首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   189篇
  免费   2篇
  国内免费   2篇
  193篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   4篇
  2018年   7篇
  2017年   17篇
  2016年   13篇
  2015年   8篇
  2014年   20篇
  2013年   89篇
  2012年   4篇
  2011年   8篇
  2010年   14篇
  2009年   2篇
  2008年   2篇
  2005年   1篇
  1991年   1篇
排序方式: 共有193条查询结果,搜索用时 7 毫秒
1.
在最新颁布实施的《中华人民共和国人民武装警察法》中,共有3条6处规定了武警部队在执行国内安全保卫任务时对其他机关的“协助”,但是这些协助性任务的性质并不是很明确。本文通过对行政协助构成关键点的剖析,探究该法律中的“协助”是否是真正意义上的行政协助。  相似文献   
2.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
3.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
4.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
5.
新疆维稳形势严峻,预警是维护社会稳定的重要途径。情报收集是成功预警的前提和基础。当前的新疆维稳预警情报收集工作还存在收集主体素质不高,群众优势未能充分发挥,缺乏有效交流与合作等问题。为此。必须加强情报队伍建设,构筑人民防线,完善协作机制,加强情报交流,以改进情报收集工作。  相似文献   
6.
阐述“慕课”的内涵价值与优势特征,分析新时期边防部队职业教育的需求,提出边防部队职业教育应积极引入“慕课”教学理念,加强顶层设计,科学规划职业教育,加强制度建设,正确把握发展方向.  相似文献   
7.
ABSTRACT

Recent nuclear-weapons-related consultation in NATO within the framework of the Defence and Deterrence Posture Review sheds light on historical experiences with nuclear consultation in NATO. In the early years of the Nuclear Planning Group (NPG), which became the main forum for multilateral nuclear consultation in the alliance, developing a nuclear weapons first use doctrine was of particular importance. This process led to the adoption of the Provisional Political Guidelines (PPGs) on the threat to initiate the use of nuclear weapons. With a focus on West Germany as the primary addressee of the NPG, it will be postulated that nuclear consultation functioned and may still be seen as an essential tool to manage the credibility of US extended nuclear deterrence in the framework of NATO.  相似文献   
8.
This paper analyses the impact of terrorist activity on international tourist flows. To this end, we have estimated a cross‐sectional gravity equation for tourism from the G‐7 countries to a sample of 134 destinations over the period 2001–2003. Within this framework, we evaluate the deviation from ‘normal’ tourist flows due to terrorist activity, which is considered as negative advertising for the affected country. The analysis suggests that both domestic victims and international attacks are relevant factors when foreign tourists make their choice. This result is robust under alternative specifications. Moreover, the impact of terrorism is more severe in developing countries.  相似文献   
9.
This paper models the interactions between the defense needs of the USA and Western Europe, which produce several heterogeneous defense goods, and the defense industry market structure. The results show that net defense costs of the USA and Europe are lower when the number of defense firms in each arms‐producing country is small and when the world prices of the defense goods are high. The model predicts that the increase in world prices will crowd‐out countries in the developing world from the market for modern weapon systems and may force them to develop and use ‘cheap and dirty’ weapon systems.  相似文献   
10.
Previous research has shown that the duration of a civil war is in part a function of how it ends: in government victory, rebel victory, or negotiated settlement. We present a model of how protagonists in a civil war choose to stop fighting. Hypotheses derived from this theory relate the duration of a civil war to its outcome as well as characteristics of the civil war and the civil war nation. Findings from a competing risk model reveal that the effects of predictors on duration vary according to whether the conflict ended in government victory, rebel victory, or negotiated settlement.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号