排序方式: 共有141条查询结果,搜索用时 171 毫秒
1.
2.
3.
中国非传统安全面临的挑战及思考 总被引:3,自引:1,他引:2
高太存 《中国人民武装警察部队学院学报》2007,23(1):6-8
在对我国21世纪初期安全环境进行综合分析判断的基础上,重点从金融、环境、信息安全、流行疾病、人口安全等方面对中国非传统安全领域面临的挑战进行了深入的分析,探究了非传统安全因素对国家安全形势的影响,提出了有利于安全环境的几点预防性对策。 相似文献
4.
5.
Christian Tripodi 《战略研究杂志》2017,40(7):990-1015
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy. 相似文献
6.
Jordan Becker 《Defense & Security Analysis》2017,33(2):131-157
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners.. 相似文献
7.
8.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method. 相似文献
9.
马砚斌 《武警工程学院学报》2014,(2):88-91
从资源的建设、整合、布局、共享和服务等方面,多角度分析了武警工程大学在体制编制调整后,图书馆存在的问题及其发展方向,并对大学图书馆的发展定位提出了参考性的建议。 相似文献
10.
This article proposes a strategic reason for a proprietary component supplier to license her technology to a competitor or a manufacturer: her anticipation of the manufacturer's strategic commitment to invest in research and development (R&D). We address this phenomenon with a game theoretic model. Our results show that the manufacturer's full commitment to invest in R&D enables the supplier to license, sell a larger quantity through the supply chain, and charge lower prices. These results are robust to the type of demand uncertainty faced by the manufacturer within the class of increasing generalized failure rate distributions. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 341–350, 2014 相似文献