首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   476篇
  免费   11篇
  2021年   4篇
  2020年   4篇
  2019年   16篇
  2018年   10篇
  2017年   8篇
  2016年   11篇
  2015年   9篇
  2014年   8篇
  2013年   133篇
  2011年   10篇
  2010年   4篇
  2009年   4篇
  2008年   7篇
  2007年   10篇
  2006年   4篇
  2005年   9篇
  2004年   4篇
  2003年   6篇
  2002年   6篇
  1999年   8篇
  1996年   7篇
  1995年   8篇
  1994年   10篇
  1993年   6篇
  1992年   7篇
  1991年   7篇
  1990年   5篇
  1989年   9篇
  1988年   10篇
  1987年   9篇
  1986年   8篇
  1985年   7篇
  1983年   5篇
  1982年   8篇
  1980年   5篇
  1979年   5篇
  1978年   4篇
  1977年   4篇
  1976年   3篇
  1975年   7篇
  1974年   6篇
  1973年   9篇
  1972年   9篇
  1971年   10篇
  1970年   6篇
  1969年   6篇
  1968年   7篇
  1967年   3篇
  1966年   3篇
  1948年   3篇
排序方式: 共有487条查询结果,搜索用时 15 毫秒
291.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here.  相似文献   
292.
293.
294.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
295.
ABSTRACT

In May 2018, the Basque insurgent group Euskadi Ta Askatasuna (ETA) officially disbanded after a 60-year struggle. This inquiry assesses ETA’s violent campaigns using recent conceptual and theoretical advancements from the field of terrorism studies. Three conclusions concerning the group’s strategies of terrorism are advanced. First, ETA regularly targeted civilians to achieve goals other than coercing the Government of Spain; these objectives included outbidding rival separatist groups and spoiling negotiation processes. Second, ETA’s most rapid period of organizational growth occurred as the result of an aggressive terrorist campaign, demonstrating that civilian targeting can serve as a stimulus to rebel group recruitment. Finally, while terrorism did not advance ETA’s primary political objective of creating an independent Basque state, it did enable the group to assume a leading position within the radical Basque separatist movement, helping extend ETA’s lifespan and making the group an embedded actor within the contentious political processes surrounding the question of Basque self-determination. Collectively, these conclusions support recent theoretical findings arguing that non-state terrorism often enables insurgent groups to prolong their lifespans while paradoxically making it more difficult for them to advance their long-term political objectives.  相似文献   
296.
297.
298.
Book reviews     
The Political Economy of Military Spending in the United States, Alex Mintz (ed), London and New York: Routledge, 1992, pp x, 334; ISBN 0–415–07595–5

Penser La Guerre, Penser L'Economie, Christian Schmidt, (Paris: Odile Jacob, 1991), 350p.

Military Production and Innovation in Spain, Jordi Molas‐Gallart, Chur (CH): Harwood Academic Publishers, 1992, pp. vii, 212; ISBN 3–7186–5280–3  相似文献   
299.
This paper describes a stochastic simulation of one of the key naval operations in World War II, and shows how the result of that operation might have differed considerably from the historical outcome. The simulation demonstrates that it is never possible to predict with confidence the results of military operations involving a few high‐value units.  相似文献   
300.
Developments within the UK in the Ministry of Defence’s policy on defence equipment acquisition demand changes in the scale and allocation of the Ministry’s budget for defence research. To facilitate the national debate on those changes, this paper reviews the key questions about UK defence research which the Ministry must resolve in order to implement its new Defence Technology Strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号