首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   376篇
  免费   1篇
  2021年   1篇
  2020年   11篇
  2019年   30篇
  2018年   20篇
  2017年   23篇
  2016年   21篇
  2015年   10篇
  2014年   35篇
  2013年   188篇
  2012年   12篇
  2011年   4篇
  2010年   8篇
  2009年   1篇
  2005年   6篇
  2004年   1篇
  2003年   3篇
  2001年   2篇
  1998年   1篇
排序方式: 共有377条查询结果,搜索用时 15 毫秒
31.
A recently published collection of captured Iraqi records offers an opportunity to better understand Saddam Hussein's perception of US and Israeli deterrence signals, affording innovative insights into the reasons behind Iraq's restraint from using weapons of mass destruction against Israeli targets during the 1991 Gulf War. This article tests a wide range of suggested hypotheses, and suggests that US and Israeli deterrence played only a minimal role in dissuading Iraqi use of WMD. The article concludes with some thoughts on the practical implications, particularly on the effectiveness of a “no-first-use” nuclear policy.  相似文献   
32.
Abstract

This study estimates a three-sector Feder–Ram model using US annual data for 1965–2014 to confirm the externality of defense expenditure in the United States. Although the model is often used in the literature to scrutinize whether this effect exists, a flaw intrinsic to this model is the appearance of multicollinearity. In this study, I introduced novel techniques, namely: the standardization and estimation of a simple slope, to estimate the model. The results are as follows. First, I prove that the multicollinearity problem can be resolved by standardization. Second, externality, which is judged to conventionally exist, is not found. Third, increases in defense expenditure bring about positive but limited economic growth when the ratio of private to defense expenditure in the previous year ranges from 5.09 to 6.82%. By re-estimating the model, this study contributes to developing the Feder–Ram model within the related literature.  相似文献   
33.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously.  相似文献   
34.
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40.  相似文献   
35.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
36.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   
37.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   
38.
This article analyzes the quality of the Egyptian and Israeli intelligence advice and decision-making process in the October 1973 War as key factors that determined its course. Following a background to the subject, we focus on the 9–13 October standstill stage, in which Sadat decided, despite his generals’ advice, to renew the Egyptian offensive. Effective Israeli intelligence collection about the coming attack, which was well used by the decision-makers, saved Israel from accepting an undesired ceasefire. The result was the 14 October failed Egyptian offensive that turned the tide of the war and led to Israeli military achievements at the war’s final stage  相似文献   
39.
Based on full access to Norwegian archives up to 1970, the article describes the origins and development of ‘stay-behind’– an organized preparedness, under the aegis of the Norwegian Intelligence Service, for intelligence and sabotage behind enemy lines in case of a Soviet occupation. Initiated by Defence Minister Jens Christian Hauge, wartime leader of the Norwegian military resistance, the set-up built on lessons learnt during the German occupation, when effective resistance was hampered by inexperience and improvisation. Secrecy and security, and national Norwegian control albeit with cooperative links with British and American secret services, were distinctive features of the networks that came into being from 1948 onwards. NATO began to take an interest from 1952, but SACEUR's main concern was for ‘retardation’– guerrilla and sabotage activities to delay Soviet forces even before entering NATO territory.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号