全文获取类型
收费全文 | 784篇 |
免费 | 4篇 |
国内免费 | 5篇 |
专业分类
793篇 |
出版年
2025年 | 1篇 |
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 1篇 |
2021年 | 21篇 |
2020年 | 22篇 |
2019年 | 44篇 |
2018年 | 51篇 |
2017年 | 56篇 |
2016年 | 49篇 |
2015年 | 22篇 |
2014年 | 62篇 |
2013年 | 154篇 |
2012年 | 21篇 |
2011年 | 33篇 |
2010年 | 44篇 |
2009年 | 33篇 |
2008年 | 42篇 |
2007年 | 28篇 |
2006年 | 23篇 |
2005年 | 21篇 |
2004年 | 16篇 |
2003年 | 16篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1995年 | 3篇 |
1993年 | 4篇 |
1991年 | 1篇 |
1990年 | 2篇 |
排序方式: 共有793条查询结果,搜索用时 15 毫秒
591.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains. 相似文献
592.
Carol Atkinson 《Defense & Security Analysis》2015,31(1):35-43
This article investigates how US national security planners have envisioned the emerging strategic environment during the early twenty-first century and evaluates how their perceptions of this strategic environment have changed during these years. This conceptual evolution can be seen in how defense planners define threats, identify defense priorities, and design security strategies. Five key strategic planning documents serve as the basis for this analysis and illustrate significant shifts in how the US government has envisioned its own security requirements as well as the context within which its strategic vision will need to be realized. These planning documents are: (1) Joint Vision 2020, (2) the Bush Administration's 2002 National Security Strategy of the United States, (3) the Obama Administration's 2010 National Security Strategy, (4) US Strategic Defense Guidance entitled Sustaining US Global Leadership: Priorities for 21st Century Defense, and (5) the US Chairman of the Joint Chiefs of Staff's Capstone Concept for Joint Operations: Joint Force 2020. 相似文献
593.
Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities. 相似文献
594.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed. 相似文献
595.
Jason E. Strakes 《Defense & Security Analysis》2013,29(4):308-322
In the years since the 2003 Rose Revolution, the popularly elected leadership of the Republic of Georgia has responded to organized protests with a variety of repressive tactics. These reactions suggest that former challengers to authoritarian elites may utilize similar methods of retaining power during crisis periods. Yet, the alleged involvement of agencies of the Russian Federation in fomenting domestic instability has also occupied a central position in the national security policies of the outgoing Saakashvili government. These conditions both preceded and were reinforced by the South Ossetia War of August 2008. This article proposes a theoretical model that represents the intervening effect of interstate conflicts on state–society relations in Georgia from 2003 to present. It presents several hypotheses and possible indicators, data sources, and techniques for analyzing the interaction between characteristics of opposition groups, external threats, and the domestic security practices of contemporary Georgian political elites. 相似文献
596.
597.
Todd Sandler 《Defence and Peace Economics》2013,24(4):319-353
This article identifies and evaluates likely challenges facing NATO today and into the next millennium. These contingencies include ethnic‐based civil wars in Europe, transnational terrorism, rogue states, increased world income inequality, out‐of‐area conflicts, and environmental and resource security. Using concepts and tools from collective action, I assess these challenges and suggest effective policies for addressing them. NATO still has a crucial role to play in maintaining world security in the post‐Cold War era. 相似文献
598.
Martin C. McGuire 《Defence and Peace Economics》2013,24(5-6):529-534
This brief introduction celebrates the 20th Anniversary of the Journal, Defence and Peace Economics. Suggesting elements of an agenda for the future of this branch of economics, I raise several topics that are new and that seem to indicate that the field will expand and shift focus substantially in future years. 相似文献
599.
JANE BOULDEN 《African Security Review》2013,22(1):15-22
In July 2001, member states will gather in New York for the UN Conference on the Illicit Trade in Arms in All its Aspects. It represents part of the effort to establish controls on small arms and light weapons. This article argues that it is possible that nuclear and conventional arms control represent two ends of a continuum, with common goals and a common set of mechanisms and processes at work. A decade after the end of the Cold War, it is not surprising that the international community is working on mechanisms to deal with conventional arms. The existence of a continuum and connections between conventional and nuclear arms control is less evident. The two arms control communities appear to function in isolation of each other. The return to the debate on small arms and light weapons echoes post-World War I and II periods. The fact that small arms control is back on the agenda within the context of the UN may signify recognition that any kind of arms control serves the same purpose—preventing and mitigating the effects and duration of, and bringing an end to conflict. 相似文献
600.
Tilman Brück 《Defence and Peace Economics》2013,24(5):375-389
This paper analyses public policy choices in the security economy from an economic perspective. It discusses the role of public goods for national and global security and identifies the importance of the first‐ and second‐order indirect effects of insecurity on economic activity, which include the behavioural responses of agents and the government to security measures, akin to such effects in insurance economics. Furthermore, key public policy trade‐offs are outlined, in particular between security and efficiency, globalisation, equity and freedom. The analysis identifies suitable policy options for raising security in the national and international contexts and in view of these trade‐offs. A balance between market and non‐market instruments in achieving security should be aimed for in order to minimise the adverse effects of aiming for higher security. In addition, the public good nature of security implies that international coordination of security policies is important, despite this process being fraught with enforcement problems. 相似文献