首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   244篇
  免费   11篇
  国内免费   9篇
  2021年   1篇
  2020年   14篇
  2019年   24篇
  2018年   24篇
  2017年   27篇
  2016年   20篇
  2015年   3篇
  2014年   27篇
  2013年   66篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有264条查询结果,搜索用时 15 毫秒
121.
Abstract

This article argues that the current conflict in Yemen is better understood as a competition over who controls the state, rather than as a conflict between the state and a non-state actor. It traces the development of the Houthis and shows how the movement managed to seize key government institutions. However, the Houthis lack internal legitimacy and have not been able to position themselves as a nationally relevant political elite. The fragmentation of the Yemeni state has resulted in a shift to more localized struggles over access to resources and power that involve both internal and external actors.  相似文献   
122.
Abstract

The problematic export of the Westphalian system to MENA is examined, taking Syria as exemplar. The export model is juxtaposed to actual non-lineal trajectories, semi-sovereignty and hybrid or failing states. This is manifested in post-uprising Syria in failing statehood, fragmented and overlapping governance, permeable and collapsing borders, the loss of sovereignty to trans-state movements, “competitive regime-building” between the Asad regime and jihadist warlords, and “competitive interventionism” by external powers filling the governance vacuum with their own proxies. The result is heterarchic zones of limited statehood in which state sovereignty is contested by both international (supra-state) penetration and sub-state fragmentation.  相似文献   
123.
Grand strategic theorists share an historical emphasis on interstate conflict, yet in contrast to the more frequent intrastate conflicts, these represent only 7 of the some 273 US military deployments since 1900. We argue that these intrastate conflicts limit the utility of regional balances of power in mitigating forms of conflict that the US may consider inimical to its national security interests. When considering potential changes to US force posture and grand strategy, American coercive statecraft should be theorised along a broader strategic continuum encompassing the full range of conflict.  相似文献   
124.
Russia has long been pursuing an intended and calculated policy of keeping enough influence in Bulgaria in order to have control over national decisions. Together with the economic, energy, political and information tools used by Russia in its hybrid war against Bulgaria and in its bid to achieve an enduring “state capture,” defence is also a distinct target of Russian subversion now. A list of noticeable subversive actions with tangible effects can be summarised, ranging from fuelling division and manipulating public opinion, preventing the strengthening of the NATO position in the Black Sea, sabotaging defence reform to various options of subverting the modernisation of the Bulgarian Armed Forces and seeking new ways to keep legacy Soviet military equipment in operation as long as possible. This issue must be urgently addressed both nationally and in NATO.  相似文献   
125.
Recent tensions between Russia and the United States have sparked debate over the value of the North Atlantic Treaty Organization (NATO). One controversy surrounds the extent to which NATO raises the risk of war through entrapment—a concept that scholars invoke to describe how states might drag their allies into undesirable military conflicts. Yet scholars have advanced different, even conflicting arguments about how entrapment risks arise. I offer a typology that distinguishes between the mechanisms through which entrapment risks allegedly emerge on the basis of their institutional, systemic, reputational, and transnational ideological sources. I use the 2008 Russo-Georgian War to illustrate how the purported mechanisms of entrapment fare in elucidating that conflict. In analyzing why entrapment risks emerge, and thinking counterfactually about The 2008 War, I argue that scholars need to disentangle the various mechanisms that drive both alliance formation and war to make sure that entrapment risks do indeed exist.  相似文献   
126.
CHENG Hong 《国防科技》2018,39(1):001-004
坚持向科技创新要战斗力,落实到国防动员建设领域,就是要紧紧围绕党在新形势下的强军目标,积极适应现代战争形态新变化、世界军事变革新趋势、总体国家安全新要求和军队使命任务新拓展,加强高技术力量平战一体国防动员,搭建起高技术力量在经济与军事、地方与军队、潜力与实力、平时与战时的桥梁和纽带,全面提升国防动员战时应战、急时应急、平时服务能力,为保障军队能打仗、打胜仗提供强大科技支撑。  相似文献   
127.
韩毅  储欣 《国防科技》2018,39(5):098-103
通过梳理美军"分布式杀伤"概念的提出背景、提出过程、内涵意义,阐述了"分布式杀伤"的三条制胜之道,即符合海战客观环境、符合科技进步方向、符合战争演变趋势。此外,文章还分析了"分布式杀伤"实际执行过程中的几大难点和缺陷,包括指挥控制问题、舰船能力问题、成本和后勤补给问题、防御有效性问题。  相似文献   
128.
伊拉克战争美军后勤(装备)保障特点及启示   总被引:1,自引:0,他引:1  
伊拉克战争中,美军采取多种手段和措施,成功地实施了后勤(装备)保障,在保障准备、保障方法、保障信息化建设等方面呈现出许多新特点,为我军做好新形势下的装备保障工作提供了有益的启示。  相似文献   
129.
The objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is compatible with the common good. Importantly, it does so whilst respecting the pursuit of victory as an indispensable component of strategy’s true nature. The theory presented in this article is then tested in relation to four different modes of strategy: regular war, irregular war, deterrence, and cyberwar.  相似文献   
130.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号