首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   566篇
  免费   14篇
  2019年   12篇
  2017年   18篇
  2016年   10篇
  2015年   14篇
  2014年   15篇
  2013年   109篇
  2012年   5篇
  2011年   5篇
  2010年   8篇
  2009年   11篇
  2007年   6篇
  2006年   8篇
  2005年   9篇
  2004年   12篇
  2003年   5篇
  2002年   11篇
  2001年   4篇
  2000年   7篇
  1999年   6篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1995年   4篇
  1994年   15篇
  1993年   14篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   14篇
  1988年   14篇
  1987年   15篇
  1986年   16篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   9篇
  1971年   4篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有580条查询结果,搜索用时 31 毫秒
331.
Fodei J. Batty 《Civil Wars》2015,17(3):379-407
The utility of post-conflict elections in sub-Saharan Africa has been the subject of lively academic and policy debates. While some scholars associate several electoral outcomes with votes for peace, others argue that post-conflict elections exacerbate existing cleavages and could reproduce the conditions that led to civil war if the right electoral system is not employed. This paper examines these contesting claims using electoral data in a comparative study of the first truly post-conflict elections in Sierra Leone and Liberia. The analysis shows that political leaders in both countries received votes across numerous cleavage lines in contradiction with an ethnic census.  相似文献   
332.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
333.
334.
“Smart Defense” is NATO's new approach to risk- and burden-sharing, which has been a chronic problem within the alliance since the 1950s. Numerous solutions have been proposed, but initiatives resulting in more equitable burden-sharing have never been fully implemented. There are two driving forces influencing a county's willingness to support such initiatives – the economic theory of alliances and the risks posed by the implementation of capability sharing. The authors examine each of these and propose that rather than aiming for group consensus on the production of capabilities, NATO should focus on interoperability through support functions. This approach provides the most likely solution for connecting the forces, doctrine, procedures, standards and other factors of joint capability production such that country leaders find the risks of doing so to be politically and militarily acceptable.  相似文献   
335.
Capability-based planning (CBP) is considered by many defence organisations to be the best practice for enterprise-level planning, analysis and management. This approach, loosely based around investment portfolio theory, is premised on balancing the cost, benefit and risk of capability options across the defence enterprise. However a number of authors have recently noted limitations of its current applications. The authors propose a more general, insurance-based approach, which can support the evolutionary improvement of the current CBP approach. This approach is implemented as hedging-based planning and aims to better reflect the enterprise nature of defence organisations, capturing both force structure and force generation aspects of military systems.  相似文献   
336.
Grievance theories that emphasize injustice as the primary cause of secessionist violence offer valuable insights into the motivations of sponsors and participants. However, they face a difficulty in explaining the participation and support of geographically dispersed populations of co-ethnics (diaspora) that is not shared by rival theories that instead emphasize self-interest. This article uses the Kashmiri diaspora in Britain to examine how appeal to nationalist factors of shared identity, mutual sympathy and common understandings might allow grievance theories to effectively explain diaspora support. It concludes that, while a hybrid grievance-nationalist model might offer a more accurate and nuanced explanatory account of secessionist violence, it does so at the cost of conceptual clarity. Finally, the article addresses the implications for states and strategies to reduce the mobilization of diaspora in order to deny secessionists’ valuable assistance.  相似文献   
337.
338.
Abstract

Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed.  相似文献   
339.
Book reviews     
John Horsfield, The Art of Leadership in War. The Royal Navy From the Age of Nelson to the End of World War II. Westport, Conn. and London: Greenwood Press, 1980. Pp. 240; £14.75.

John Joseph Timothy Sweet, Iron Arm: The Mechanization of Mussolini's Army, 1920–1940. Westport, Connecticut &; London: Greenwood Press. 1980. Pp. 207; £15.50.

Peter H. Merkl, The Making of a Stormtrooper. Princeton, N.J: Princeton U.P., 1980. Pp. 328; £8.60.

Greg Herken, The Winning Weapon: The Atomic Bomb in the Cold War 1945–1950. New York: Alfred A. Knopf, 1980. Pp. 425; $15.00.

Geoffrey Smith and Nelson W. Polsby, British Government and its Discontents. New York: Basic Books, and London: Harper and Row, 1981. Pp. 202; £7.95.

Seweryn Bialer (ed.), The Domestic Context of Soviet Foreign Policy. Boulder, Colorado: Westview Press and London: Croom Helm, 1981. Pp. 441; £14.95.

Jerry F. Hough, Soviet Leadership in Transition. Washington, D.C.: Brookings Institution and Oxford, Basil Blackwell, 1981. Pp. 175; £12.00 (hb.) and £3.95 (pb.)

Edward F. Mickolus, Transnational Terrorism: A Chronology of Events 1968–1979. London: Aldwych Press, 1980. Pp. 967; £39.95.

Barry Rubin, The Great Powers in the Middle East, 1941–47; The Road to the Cold War, London: Frank Cass, 1980. Pp. 254; £14.50;

Daniel Heradstveit, The Arab‐Israeli Conflict; Psychological Obstacles to Peace. Oslo: Universittsforlaget, 1979. Pp. 234; £11.60;

Janice Gross Stein, and Raymond Tanter, Rational Decision‐making; Israel's Security Choices 1967. Columbus. Ohio; Ohio State University Press, 1980. Pp. 399; $35.  相似文献   
340.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号