全文获取类型
收费全文 | 521篇 |
免费 | 37篇 |
国内免费 | 17篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 14篇 |
2020年 | 6篇 |
2019年 | 30篇 |
2018年 | 33篇 |
2017年 | 37篇 |
2016年 | 34篇 |
2015年 | 17篇 |
2014年 | 49篇 |
2013年 | 116篇 |
2012年 | 8篇 |
2011年 | 27篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 35篇 |
2007年 | 22篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 13篇 |
2003年 | 15篇 |
2002年 | 8篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有575条查询结果,搜索用时 15 毫秒
171.
Linnéa Gelot 《Contemporary Security Policy》2017,38(1):161-173
This article explores how the protection of civilians is being militarized by African policymakers and diplomats. I draw on practice approaches to analyze what social groups are doing when they claim to “protect civilians.” I show how innovative protection mechanisms can be seen as a function of officials and diplomats coping with the changing circumstances of increasingly militarized politics in Africa. Specifically, accountability mechanisms for unintended and intended civilian harm by African security operations have originated in connection with this development. I argue that these are results of anchoring practices, which means that everyday informal interactions in one context become linked to another context. I argue that these emerging accountability mechanisms represent a new combination of practices, with the potential of changing the routine activities and mutual learning between policymakers and diplomats. 相似文献
172.
Toni Haastrup 《Contemporary Security Policy》2017,38(1):102-108
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research. 相似文献
173.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
174.
Richard A.I. Johnson 《Defence and Peace Economics》2017,28(3):272-297
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers. 相似文献
175.
176.
美国网络安全战略管理体系分析 总被引:1,自引:0,他引:1
文章从美国政府颁布的政策文件、法律法规和各机构部门的职能三个方面,对美国网络安全战略管理体系进行了介绍和分析。 相似文献
177.
张志勇 《中国人民武装警察部队学院学报》2014,(5):46-49
沿海船舶边防治安管理是维护海上治安秩序稳定的重要手段。为加强海上治安管理,需要通过立法活动赋予公安边防机关特殊的执法权,并以此规范公安边防行政执法活动。分析沿海船舶边防治安管理立法概况及其存在的问题,提出完善沿海船舶边防治安管理立法的建议。 相似文献
178.
王洪军 《中国人民武装警察部队学院学报》2014,(5):25-27
部队战斗力的生成和提高主要依靠平时的军事训练来实现。根据公安警卫部队当前任务实际,着眼新形势下的警卫任务执勤需要,就警卫部队训练对象的层级划分和具体训练目标、训练科目和内容、训练管理体制的建立与完善等问题进行探讨。 相似文献
179.
唐超 《中国人民武装警察部队学院学报》2014,(11):22-26
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。 相似文献
180.
刘颖璇 《中国人民武装警察部队学院学报》2014,(11):27-30
当前,警卫情报工作的范围已经扩展到警卫实战、预警、决策、管理等各个方面,但从总体上看,警卫情报工作仍需进一步优化,以满足日益增长的警卫实践需求。针对警卫情报工作的特点,采用SWOT分析法对警卫情报工作的内外部条件进行客观分析,提出针对性的优化策略,以提升警卫情报工作能力。 相似文献