排序方式: 共有311条查询结果,搜索用时 15 毫秒
211.
Bruce G. Linster Richard L. Fullerton Michael Mckee Stephen Slate 《Defence and Peace Economics》2013,24(4):285-302
This paper experimentally tests a number of hypotheses that follow from models of international competition that are based on Tullock style rent‐seeking models. Specifically, we designed and performed experiments to see how variations in the degree of publicness in the prize as well as changes in the values assigned to the prize affect alliances in terms of individual nation contributions, total contributions, burden sharing, and the likelihood of winning the prize. While there was substantial variation in individual behavior, the results of the experiments generally conform to the theoretical predictions of the rent‐seeking model of international competition and alliances. 相似文献
212.
Raising and maintaining military forces have posed enormous challenges for the United States and its allies. Economists have made significant contributions to understanding of how to recruit and manage such forces. This paper highlights key past contributions and discusses challenges for future research. Rapid changes in the roles and missions of military personnel, technology, and the civilian labor market pose serious challenges for future military manpower policy and will challenge economists to develop new approaches to military recruiting and personnel management. Yet the body of past research can continue to provide insight and guidance in making decisions about defense manpower. 相似文献
213.
Edward T. Barrett 《Journal of Military Ethics》2013,12(1):4-17
While most normative evaluations of military cyber-operations have emerged from the legal community, this article assesses the legitimacy of such operations from a philosophical-ethical perspective. After reviewing the relationship between rights forfeiture and the jus ad bellum and jus in bello criteria of the just war tradition, it applies these criteria to several aspects of cyber-operations, including responses to cyber-activities, the use of cyber-capabilities affecting combatants and civilians, and the use of these capabilities by contractors. Finally, it briefly addresses the legitimacy of limiting rights to privacy and anonymity in service of preventing cyber-harm. 相似文献
214.
215.
Mete Feridun 《Defence and Peace Economics》2014,25(5):499-508
The present article examines if the foreign aid to North Cyprus is fungible and if it is in a long-run equilibrium relationship with military spending using the Autoregressive Distributed Lag bounds testing procedure from 1977 to 2007. The results suggest that neither tax revenues nor public expenditures are in a long-run equilibrium relationship with foreign aid. However, strong evidence emerges that defence expenditures are in a long-run equilibrium relationship with foreign aid, and that the latter seem to cause the former. 相似文献
216.
为支持军事通信业务的智能化,研究了军事通信业务上下文信息的表示和推理,提出了一种表示业务上下文信息的语法结构、语义以及上下文元信息的本体建模方法。并利用贝叶斯网络理论,提出了一种支持不确定性推理的业务上下文认知模型的构建方法,最后通过案例分析验证了模型和结论的合理性。 相似文献
217.
Olaf Bachmann 《Small Wars & Insurgencies》2014,25(3):607-627
The Building Security Overseas Strategy is at its core an ‘Intervention to end all Interventions’ – from a Western as well as an African perspective. Two of its main pillars are security sector reform in specific countries and systematic support to the development of the African Peace and Security Architecture. This article addresses the question why such efforts have met little success in francophone Africa. It argues that the failure of Western advisers to understand the sociological dynamics of African armed forces, shaped by a political culture based on personal loyalty to the leader, is at the root of the problem. In that context, the Huntingtonian-type distinction between the civilians and the military does not apply as military and civilians act in concert within common clientelism systems. As a result of the curtailing of the state-formation experience in most African countries, the military never had to demonstrate its performance as a state builder, nor did it have to bargain its legitimacy against the support of the citizens. Partnership in that context will remain a misnomer, at least until African military can credibly demonstrate commitment to state-building grounded in a broad-based social contract. 相似文献
218.
What explains the pace at which militaries adopt new technology? We argue that the hierarchical structure and unique expertise requirements of military organizations combine to empower select individuals as ‘gatekeepers’ of innovation. These individuals acquire beliefs throughout their military careers regarding the nature and means of warfare that act to shape their attitudes towards new military innovations. By filtering, sidelining, and ignoring competing sources of advice and information, these officers actively inhibit the adoption of new, often advantageous, innovations. We develop this argument through the analysis of two cases: the delayed acquisition of breech-loading and repeating rifles by the Union Army during the American Civil War, and the failure of the US Army to adopt an adequate heavy-type tank in World War II. 相似文献
219.
Tactical learning is critical to battlefield success, especially in a counterinsurgency. This article tests the existing model of military adaption against a ‘most-likely’ case: the British Army’s counterinsurgency in the Southern Cameroons (1960–61). Despite meeting all preconditions thought to enable adaptation – decentralization, leadership turnover, supportive leadership, poor organizational memory, feedback loops, and a clear threat – the British still failed to adapt. Archival evidence suggests politicians subverted bottom-up adaptation, because winning came at too high a price in terms of Britain’s broader strategic imperatives. Our finding identifies an important gap in the extant adaptation literature: it ignores politics. 相似文献
220.