全文获取类型
收费全文 | 582篇 |
免费 | 9篇 |
出版年
2021年 | 10篇 |
2019年 | 10篇 |
2018年 | 5篇 |
2017年 | 7篇 |
2016年 | 9篇 |
2015年 | 6篇 |
2014年 | 6篇 |
2013年 | 111篇 |
2009年 | 5篇 |
2008年 | 4篇 |
2007年 | 14篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 10篇 |
2002年 | 8篇 |
2000年 | 5篇 |
1999年 | 6篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 12篇 |
1995年 | 7篇 |
1994年 | 11篇 |
1993年 | 13篇 |
1992年 | 8篇 |
1991年 | 12篇 |
1990年 | 11篇 |
1989年 | 21篇 |
1988年 | 20篇 |
1987年 | 12篇 |
1986年 | 19篇 |
1985年 | 10篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 17篇 |
1981年 | 7篇 |
1980年 | 11篇 |
1979年 | 12篇 |
1978年 | 10篇 |
1977年 | 9篇 |
1976年 | 6篇 |
1975年 | 8篇 |
1974年 | 13篇 |
1973年 | 10篇 |
1972年 | 7篇 |
1971年 | 14篇 |
1970年 | 8篇 |
1969年 | 10篇 |
1968年 | 6篇 |
1967年 | 8篇 |
1948年 | 4篇 |
排序方式: 共有591条查询结果,搜索用时 15 毫秒
571.
We identify the causal effect of a reduction in military personnel on a number of socioeconomic indicators within the peripheries of military bases. The base realignments and closures in Germany are used as an exogenous source of variation that allows us to identify the effect of a demand shock on household income, output, unemployment, and tax revenue within a specified buffer zone around each base. The analysis covers 298 communities for the period 2003–2007. Consistent with evidence found elsewhere, we find that these base adjustments have only a marginal impact on the local community in which the bases are located. 相似文献
572.
Michael W. Chinworth 《Defence and Peace Economics》2013,24(2):369-401
Defense budgets in Japan have been complicated compromises from numerous inputs ‐ including threat perceptions, domestic industrial/technological base development, support for the bilateral security treaty with the United States and internal bureaucratic politics ‐ but with the fall of the former Soviet Union, the clearest justification for higher spending disappeared. Double‐digit defense spending increases that were common in the 1980s have been replaced by annual increases lower than present inflation rates, resulting in negative real growth in the country's defense budget. Domestic economic problems and consistent government pressures for smaller budgets have further slowed annual growth in total spending and have contributed to lower procurement budgets. As a result, the domestic Japanese defense industry is facing far more constrained conditions from the growth years of a decade before. Government policymakers are examining Japan's regional security environment as well as its alliance with the United States to determine the appropriate course for the country to take in the coming years. The formal security treaty with the United States is likely to remain a major element of government positions, but other aspects of the country's overall security posture are open to debate. Perceptions of a reduced threat environment are fueling additional pressures for defense budget cuts. The domestic defense industry seeks means to assure its survival in domestic defense markets in this constrained environment. Expansion into overseas markets to offset declining domestic markets is an option that currently is constrained by policy restrictions on arms exports. Industry is advocating re‐examination of those policies and unlike earlier years, government appears willing to respond positively but cautiously to this lobbying. 相似文献
573.
MARTIN R RUPIYA 《African Security Review》2013,22(1):83-89
Abstract This paper seeks to critically appraise Africa's position within the United Nations Security Council from the inception of the UN in 1945 until the end of 2010, spanning the entire history of the world body. A few factors make such an appraisal a useful exercise. These include the ongoing debates about the reform of the Council in particular and the UN as a whole, and the growing interest that many African students and observers of and actors in international relations seem to have developed in recent years in the working of the world body. In this appraisal, emphasis will be placed on the origin and rationale behind the establishment of the Security Council as well as the use of the veto power by its permanent members, with a special reference to Africa. 相似文献
574.
Clifton W. Sherrill 《The Nonproliferation Review》2013,20(1):31-49
Understanding why the Iranian regime wants to possess nuclear weapons is essential to formulating the best policy to prevent (or perhaps to simply manage) the emergence of a nuclear-armed Iran. Three general theories—realism, liberalism, and constructivism—provide a framework for looking at Iran's nuclear motivations. However, contrary to many analyses, the regime's desire to possess nuclear arms stems not from neorealist defensive concerns, but rather from offensive goals driven by domestic politics. The use of extremist Islamism by the Iranian regime to justify its autocratic rule is the primary motivating factor. Accordingly, the outlook for diplomatically addressing the Iranian regime's nuclear aspirations appears dim. 相似文献
575.
Nancy W. Gallagher 《The Nonproliferation Review》2013,20(3-4):469-498
ABSTRACTSince the end of the Cold War, arms control proponents tried to make the case for deep nuclear reductions and other forms of security cooperation as necessary for strategic stability. While different versions of strategic stability analysis did sometimes produce innovative proposals, constructive negotiations, and successful ratification campaigns in the past, this analytical framework has become more of a hindrance than a help. Treating arms control as a predominantly technical way to make deterrence more stable by changing force structure characteristics, military operations, relative numbers of weapons on either side, or total number of nuclear weapons gives short shrift to political factors, including the fundamental assumptions about world politics that inform different arms control logics, the quality of political relations among leading states, and the political processes that affect negotiation, ratification, and implementation. This article compares two logics for arms control as a means to enhance strategic stability, one developed by the Cambridge community in the 1960s and one used by the Reagan administration and its successors, with current perspectives on strategic stability in which flexibility and freedom of action are preferable to predictability and arms control. It also contrasts what the Barack Obama administration has tried to achieve through strategic stability dialogues with Russia and China with how they envision security cooperation. It then presents an approach developed during the Cold War by Hedley Bull for thinking about both the technical and the political dimensions of arms control, and suggests that the logic of Cooperative Security (which shares important features with Bull's approach) is a more appropriate and productive way to think about arms control in the twenty-first century than strategic stability analysis is. 相似文献
576.
577.
578.
Some have argued that the transatlantic rancor over the Iraq war made cooperation, especially on nonproliferation, unlikely. In contrast, this article, documents post-invasion instances of nonproliferation cooperation, with particular emphasis on the Proliferation Security Initiative and the EU-3 Initiative—the British, French, and German negotiations with Iran over its suspected nuclear activities. In addition to documenting French and British participation in these initiatives, the article analyzes why they have chosen to participate and argues that France and Britain have participated in both efforts because they are committed to avoiding future Iraq-like preventive wars. 相似文献
579.
Randall R. Dipert 《Journal of Military Ethics》2013,12(1):34-53
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices. 相似文献
580.