首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217篇
  免费   1篇
  2021年   1篇
  2020年   6篇
  2019年   22篇
  2018年   7篇
  2017年   12篇
  2016年   9篇
  2015年   7篇
  2014年   13篇
  2013年   111篇
  2012年   8篇
  2011年   4篇
  2010年   8篇
  2005年   5篇
  2003年   2篇
  2001年   2篇
  1998年   1篇
排序方式: 共有218条查询结果,搜索用时 46 毫秒
21.
ABSTRACT

Although the existing international-relations scholarship argues that technological assistance in the nuclear domain increases the probability of nuclear proliferation, the historical account indicates otherwise. Congressional legislation for nonproliferation, economic sanctions, and poor state capacity—specifically, inept managerial capabilities of the recipient state—explain merely part of the puzzle, but overlook the role of positive inducements offered to impede nuclear proliferation. Historical evidence shows that the United States often provided technological assistance with the deliberate intent to inhibit proliferation. In other words, Washington employed its technological leverage to attain nonproliferation goals. American technological preponderance since the end of World War II made such an approach feasible. This study examines key Cold War cases—Israel/Egypt, India, and West Germany—where the United States offered technological assistance with the deliberate intent to stall nuclear proliferation, thereby underscoring the role of assistance for inhibitive ends.  相似文献   
22.
A recently published collection of captured Iraqi records offers an opportunity to better understand Saddam Hussein's perception of US and Israeli deterrence signals, affording innovative insights into the reasons behind Iraq's restraint from using weapons of mass destruction against Israeli targets during the 1991 Gulf War. This article tests a wide range of suggested hypotheses, and suggests that US and Israeli deterrence played only a minimal role in dissuading Iraqi use of WMD. The article concludes with some thoughts on the practical implications, particularly on the effectiveness of a “no-first-use” nuclear policy.  相似文献   
23.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously.  相似文献   
24.
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40.  相似文献   
25.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
26.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   
27.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   
28.
This article analyzes the quality of the Egyptian and Israeli intelligence advice and decision-making process in the October 1973 War as key factors that determined its course. Following a background to the subject, we focus on the 9–13 October standstill stage, in which Sadat decided, despite his generals’ advice, to renew the Egyptian offensive. Effective Israeli intelligence collection about the coming attack, which was well used by the decision-makers, saved Israel from accepting an undesired ceasefire. The result was the 14 October failed Egyptian offensive that turned the tide of the war and led to Israeli military achievements at the war’s final stage  相似文献   
29.
Based on full access to Norwegian archives up to 1970, the article describes the origins and development of ‘stay-behind’– an organized preparedness, under the aegis of the Norwegian Intelligence Service, for intelligence and sabotage behind enemy lines in case of a Soviet occupation. Initiated by Defence Minister Jens Christian Hauge, wartime leader of the Norwegian military resistance, the set-up built on lessons learnt during the German occupation, when effective resistance was hampered by inexperience and improvisation. Secrecy and security, and national Norwegian control albeit with cooperative links with British and American secret services, were distinctive features of the networks that came into being from 1948 onwards. NATO began to take an interest from 1952, but SACEUR's main concern was for ‘retardation’– guerrilla and sabotage activities to delay Soviet forces even before entering NATO territory.  相似文献   
30.
During the Nigerian Civil War (1967–1970), France chose to support Biafra, but only on a limited scale, providing mercenaries and obsolete weaponry to Ojukwu's regime. General Charles de Gaulle's assistance to Ojukwu was conditioned by the French military drawdown after 1961, the increased power of French secret services on the continent, and the interventions in Katanga (1960–1963), Gabon (1964) and Chad (1968–1972). France supported Biafra primarily to protect its former colonies from Nigeria, stop Soviet subversion and acquire an economic foothold in the oil-rich Niger Delta. De Gaulle chose a limited strategy for two reasons. If Biafra won the war, France would be Biafra's greatest ally. If Nigeria won the war, France could extricate itself from the situation relatively easily and re-establish relations with the Nigerian government, which is what ultimately occurred.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号