首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   179篇
  免费   7篇
  国内免费   2篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   4篇
  2018年   15篇
  2017年   21篇
  2016年   14篇
  2015年   8篇
  2014年   20篇
  2013年   77篇
  2012年   1篇
  2011年   5篇
  2010年   5篇
  2009年   3篇
  2008年   1篇
  2005年   1篇
  2002年   2篇
  2000年   1篇
  1991年   1篇
排序方式: 共有188条查询结果,搜索用时 31 毫秒
1.
ABSTRACT

Recent nuclear-weapons-related consultation in NATO within the framework of the Defence and Deterrence Posture Review sheds light on historical experiences with nuclear consultation in NATO. In the early years of the Nuclear Planning Group (NPG), which became the main forum for multilateral nuclear consultation in the alliance, developing a nuclear weapons first use doctrine was of particular importance. This process led to the adoption of the Provisional Political Guidelines (PPGs) on the threat to initiate the use of nuclear weapons. With a focus on West Germany as the primary addressee of the NPG, it will be postulated that nuclear consultation functioned and may still be seen as an essential tool to manage the credibility of US extended nuclear deterrence in the framework of NATO.  相似文献   
2.
陈西文  李根  李可奇 《国防科技》2018,39(4):006-009
陆军装备技术保障能力建设呈现"四个转变"的新形势、新要求,实现转型发展面临"四个不相适应"的现实矛盾,需从更新抓建理念、完善标准体系、固化建设路径、优化运行机制四个方面着手,统筹规划,重点突破,积极稳妥推进陆军装备技术保障能力转型发展。  相似文献   
3.
US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives.  相似文献   
4.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
5.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
7.
Abstract

China has a strong interest in pursuing a smart power strategy towards Southeast Asia and has worked laboriously to engage with regional countries economically, socially, and politically. But China has been only partially successful in achieving its goals in the region. This paper argues that China’s security policy towards Southeast Asia significantly contradicts many other objectives that Beijing wishes to accomplish. Given the deep-seated, narrowly-defined national interests of the Chinese military in the South China Sea disputes, it is likely that the People’s Liberation Army (PLA) will continue to pose the main obstacle to the effective implementation of a Chinese smart strategy in Southeast Asia.  相似文献   
8.
新疆维稳形势严峻,预警是维护社会稳定的重要途径。情报收集是成功预警的前提和基础。当前的新疆维稳预警情报收集工作还存在收集主体素质不高,群众优势未能充分发挥,缺乏有效交流与合作等问题。为此。必须加强情报队伍建设,构筑人民防线,完善协作机制,加强情报交流,以改进情报收集工作。  相似文献   
9.
思想教育是加强军队全面建设、完成各项任务的中心环节,各国军队都十分重视。美军是当今世界各国军队建设中总体水平最高的一支军队。其社会制度性质的不同,决定了美军与我军在思想教育内容上有着本质的区别,但美军对军人进行思想教育的方式方法有值得我们借鉴的地方。考察美军思想教育的历史,总结其特点,得出几点启示,目的是为了不断创新发展我军思想政治教育的形式方法,增强实际效果。  相似文献   
10.
安理会决议表达联合国的意见或意志,具有强制性和法律效力。以安理会第1509号决议为基础,对联合国利比里亚特派团的授权任务进行解析,并论述利政府和联合国利比里亚特派团面临的挑战和相应办法,利于我维和人员了解特派团任务进展情况,有利于更好地执行使命。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号