排序方式: 共有163条查询结果,搜索用时 31 毫秒
51.
在明确了"工程化"内涵的基础上,研究了美军依托联合能力集成与开发系统(Joint Capabilities Integrationand Development System,JCIDS)建立的与装备需求生成紧密相关的军队联合能力需求生成机制。指出该机制具有典型的工程化特征和很高的工程化程度,集中体现在程序、任务、方法、成果、描述和管理6个方面。逐一阐述了各个方面中蕴含的工程化思想和方法,对建立符合我军特点的装备需求工程学科有一定参考价值。 相似文献
52.
核心维修能力,是解决军队建制维修力量与地方维修力量如何结合、如何结合合理、如何结合才能取得最佳效果,成功推行军民一体化装备维修保障的瓶颈问题。从美军核心维修能力的研究背景着手,分析了核心维修能力研究的必然性和重要性,全面阐述了美军核心维修能力的内涵和现行判定方法,客观分析了美军核心维修能力研究中存在的一些不足,得出开展我军核心维修能力研究的重要启示。 相似文献
53.
Despite the burgeoning literature on Russia’s renewed power politics, little attention has been paid to the fact that US reactions towards Russia’s military interventions were all but coherent. The USA has chosen weak measures in Georgia in 2008 (shaming) compared to its assertive response in Ukraine in 2014 (sanctions, hard deterrence). This article assesses the explanatory power of neorealist, liberal and constructivist theories for the variation in US reactions towards Russian interventions in Georgia and Ukraine. Our argument is that the constructivist perspective explains the cases best as it highlights the power and communality of normative assessments. The Ukraine crisis was perceived by the USA as a violation of core international norms, especially the non-use of force and the principle of territorial integrity. Relevant international norm carriers shared this assessment of the conflict. In contrast, the perception of the Georgian war centred on the issue of democracy promotion. While democracy is an important aim of US foreign policy, it does not summon the same normative importance as general principles of international law. Furthermore, the perception of the Georgian war remained contested among Western allies, which decreased the communality of the normative assessment. 相似文献
54.
Nathalie Tocci 《Contemporary Security Policy》2016,37(3):461-472
This article traces the evolution of the EU strategic reflection which culminated in the publication of the EU Global Strategy (EUGS) in June 2016. It explains the choices made by EU High Representative Federica Mogherini over this time period—including both the initial strategic assessment and the final EUGS. It provides a behind the scenes view on the players, the organization and the methods of work used to produce a strategic vision for the EU’s role in the world. 相似文献
55.
Kayce Mobley 《Journal of Military Ethics》2016,15(2):122-142
Following the terrorist attacks against the US in 2001, the Bush administration reaffirmed the Dover ban, the policy that prohibited press coverage of military coffins arriving at Dover Air Force Base from conflicts abroad. Conventional wisdom holds that the Bush administration enforced the ban in the hope of maintaining public support for the wars in Afghanistan and Iraq. This understanding, though, is incomplete. If the Dover ban were enforced only in response to eroding public opinion, then other coalition states would have responded likewise to this shared incentive. I argue instead that maintaining public support is only one factor among many that led the US to uphold this policy. In addition to considering the influence of factors such as perceived media bias and casualty aversion, I focus on necropolitics and the related impetus for governments to regulate the observation of death. Through this interpretation, part of the American response to the involuntary loss of sovereignty on 9/11 was to exercise control over the observation of death by enforcing the Dover ban. Through comparing the press policies of the US, the UK, and Canada, I show that the necropolitical blow to sovereignty that only the US experienced triggered a repressive policy that only the US was able to maintain. 相似文献
56.
The United States has conducted armed drone strikes in Pakistan since 2004. While there has been some recent work on Pakistani public opinion about drones, there is very little research on how Pakistan’s media characterize the US drone program. This is an important gap in understanding the determinants of Pakistani popular perceptions of this program. Decades of research has shown that “news framing”, a process by which certain aspects of a complex concept are emphasized in political communications with others played down, influences individual cognition while forming political opinions. In this essay, we address this lacuna by assembling an unprecedented sample of editorials about the drone program from three English newspapers and one Urdu newspaper and analyzing the news frames within them. We next compare the trends in these news frames to public opinion data collected by Pew between the spring of 2009 and 2014. Initially, most Pakistanis were unaware of the drone program, media coverage of the program expanded as drone strikes increased in frequency. While Pakistanis became more cognizant of the US drone strikes, even by 2014 large minorities remained unaware. Pakistani public opinion strongly reflected the top media frames, particularly those that are negative. This is an important finding suggesting that newspaper editorials are a good barometer of Pakistani opinions despite the fact that only information elites rely upon newspapers for political information. 相似文献
57.
Dong Jung Kim 《战略研究杂志》2016,39(5-6):899-921
ABSTRACTScholars and practitioners of grand strategy agree that the use of military force should be supplemented by appropriate economic policies. However, strangely few accounts of economic complements to military grand strategies have been presented in recent discourse on US grand strategy. This paper takes a first step to fill this information gap. I first assess the role that could be played by economic measures under two types of grand strategies – one focusing on the balance of power and the other emphasising influence and order. Second, I introduce what I call ‘the influence-capability dilemma’ and discuss tradeoffs in adopting certain economic policies in order to help the US sustain pre-eminence in the international system. Third, I discuss how the US should address this dilemma of economic means in dealing with the rising China. 相似文献
58.
计算机网络攻击效果评估技术是信息系统安全评估中一个重要而具有挑战性的课题。目前 ,相关的理论尚不成熟 ,有关的研究报道较少。简要总结了当前已经存在的主要信息安全的评估方法 ,在此基础上 ,从便于实际度量和计算的角度出发 ,提出了基于网络信息熵的评估技术、基于系统安全层次分析的安全评估框架和基于指标分析的网络攻击效果综合评估技术等三种评估模型 ,并分析了各自在使用中应注意的问题 相似文献
59.
60.