全文获取类型
收费全文 | 80篇 |
免费 | 1篇 |
出版年
2020年 | 1篇 |
2019年 | 4篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2014年 | 1篇 |
2013年 | 23篇 |
2012年 | 2篇 |
2011年 | 2篇 |
2010年 | 2篇 |
2009年 | 4篇 |
2008年 | 1篇 |
2007年 | 2篇 |
2006年 | 1篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2002年 | 2篇 |
2001年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
排序方式: 共有81条查询结果,搜索用时 15 毫秒
21.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
22.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities. 相似文献
23.
24.
Yves-Heng Lim 《战略研究杂志》2017,40(1-2):146-168
Among the multiple dimensions of the tous azimuths modernisation of Chinese naval forces, the development of China’s anti-access capacity has recently elicited considerable interest. The important link between this capacity and an overarching vision of the use of force – i.e. a naval doctrine – has, however, often been left implicit. This article shows that the particular development of China’s naval anti-access forces – more precisely, forces with an impact on the naval balance – can be explained by a shift of China’s naval doctrine towards a distinctly pre-emptive posture, which, itself, stems from the set of constraints imposed by the framework of ‘local war under informationised conditions’. 相似文献
25.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism. 相似文献
26.
27.
Daniel Khalessi 《The Nonproliferation Review》2013,20(3-4):421-439
ABSTRACTSince the 1950s, the United States has engaged in nuclear sharing with its NATO allies. Today, 150-200 tactical nuclear weapons remain on European soil. However, the Treaty on the Non-proliferation of Nuclear Weapons (NPT) prohibits the transfer of nuclear weapons to non-nuclear weapon states. The potential discrepancy between text and practice raises the question of how the NPT's negotiators dealt with NATO's nuclear-sharing arrangements while drafting the treaty that would eventually become the bedrock of the international nonproliferation regime. Using a multitiered analysis of secret negotiations within the White House National Security Council, NATO, and US-Soviet bilateral meetings, this article finds that NATO's nuclear-sharing arrangements strengthened the NPT in the short term by lowering West German incentives to build the bomb. However, this article also finds that decision makers and negotiators in the Lyndon B. Johnson administration had a coordinated strategy of deliberately inserting ambiguous language into drafts of Articles I and II of the Treaty to protect and preserve NATO's pre-existing nuclear-sharing arrangements in Europe. This diplomatic approach by the Johnson administration offers lessons for challenges concerning NATO and relations with Russia today. 相似文献
28.
Brendan Simms Bruce Hoffman Daniel W. Fitz‐Simons Robert H. Dorff Jennifer Morrison Taw Gabriel Marcella 《Small Wars & Insurgencies》2013,24(1):127-139
Frank Zimmer, Bismarcks Kampf gegen Kaiser Franz Joseph Konigsgratz und seine Folgen. Graz, Vienna, Cologne: Styria Verlag 1996. Pp.203,49 illus., 1 map. OS 350/DM 49. ISBN 3–222–12377–2. Saul Zadka, Blood in Zion: How the Jewish Guerrillas drove the British out of Palestine. London and Washington: Brassey's, 1995. Pp.227, chron., illus., index. £19.95. ISBN 1–85753–136–1. Theodore L. Gatchel, At the Water's Edge: Defending against the Modern Amphibious Assault. Annapolis, MD: Naval Institute Press, 1996. Pp.xvi+217, notes, biblio, index. $36.95. ISBN 1–55750–308–7. Max G. Manwaring and William J. Olson (eds.) Managing Contemporary Conflict: Pillars of Success. Boulder, CO: Westview Press, 1996. Pp.269, no index. $65 (cloth); $25 (paper). ISBN 0–8133–8969 and 9978–5 Chris Seiple, The US Military/NGO Relationship in Humanitarian Interventions, Carlisle Barracks, PA: The Richard L. Millett and Michael Gold‐Biss (eds.) Beyond Praetorianism: The Latin American Military in Transition. University of Miami: North/South Center Press; Boulder, CO: Lynne Rienner, 1996. Pp.xv +317, index. $24.95. ISBN 1–5745–000–9. Rudolph C. Barnes Jr, Military Legitimacy: Might and Right in the New Millennium. London and Portland, OR: Frank Cass, 1996. Pp.199, select biblio., index. £27.50/$39.50, ISBN 0–714–4624–5. 相似文献
29.
Daniel Byman 《战略研究杂志》2013,36(2):165-200
Abstract Why do some small terrorist and guerrilla groups succeed in becoming full-blown insurgencies while many others fail? Proto-insurgencies face many difficulties in creating an insurgent movement: they must create a politically salient identity, harness a compelling cause, create an effective sanctuary, and defeat both violent and peaceful organizational rivals, all while evading the police and security services of the much more powerful state. Outside support is a mixed blessing for proto-insurgents. Often, the ultimate success of the proto-insurgency in becoming a full-blown insurgency depends on the mistakes of the government it opposes. 相似文献
30.