似文献   
6.
7.
Hub terminals are important entities in modern distribution networks and exist for any transportation device, that is, cross docks and parcel distribution centers for trucks, container ports for ships, railway yards for trains, and hub airports for aircraft. In any of these hubs, the mid‐term planning task of synchronizing the transshipment of goods and passengers when servicing the transportation devices has to be solved, for which many different solution approaches specifically tailored to the respective application exist. We, however, take a unified view on synchronization in hubs and aim at a general building block. As a point of origin, a basic vertex ordering problem, the circular arrangement problem (CAP), is identified. We explain the relation between the CAP and hub processes, develop suited algorithms for solving the CAP, and extend the basic CAP by multiple additions, for example, arrival times, limited storage space, and multiple service points, make the problem adaptable to a wide range of hub terminals. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 454–469, 2015  相似文献   
8.
Put-to-light order picking systems invert the basic logic of conventional picker-to-parts systems. Instead of successively visiting the storage positions of the stock keeping units (SKUs) when collecting picking orders, an order picker accompanies successive bins each containing multiple items of a specific SKU along a lane of subsequent orders. Whenever the picker passes an order requiring the current SKU, which is indicated by a light signal, she puts the requested number of items into the bin associated with the order. Such an order picking system is well-suited if the assortment is not overly large and all orders demand similar SKUs, so that it is mainly applied in distribution centers of brick-and-mortar retail chains. This paper evaluates four different setups of put-to-light systems, which, during operations, require the solution of different storage assignment and SKU sequencing problems. We formulate these problems, prove computational complexity, and suggest suited solution algorithms. By applying these algorithms in a comprehensive computational study, we benchmark the impact of the four different setups on picking performance. In this way, warehouse managers receive decision support on how to set up their put-to-light systems.  相似文献   
9.
Most countries put significant amounts of time and effort in writing and issuing high-level policy documents. These are supposed to guide subsequent national defence efforts. But do they? And how do countries even try to ensure that they do? This paper reports on a benchmarking effort of how a few “best of breed” small- to medium-sized defence organisations (Australia, Canada, and New Zealand) deal with these issues. We find that most countries fail to link goals to resources and pay limited attention to specific and rigorous ex-ante or post-hoc evaluation, even when compared to their own national government-wide provisions. We do, however, observe a (modest) trend towards putting more specific goals and metrics in these documents that can be – and in a few rare cases were – tracked. The paper identifies 42 concrete policy “nuggets” – both “do’s and don’ts” – that should be of interest to most defence policy planning/analysis communities. It ends with two recommendations that are in line with recent broader (non-defence) scholarship on the policy formulation-policy implementation gap: to put more rigorous emphasis on implementation (especially on achieving desired policy effects), but to do so increasingly in more experiential (“design”) ways, rather than in industrial-age bureaucratic ones (“PPBS”-systems).  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号