首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   11篇
  国内免费   9篇
  2021年   2篇
  2020年   16篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   21篇
  2015年   4篇
  2014年   27篇
  2013年   73篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有278条查询结果,搜索用时 15 毫秒
271.
ABSTRACT

This article analyses findings from an original survey of 187 private military contractors on their incentives for working in the industry. Perceptions of contractors as “greedy, ruthless, and unscrupulous mercenaries” shape both public and military opinions of outsourcing and may impact U.S. military effectiveness, civil–military relations, and contractor identity. We find that contractors are motivated by a range of factors and that their financial experiences are not clearly more positive than that of state military troops. We recommend broad education of military and defense officials and the public in the U.S. and other relevant nations, regarding the true incentives of modern-day, Western contractors, in an effort to dispel misperceptions, increase effective utilisation of contractors, and beneficially shape PMC-military coordination. DoD may consider integrating such training into its current efforts to improve outsourcing, including its Joint OCS Planning and Execution Course, pre-deployment fora, and curricula of advanced military studies schools.  相似文献   
272.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   
273.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   
274.
275.
ABSTRACT

Recent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women.  相似文献   
276.
ABSTRACT

Increasing attention paid to US casualties in far-flung places such as Tongo Tongo, Niger, and headlines claiming ‘secret wars’ have fueled discussion about American military’s involvement in Africa. Though the continent has been a part of the American way of war since the beginnings of the US – consider the early combat actions of US Marines in Tripoli –, current African conflicts are challenging our understanding of war and approaches to winning it. This article examines the ways America seeks to achieve its ends in Africa with a particular focus upon the last 10 years of US counter-terrorism and stability operations in Niger and the Sahel Region. The author proposes unifying American, Allied, and partner efforts through a strategy of Active Containment.  相似文献   
277.
ABSTRACT

This article constitutes an attempt to demonstrate the complexity of factors affecting the legitimate acquisition and reasonable exercise by a political community of the right to war as specified in the just war criteria of jus ad bellum. To achieve this purpose, a brief analysis is presented of the intentional participation in World War I of thousands of Polish volunteers forming military units deployed by the Central Powers on the Austrian-Russian front. Considered in light of the standard principles of just war, the military enterprise of the Polish Legions, as they were called, turns out to be a paradoxical instance of warfare which, while being part of a state-to-state aggression, must be deemed compliant with all the principles in question. As a means of explaining this paradox, a modification of the concept of justified intervention is proposed, embracing military efforts aimed at the ultimate defeat of all the (unjustly) warring parties operating within a given territory. In consonance with the classic just war approach, it is also argued that the justification for such an intervention is essentially dependent on its being initiated by, or attributable to, an unquestionable state agent acting in defence of the state’s basic prerogatives.  相似文献   
278.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号