首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   145篇
  免费   2篇
  国内免费   1篇
  2022年   1篇
  2020年   2篇
  2019年   5篇
  2018年   10篇
  2017年   9篇
  2016年   9篇
  2015年   5篇
  2014年   16篇
  2013年   74篇
  2012年   3篇
  2011年   3篇
  2010年   5篇
  2009年   2篇
  2008年   1篇
  2005年   1篇
  2003年   1篇
  1991年   1篇
排序方式: 共有148条查询结果,搜索用时 15 毫秒
21.
China-U.S. cooperation over the most difficult security problem in Northeast Asia—the North Korean nuclear issue—in essence projects its bigger power game amid the tectonic shifts of Asian geopolitics. The nuclear issue affords a test case to gauge the future posture of China and the United States in East Asia and their partnership in that conflict-prone region. Approaches to resolving this issue must take into account the geopolitical realignment of Asia, Washington's reorientation of relations with its Asian allies, and China's rise as an influential regional player and the subsequent regional response. However, the long-standing mistrust between China and the United States is contributing to a lack of substantial progress in Korean nonproliferation efforts. The declared nuclear test by Pyongyang further put the denuclearization cooperation between China and the Unites States on the line. China-U.S. cooperation in denuclearizing Pyongyang may either produce lasting stability for the region or create ‘‘collateral damage,’’ with the North Korean issue paling in comparison.  相似文献   
22.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   
23.
National security conception or securitization theory frames threats and conceptualizes the responses towards them. But in many cases, and especially in the Israeli context, there is a tendency to blur the nature and essence of different threats; security threats become strategic threats and then existential threats. In the Israeli context, because the broad concept of security is perceived, in most cases, as equivalent to military security, the meaning of the strategic threat will be framed, mostly, militarily, derived from military thought.

The article examines the nature of existential threats in the Israeli context and seeks to find the implications of securitization theory in this regard by analyzing the unique role of the military establishment and the influence of the military thought on strategic thought in Israel. The article also deals with the centrality of ‘military wisdom’ in the Israeli ethos and the sense of insecurity embedded in the Israeli narrative that leads to an ‘intellectual symbiosis’ between the political and the military echelons and finds this phenomenon as one of the major explanations for the influence of the military establishment on defining the nature of security threats as well as on the crucial decision to launch wars.  相似文献   
24.
The engagement of the Atlantic Alliance in the Middle East dates back to the founding of the Alliance. With one eye on this history and one eye on current controversies, this article investigates the preconditions for and nature of the allies' engagement in the region in order to assess whether the Middle East today is causing a rupture within the Alliance. The article finds that the Alliance was never likely to engage as one in the region. The Alliance instead guarded its cohesion by either letting the Alliance leader, the United States, take a lead role or by acting as a coalition enabling framework. This latter option has prevailed since the early 1980s. Today, NATO can preserve its cohesion and simultaneously engage in the region if it continues this legacy of coalition-making from within the allied framework. Conversely, an effort to engage collectively in the region will likely set of internal tensions to the extent that the Alliance itself will be at risk.  相似文献   
25.
26.
As part of the next phase of the Global Jihad, al Qaeda has been committed to winning popular support among Muslims. Ayman al-Zawahiri and the al Qaeda inner circle recognise that a global terror movement and civil conflicts in the Middle East, brought about by the Arab revolutions, necessitate different operational methods. As such, they have disavowed the Islamic State of Iraq and al-Sham for their insubordination and unconstrained tactics, a move that has implications for the Middle East, international relations, the legitimacy of the al Qaeda leadership, and the future of the Global Jihad.  相似文献   
27.
The second session of the Preparatory Committee for the 2015 Review Conference (RevCon) of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) highlighted two issues in particular—progress toward a Middle East Weapons of Mass Destruction–Free Zone and the Joint Statement on the humanitarian impact of nuclear weapons—that may not only greatly affect the health and vitality of the NPT and the 2015 RevCon, but possibly also have implications for the international nonproliferation regime as a whole. Dr. William Potter, director of the James Martin Center for Nonproliferation Studies, interviewed Ambassador Cornel Feruta, chairman of the 2013 PrepCom, to discuss these and other issues related to the meeting and the future of the treaty and its review process.  相似文献   
28.
The Democratic People's Republic of Korea (DPRK) justifies its nuclear weapon arsenal with the concept of deterrence. It means that it will try to miniaturize and modernize its warheads and missiles. This leads to a first-use doctrine of nuclear weapons. Obama's policy of engagement does not offer a solution to the North Korean nuclear issue as yet. In the context of its policy of critical engagement with the DPRK, the European Union has three key interests: regional peace and stability, denuclearization, and human rights. The Conference on Security and Cooperation (CSCE) could be a precedent. The CSCE process was based on three “baskets”: security, economics, and humanitarian. The multilateral Trans-Pacific Partnership is a step in this regard. This article looks at three theoretical approaches: realism, liberal institutionalism, and liberal internationalism. It concludes that a political strategy to create a stable North Korean peninsula has to go beyond nuclear deterrence that is based on the realist notion of balance of power.  相似文献   
29.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
30.
It has been argued that the discovery of a new natural resource greatly increases the risk of conflict. This research aims to study the effect of natural resources on military spending, using the data from rentier states in the Middle East and North Africa (MENA) countries from 1987 to 2012. In considering the ‘resource curse,’ the types of natural resources matter. Our empirical results demonstrate that the ‘resource curse’ arising from the abundance of certain natural resources, particularly oil and forest resources, leads to increases in military spending. In contrast, the rent from coal and natural gas has a negative impact on military spending, while the rent from minerals has no impact on military spending, controlling for GDP growth and per capita income.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号