首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99篇
  免费   1篇
  国内免费   1篇
  2022年   1篇
  2021年   1篇
  2020年   3篇
  2019年   2篇
  2018年   6篇
  2017年   7篇
  2016年   8篇
  2015年   3篇
  2014年   13篇
  2013年   47篇
  2011年   3篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2005年   1篇
  1991年   1篇
排序方式: 共有101条查询结果,搜索用时 15 毫秒
11.
This paper models the interactions between the defense industry market structure and the defense needs of Israel, the USA and Western Europe, which produce several heterogeneous defense goods. The model specifies that the defense industries of the US and Europe are ‘large’ while that of Israel is ‘small’. The US military aid to Israel is also an integral part of the model. The results show that net defense costs of Israel are minimal when the number of its defense firms is one. The model predicts that an increase in US military aid reduces Israel’s government expenditure, its defense industry’s profits and its net defense costs.  相似文献   
12.
Previous research has shown that the duration of a civil war is in part a function of how it ends: in government victory, rebel victory, or negotiated settlement. We present a model of how protagonists in a civil war choose to stop fighting. Hypotheses derived from this theory relate the duration of a civil war to its outcome as well as characteristics of the civil war and the civil war nation. Findings from a competing risk model reveal that the effects of predictors on duration vary according to whether the conflict ended in government victory, rebel victory, or negotiated settlement.  相似文献   
13.
In his 2009 Prague speech and the 2010 Nuclear Posture Review, President Barack Obama committed the United States to take concrete steps toward nuclear disarmament while maintaining a safe, secure, and effective nuclear deterrent. There is an inherent tension between these two goals that is best addressed through improved integration of nuclear weapons objectives with nuclear arms control objectives. This article reviews historical examples of the interaction between the two sets of objectives, develops a framework for analyzing opportunities for future integration, and suggests specific ideas that could benefit the nuclear weapons enterprise as it undergoes transformation and that could make the future enterprise compatible with a variety of arms control futures.  相似文献   
14.
This paper models the interactions between the defense needs of the USA and Western Europe, which produce several heterogeneous defense goods, and the defense industry market structure. The results show that net defense costs of the USA and Europe are lower when the number of defense firms in each arms‐producing country is small and when the world prices of the defense goods are high. The model predicts that the increase in world prices will crowd‐out countries in the developing world from the market for modern weapon systems and may force them to develop and use ‘cheap and dirty’ weapon systems.  相似文献   
15.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
16.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
17.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   
18.
National security conception or securitization theory frames threats and conceptualizes the responses towards them. But in many cases, and especially in the Israeli context, there is a tendency to blur the nature and essence of different threats; security threats become strategic threats and then existential threats. In the Israeli context, because the broad concept of security is perceived, in most cases, as equivalent to military security, the meaning of the strategic threat will be framed, mostly, militarily, derived from military thought.

The article examines the nature of existential threats in the Israeli context and seeks to find the implications of securitization theory in this regard by analyzing the unique role of the military establishment and the influence of the military thought on strategic thought in Israel. The article also deals with the centrality of ‘military wisdom’ in the Israeli ethos and the sense of insecurity embedded in the Israeli narrative that leads to an ‘intellectual symbiosis’ between the political and the military echelons and finds this phenomenon as one of the major explanations for the influence of the military establishment on defining the nature of security threats as well as on the crucial decision to launch wars.  相似文献   
19.
20.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号