共查询到20条相似文献,搜索用时 109 毫秒
1.
伦理因素是影响国际军备控制进程的重要方面。它与政治、军事、科技、经济等因素既息息相关又有重大区别。从历史来看,伦理因素是军备控制的源头之一,也构成了军备控制进程的主要形式,在军备控制进程中发挥越来越广泛的作用,促使军备控制中更多地考虑国家和解、人道主义、生态环境和公平正义。同时,伦理因素在现有国际关系框架中发挥作用,不可避免地受到国际关系现实的牵制。中国参与国际军备控制的进路,应以构建"人类命运共同体"理念为伦理诉求,强化伦理因素在军备控制进程中的作用,与世界和平力量共同开展军备控制的伦理实践。 相似文献
2.
《国防科技》2005,(11):82-82
下传从指挥高层向低层的信息传输。Back tell——the transfer of information from a higher to a lower echelon of command.背描图在绘图中,在绘制地图图纸的反面所绘制的图形。Back-up——in cartography,an image printed on thereverse side of a map sheet already printed on one side.均势用于军备控制措施的概念,包括有:a、通过协议措施,规定一个国家不能拥有比其他国家强大的军事实力,借此实现军事力量和武器装备的调整;b、在一定的军备控制协议的有效期内,一个国家为了能够应付所有对本国安全可能产生的威胁,所进行的内部调整… 相似文献
3.
美国战略威慑体系由过度依赖核武向外层空间转移的倾向造成对外层空间安全的潜在威胁与挑战。美国导弹防御系统危害外层空间军备竞赛稳定性,全球快速打击系统则损害外层空间危机稳定性,从而对战略稳定性造成严重冲击。美国推进外层空间武器化的做法既对和平利用活动造成了直接威胁,也危害外层空间环境安全、各国主权和个人隐私。美国退出反导条约损害了外层空间国际安全体系,而阻挠防止外层空间武器化和军备竞赛谈判则导致外层空间国际军备控制举步维艰。 相似文献
4.
5.
6.
新形势下,现代边防的安全目标由确保领土主权安全向维护国家利益拓展,威胁因素由传统安全威胁向非传统安全威胁延伸,力量构成由以军事力量为主向党政军警民一体化联防转变,管控方式由单纯依靠己方力量管边控边向国际边防安全合作扩展,必须坚持以总体国家安全观为指导,破除传统思想束缚,强化"大边防"意识,全面维护和促进边防安全与发展. 相似文献
7.
8.
9.
唐继承 《军队政工理论研究》2010,11(4)
非传统安全威胁具有跨国性、多样性、突发性、互动性等特点.军队在应对非传统安全威胁中要积极发挥作用,维护社会稳定,保证经济和社会的正常发展;实施突击救援,保护国家和人民生命财产安全;维护国家利益,支撑国家发展战略;和平造势,稳定周边环境;搭建国家外交的桥梁和纽带. 相似文献
10.
冷战结束,世界军事形势正经历着深刻的变化,世界主要国家都在调整各自军事战略,并把主要注意力转向发展经济,提高综合国力上。各主要国家的军队数量减少,军费下降,军备控制谈判的进程加快。然而,在亚太地区,特别是我周边国家和地区却出现了竞相发展军备的新势头。各国在调整军事战略的同时,纷纷增加防务预算,加紧购置先进武器装备,特别是海军装备,提高海军在三军中的地位,重点加速海军的建设。 相似文献
11.
Kaegan McGrath 《The Nonproliferation Review》2013,20(3):407-433
The rejection of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the U.S. Senate in October 1999 could have been avoided, and the consequences of that vote still loom in the minds of supporters of the treaty. President Barack Obama has embraced the vision of a world free of nuclear weapons, and a key element of the Obama administration's arms control agenda is delivering on U.S. CTBT ratification. In order to secure the two-thirds majority in the Senate necessary to ratify the treaty, senators that remain skeptical of nuclear disarmament must also be convinced that the entry into force of the CTBT is in the national security interest of the United States. This article provides an analysis of the issues surrounding U.S. CTBT ratification divided into three segments—verifiability of the treaty, reliability of the U.S. stockpile, and the treaty's impact on U.S. national security—and concludes that CTBT ratification serves the security objectives of the United States. The CTBT constitutes an integral component of the multilateral nonproliferation architecture designed to prevent the proliferation of nuclear weapons, and it constrains the qualitative development of nuclear weapons, thereby hindering efforts by states of concern to develop advanced nuclear weapons. 相似文献
12.
国防科技和武器装备领域是军民融合发展的重点,也是衡量军民融合发展水平的重要标志。加快国防科技和武器装备军民融合发展,是保军强军的重要支撑,更关乎国家安全和发展一系列重大问题,必须从战略高度深刻领会其全局意义,以清醒头脑研判国防科技和武器装备军民融合发展形势,用务实举措推动国防科技和武器装备军民融合创新发展。 相似文献
13.
面对智能化时代的巨大进步,人工智能安全逐渐成为备受关注的议题。以Web of Science数据库收录的核心论文为研究对象,运用科学计量学方法和可视化技术,对包括国家、机构在内的研究力量分布以及热点、前沿和所涉学科在内的主题内容进行分析和总结。针对潜在的人工智能安全议题,构建定性分析框架,对人工智能安全进行定性定量结合的分析,对人工智能安全技术发展进行初步探索与评估。 相似文献
14.
校园网是利用现代网络技术、多媒体技术等为基础建立起来的主要应用于学校内部的计算机网络。校园网面临着病毒泛滥、非法攻击、未授权访问、盗用网络资源、内部信息非法窃取等一系列安全问题。针对目前校园网内常见的计算机病毒类型和防范措施进行了分析和探讨。 相似文献
15.
制约太空军备竞赛、防止太空武器化已成为维护太空安全、维持全球战略稳定的一个重要方面。构建与完善包括空间物体登记制度、透明与信任建设机制及核查制度在内的太空安全监管制度,对于消除、缓解国家间误解与紧张关系,促进世界主要国家的信任与合作,维护各国太空活动安全,具有积极作用,不失为一条务实、有效的共同抵制太空武器化的重要路径。 相似文献
16.
Steven J. Childs 《Defense & Security Analysis》2012,28(4):343-359
With the burgeoning influence of emerging markets in Asia, a tectonic shift is taking place in the global security landscape. Asian states are concomitantly arming as their economic clout grows. In light of these developments, security analysts would benefit from a formal means of placing these arms acquisitions in a structural context. Are arms acquisitions on par with the expectations of Asian states, given their structural dispositions, or are recent acquisitions beyond anticipated levels? By using a dynamic panel regression of 187 states from 1950 to 2011, this research predicts arms import volume using the degree of interstate arms linkages, the size of a state's military, and its level of economic development. The technique offers analysts a formal means of distinguishing orthodox behavior in importing conventional weapons from extraneous security motivations. The article concludes by generating near-term forecasts of Asian arms imports and discussing the implications of the technique. 相似文献
17.
Dalia Dassa Kaye 《The Nonproliferation Review》2013,20(3):413-428
This article reviews the origins and evolution of the Middle East weapons of mass destruction-free zone (WMDFZ) concept and the proposal for a 2012 conference on the subject, and explores new challenges and opportunities for regional arms control in the current regional environment. It suggests that new models may be necessary to revitalize regional arms control efforts. The establishment of a broad regional security forum could include, but should not be limited to, curtailing weapons of mass destruction through the zone approach. Even if the 2012 conference fails to materialize, or is limited to a one-time event, the proposal for such a conference has provided an important opportunity to rethink future options for a regional arms control and security process. 相似文献
18.
现代防空火控系统的现状及发展方向 总被引:2,自引:0,他引:2
参照国外现代陆用防空火控系统现状 ,结合国内陆用防空火控系统研制情况 ,以功能模块概念阐述现代陆用防空火控系统的组成及各组成分系统的功能。结合近代反空袭作战特点 ,探讨未来陆用防空火控系统的发展方向 相似文献
19.
杨彦文 《中国人民武装警察部队学院学报》2011,(7):15-18
边防工作作为国防的重要组成部分,涉外性强,受周边安全形势影响大。当前,我国的边防工作既面·l盏着难得的发展机遇,同时更要直面各种挑战。分析周边安全环境对我国边防的影响,可以使我们更好地认清形势,趋利避害,抓住机遇,充分发挥职能作用,确保边防安全稳定。 相似文献
20.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献