首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   147篇
  免费   6篇
  2020年   1篇
  2019年   8篇
  2018年   5篇
  2017年   8篇
  2016年   6篇
  2015年   4篇
  2014年   9篇
  2013年   57篇
  2012年   3篇
  2010年   2篇
  2009年   4篇
  2008年   1篇
  2007年   1篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   2篇
  1992年   3篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有153条查询结果,搜索用时 31 毫秒
131.
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
132.
To manage their assets at an enterprise level, defense organizations have turned to portfolio theory for the planning, analysis and management of their military forces and materiel. Despite being well established in the commercial sector, the application of portfolio approaches in defense is problematic. The vexatious question for defense of how to define and measure benefits arising is complicated by the increased utility and effectiveness achieved through networking of military forces and the equipment they use. The authors discuss the challenges for defense in using a portfolio approach and propose a conceptual model for dealing with the effects arising from networking with information and communications technologies.  相似文献   
133.
134.
Security measures are said to increase the price of terrorism. This price has not been hitherto defined in an economically meaningful way. This paper provides a precise definition by treating the terrorists’ resource endowment as a parcel of contingent claims to political influence with a price equal to the summed value of those contingent claims in potential states of the world. Equipped with this definition, an equilibrium model of the price of terrorism is deployed. Important insights are gained into the effect of terrorists’ risk aversion at the level of the price of terrorism in different states of the world and the theoretical conclusion is reached that higher security is associated with a lower price of terrorism rather than a higher price. The implications for policy are discussed.  相似文献   
135.
With the end of the Cold War and apartheid, a process of demilitarisation and dramatic cuts in military spending has marked the transition to democracy in South Africa. Between 1989 and 1997 the South African defence budget was cut by more than 50% in real terms, with most of the cuts coming from the procurement budget, which was cut by nearly 70% in real terms during the same period. These cuts have had a significant impact on the country's defence industrial base. However, there has been surprisingly little research on the changes to defence companies that have taken place since the late 1980s. This paper makes a start at rectifying that deficiency by providing an analysis of the restructuring of the major defence‐dependent companies over the period 1988–97. It uses a number of financial ratios and other measures of corporate performance to compare their experience with non‐defence companies in the rest of the South African economy during the same period.  相似文献   
136.
137.
In recent international armed conflicts private security contractors (PSCs) have played an ever increasing role and military advisors and tribunals are facing the dilemma of assessing the primary and secondary status of PSCs under international humanitarian law. In this article the misconception that PSCs are necessarily mercenaries will be dispelled. The possibility that PSCs might be categorised as combatants or civilians will then be explored. The conclusion is that where they are incorporated into the armed forces of a state, PSCs might attain combatant status. However, given that states are reluctant to formally incorporate PSCs into their armed forces, they will most likely remain essentially civilian. Their degree of participation in hostilities will determine whether they retain their immunity under international humanitarian law from attack and prosecution (as civilians) or whether they are rendered unlawful belligerents.  相似文献   
138.
The US-led ‘war on terror’ dramatically changed America's security strategy towards Africa. But more fundamentally, it threw the Horn of Africa on the centre stage of global counter-terrorism. A double-edged blade, counter-terrorism has at once catalysed peace processes and intensified insecurity, with Islamic radicalism at the core of the regional storm. Governments utilised the threat of terrorism for political ends, defending old security paradigms that prioritised regime stability over human security. Africa integrated counter-terrorism into its emerging security agenda, but insufficient funds, operational constraints and poor coordination with international initiatives have hampered meaningful progress. Washington, laudably, launched a robust counter-terrorist campaign, but its high-handed military-heavy style put fragile democracies at risk while lapses in its overall policy risk triggering proxy wars. This essay examines the impact of counter-terrorism on security in the Horn of Africa. It argues for stronger coordination between national, regional and international initiatives to curb international terrorism.  相似文献   
139.
Claims that China is the only nuclear power currently expanding its arsenal fail to take into account the technical, historical, and bureaucratic realities that shaped China's nuclear posture and drive its ongoing modernization. China's strategic modernization is largely a process of deploying new delivery systems, not designing new nuclear warheads; the majority of its new missiles are conventionally armed. Today, China maintains the smallest operationally deployed nuclear force of any of the legally recognized nuclear weapon states, operates under a no-first-use pledge, and keeps its warheads off alert. The modernization of China's delivery systems is the culmination of a decades-long plan to acquire the same capabilities deployed by the other nuclear powers. U.S. concerns about this modernization focus too much on deterring a deliberate Chinese attack and ignore the risk that modernized U.S. and Chinese forces could interact in unexpected ways during a crisis, creating uncontrollable escalatory pressures. To manage this risk, Washington should assure Chinese leaders that it does not seek to deny China's deterrent, in exchange for some understanding that China will not seek numerical parity with U.S. nuclear forces.  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号