首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   137篇
  免费   2篇
  国内免费   2篇
  141篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   3篇
  2018年   11篇
  2017年   11篇
  2016年   8篇
  2015年   3篇
  2014年   15篇
  2013年   60篇
  2012年   1篇
  2011年   4篇
  2010年   3篇
  2009年   1篇
  2008年   3篇
  2007年   1篇
  2005年   2篇
  2004年   2篇
  2003年   3篇
  2002年   4篇
  2001年   1篇
  2000年   1篇
  1991年   1篇
排序方式: 共有141条查询结果,搜索用时 0 毫秒
31.
We study the behavior of defense spending in Switzerland over 1975–2001. Our main interest is in determining how neutrality in international affairs (non‐membership in military alliances) affects defense spending. We find that neutrality is associated with a perception of lower levels of external threat; hence it confers economic benefits in the form of a smaller defense burden. However, neutrality does not fully insulate a country from variations in the level of external threat in the global system as perceived by members of military alliances. Swiss defense spending has tracked very closely the spending trends – but at a lower average level – of the United States and other NATO countries. To the extent that post‐Cold War threats, such as international terrorism, materialize primarily in the context of existing security alliances, Swiss military spending patterns observed in 1975–2001 are likely to remain the same in the future.  相似文献   
32.
The military poses an ongoing threat to modern democratic rule in some African countries, especially in the Zimbabwean context. This paper reveals the ways in which Zimbabwe National Army (ZNA) generals have played a political role in the Zimbabwean elections, an issue which is both a political threat and a security threat to the state. It is argued that the ways in which ZNA generals engage in the political process goes against Section 208(2) of the constitution of Zimbabwe, which summarily states that the military must be apolitical. In substantiating this argument, the paper presents and analyses various public speeches made by army generals. It is contended that the army generals’ support of the Zimbabwe African National Union – Patriotic Front (ZANU-PF) and President Robert Mugabe has to be understood as a ‘mutual accommodation’, i.e. the generals are offered privileges in return for the political protection of the ruling regime which negatively impacts the security of the vote.  相似文献   
33.
This article presents survey data on the African Peace and Security Architecture (APSA). It focuses explicitly on two aspects: the internal constitution and achievements of the APSA; and coordination and cooperation with external actors, such as Regional Economic Communities, the United Nations and the European Union. The survey, conducted between October 2011 and December 2012, targeted 198 security experts in international organisations, think tanks, academia and non-governmental organisations. It reveals the APSA's current stage of development, achievements and challenges.  相似文献   
34.
为深入研究信息化战场信息安全保障,提高保障效能,利用OODA环理论对信息化战场信息安全保障过程进行了分析与研究,明确了观察、判断、决策和行动每个阶段的任务与事件,并运用系统动力学方法对基于OODA环的信息化战场信息安全保障过程进行建模分析和模拟仿真,仿真结果表明随着时间推移,保障方得到的信息增多,判断和决策的正确率也随之增加,OODA环周期开始减小,保障效能随之大幅提升。研究结果对于提升信息化战场信息安全保障效能具有一定的参考价值。  相似文献   
35.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   
36.
Despite the prevalence of violent uprisings against the states, existing literature has produced a generalized explanation of the causes and onset of such uprisings ignoring crucial aspects of (non-state) armed group cohesion, such as their capabilities to manage intra-group tensions and rivalries. In this paper, I examine recent research in the field of civil conflict to understand the importance of investigating underlying constraints which can cause serious impediments to the capabilities of a state during the course of a war. The paper then focuses on the importance of internal strategic resources, such as pre-war and wartime sociopolitical networks in which insurgents mobilize, recruit new cadres and maintain intra-group cooperation, to suggest how it can contain the consequences of counterinsurgency operations and other state strategies on the internal cohesion of an insurgent group. A detailed case study of the Mizo National Front (MNF) in India demonstrates the argument’s plausibility.  相似文献   
37.
The earlier work on the optimal design of the national security has focused on the opportunity cost of the draft in terms of foregone human capital formation. The current paper introduces the national security into the welfare analysis missing from the earlier work. This creates a trade-off between the private goods and the security as a public good in the social cost–benefit analysis. There are three major results. First, and arising from the intergenerational interaction, it is optimal to introduce a pay to the young generation when in duty even by resorting to a distortive tax. Second, when optimizing the size of the army, the optimal choice between the draft army and the professional army depends on the risk class of the country. A security gradient arises. Third, the choice is linked to the size and the quality of the reserve generated by the two approaches.  相似文献   
38.
Do ceasefires or peace talks create fragmentation in the insurgent groups? Rather than proposing claims that can offer predictions about armed groups behaviour under ceasefires or peace processes, the analysts tend to focus largely on the dynamics between state and non-state actor. The experts pay little attention to overtime changes in social and local political context which might contribute to propelling a rebel group towards fragmentation and factionalism. The present study intends to fill this gap by exploring the shifting role of public opinion and ethnic support for the peace talks to ascertain whether it can increase the likelihood of factionalism in rebel groups or not. This article applies this approach to the case of Naga National Movement (1947–2015) in India, and finds that the proposed variable appears to have increased the frequency of factionalism in the movement.  相似文献   
39.
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones.  相似文献   
40.
针对国家导弹防御系统突防措施研究   总被引:2,自引:0,他引:2  
美国为了追求绝对的安全,不顾国际社会的反对,贸然发展其国家弹道导弹防御系统。为了追求世界的制衡,必须研究如何突破弹道导弹防御系统。简述了NMD的发展演变,在分析了美国的国家导弹防御系统构成的基础上,针对其使用的拦截手段,重点分析了弹道导弹突破NMD的7种可能措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号