首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39篇
  免费   1篇
  2021年   3篇
  2020年   1篇
  2019年   2篇
  2018年   8篇
  2017年   5篇
  2016年   1篇
  2014年   4篇
  2013年   12篇
  2012年   2篇
  2011年   1篇
  2008年   1篇
排序方式: 共有40条查询结果,搜索用时 31 毫秒
31.
本文从情报处理的发展和演变着手,面向当前大数据技术飞速发展和情报数据量呈爆炸式增长的趋势,介绍了大数据治理的概念和本文对于大数据治理的理解,并进一步针对数据治理和数据清洗内涵的不同进行了区别说明。此外,还梳理了当前各国在大数据治理和大数据开发方面的现状,对我国在大数据治理方面的政策环境和技术发展情况进行了概括。本研究针对情报大数据的特点,分析了大数据治理对于情报数据发挥作用的重要性;针对情报大数据在数据治理方面面临的问题,分析了情报大数据治理的需求;在情报大数据治理框架方面,构建了由人员组织机构、治理机制、形成的能力、治理策略等方面组成的情报大数据治理模型;对情报大数据管理生命周期内的治理内容进行了描述;最后对情报大数据治理的前景进行了简单展望。  相似文献   
32.
Abstract

Although the concept of legitimacy is central to Western counterinsurgency theory, most discourse in this area black-boxes the concept. It hence remains under-specified in many discussions of counterinsurgency. Fortunately, recent research on rebel governance and legitimacy contributes to our understanding of the problems faced by counterinsurgents who want to boost state legitimacy while undermining that of the rebels. Taken together, this research illustrates that a rational choice approach to legitimacy is simplistic; that micro-level factors ultimately drive legitimacy dynamics; and that both cooption of existing legitimate local elites and their replacement from the top–down is unlikely to succeed. Western counterinsurgency doctrine has failed to grasp the difficulties this poses for it.  相似文献   
33.
This article explores how transnational borderlands matter for conflict prevention and, in particular, so-called upstream engagement, which aims to reduce threats to global stability and security that arise from the world’s increasing interconnectedness. Accounting for transnational borderlands in vulnerable regions is crucial for conflict prevention as pursued by the defence and security sector because borderlands are catalysts of the negative side of global interconnectedness: they are business hubs for transnational organised crime, sites of retreat for conflict actors, and safe havens for terrorists. The border areas’ proneness to impunity and the ability of violent non-state actors to govern these spaces illicitly contribute to the emergence of these characteristics. I therefore argue that upstream conflict prevention needs to do two things to address these risks: first, to overcome a national security approach centred on the borderline and instead acknowledge transnational security dynamics in borderlands on both sides of the border; second, to overcome the state-centred governance lens to also consider governance exerted by non-state actors. The article draws on empirical data from a six-year study including over a year of fieldwork in and on Colombia’s borderlands.  相似文献   
34.
35.
Abstract

This study investigates the determinants of terrorism in countries that are in the top category of the Fragile States Index (FSI), and are also prone to terrorism. Panel data for 38 countries mainly from Sub-Saharan Africa, the Middle East and North Africa, and South Asia for the years 2005–2014 are used. Findings from the negative binomial and fixed effects estimation show that fragile state, number of refugees and youth unemployment have positive and significant impacts on terrorism. Military spending is positive but less robust across models. Conversely, FDI and remittances have a negative impact on terrorism with the former less robust. Governance and foreign aid are negative and insignificantly related to terrorism. Policy implications follow from the findings.  相似文献   
36.
This article addresses the principles that should guide commanders, and the rules they must adhere to, when dealing with community disputes in Afghanistan. An important feature of these principles and rules is that they have been developed to ensure that coalition forces minimize the harm caused to the local population; and that members of the coalition do not violate their own laws and policies. The principles and rules have also been developed to be consistent with counterinsurgency guidance as practiced in Afghanistan. The article concludes with a number of ‘Dos and Don'ts’ concerning dispute settlement that are relevant for coalition forces dealing with disputes at the tactical level. The article also has two appendices, which are intended to guide commanders to better understand dispute settlement systems in Afghanistan.  相似文献   
37.
Many observers anticipate “arms races” between states seeking to deploy artificial intelligence (AI) in diverse military applications, some of which raise concerns on ethical and legal grounds, or from the perspective of strategic stability or accident risk. How viable are arms control regimes for military AI? This article draws a parallel with the experience in controlling nuclear weapons, to examine the opportunities and pitfalls of efforts to prevent, channel, or contain the militarization of AI. It applies three analytical lenses to argue that (1) norm institutionalization can counter or slow proliferation; (2) organized “epistemic communities” of experts can effectively catalyze arms control; (3) many military AI applications will remain susceptible to “normal accidents,” such that assurances of “meaningful human control” are largely inadequate. I conclude that while there are key differences, understanding these lessons remains essential to those seeking to pursue or study the next chapter in global arms control.  相似文献   
38.
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy.  相似文献   
39.
ABSTRACT

There is a great conviction that the International Court of Justice’s ruling in 2002 on the Bakassi boundary dispute between Nigeria and Cameroon, and Nigeria’s decision to obey the ruling may have stopped a fierce inter-state war over the boundary. Indeed, many then ascribed to the whole boundary demarcation process as peacebuilding, disregarding the structural changes marked by the violence of forced migration. This article explores how the boundary delimitation has produced particular sorts of structural violence characterised by state neglect, loss of livelihoods and destitution. Thus, the article argues that although a full-blown war was avoided, the socio-economic conditions of the Nigerian populations on both sides of the border were not adequately considered and guaranteed as part of the peace-building agenda. It further argues that Nigeria, like many post-colonial states with the concentration of developments in major cities, neglects rural and border communities. Thus, the border communities accommodating the former Bakassi residents have further degenerated into ‘ill-governed’ spaces. This article uses structural violence as a framework to analyse the primary and secondary data to provide some deeper insights into the issues of violence being experienced by the local populations living on both sides of the demarcated border.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号