全文获取类型
收费全文 | 826篇 |
免费 | 22篇 |
出版年
2019年 | 17篇 |
2018年 | 8篇 |
2017年 | 23篇 |
2016年 | 16篇 |
2015年 | 20篇 |
2014年 | 16篇 |
2013年 | 166篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 16篇 |
2008年 | 8篇 |
2007年 | 8篇 |
2006年 | 11篇 |
2005年 | 15篇 |
2004年 | 17篇 |
2003年 | 9篇 |
2002年 | 12篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 14篇 |
1997年 | 8篇 |
1996年 | 14篇 |
1994年 | 21篇 |
1993年 | 17篇 |
1992年 | 12篇 |
1991年 | 25篇 |
1990年 | 9篇 |
1989年 | 19篇 |
1988年 | 17篇 |
1987年 | 21篇 |
1986年 | 23篇 |
1985年 | 24篇 |
1984年 | 11篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1981年 | 9篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 14篇 |
1977年 | 7篇 |
1976年 | 11篇 |
1975年 | 7篇 |
1974年 | 12篇 |
1973年 | 9篇 |
1972年 | 16篇 |
1971年 | 9篇 |
1970年 | 16篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 11篇 |
排序方式: 共有848条查询结果,搜索用时 15 毫秒
841.
Amy E. Eckert 《Journal of Military Ethics》2020,19(2):84-98
ABSTRACT The legitimate authority principle has become reduced to the issue of state authority. In its current formulation, the state has the sole authority to wage war, and because non-state actors, by their very definition, cannot satisfy this principle, their use of force is inherently unethical. This does not reflect the reality that non-state actors are increasingly engaging in the use of force, sometimes legitimately. As a result, the legitimate authority principle can and should look beyond the state. This article navigates a terrain in which non-state actors engage in the use of force, and in which revisionist just war thinking proposes that the concept of legitimate authority is irrelevant to thinking about the ethics of war. It proposes a principled approach to the inclusion of some non-state actors under the rubric of legitimate authority. This approach draws upon the historical development of the legitimate authority principle and incorporates the factors important to early writers on the subject. 相似文献
842.
843.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
844.
845.
James J. Wirtz 《Defense & Security Analysis》2020,36(1):88-100
ABSTRACTA call for innovation as a means to outpace the acceleration of technological change and to bolster capabilities quickly is a central theme of contemporary U.S. Naval Strategy. The need for innovation is accepted, but the integration of readily available technologies into the Fleet is slow. Innovation unfolds according to “Navy-Time,” a cycle lasting between a long-decade and thirty-years. To accelerate the innovation process in the U.S. Navy, the article offers a Concept of Operations for Innovation that outlines how a deliberate process of analysis, weaponisation and integration can move new ideas and weapons into the Fleet in a strategically relevant time-frame. 相似文献
846.
847.
848.