首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   396篇
  免费   28篇
  国内免费   22篇
  2024年   1篇
  2023年   4篇
  2022年   2篇
  2021年   9篇
  2020年   8篇
  2019年   23篇
  2018年   11篇
  2017年   15篇
  2016年   21篇
  2015年   17篇
  2014年   28篇
  2013年   124篇
  2012年   22篇
  2011年   20篇
  2010年   13篇
  2009年   23篇
  2008年   8篇
  2007年   14篇
  2006年   14篇
  2005年   12篇
  2004年   3篇
  2003年   10篇
  2002年   4篇
  2001年   7篇
  2000年   1篇
  1999年   2篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   15篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1989年   2篇
排序方式: 共有446条查询结果,搜索用时 156 毫秒
71.
ABSTRACT

Although the existing international-relations scholarship argues that technological assistance in the nuclear domain increases the probability of nuclear proliferation, the historical account indicates otherwise. Congressional legislation for nonproliferation, economic sanctions, and poor state capacity—specifically, inept managerial capabilities of the recipient state—explain merely part of the puzzle, but overlook the role of positive inducements offered to impede nuclear proliferation. Historical evidence shows that the United States often provided technological assistance with the deliberate intent to inhibit proliferation. In other words, Washington employed its technological leverage to attain nonproliferation goals. American technological preponderance since the end of World War II made such an approach feasible. This study examines key Cold War cases—Israel/Egypt, India, and West Germany—where the United States offered technological assistance with the deliberate intent to stall nuclear proliferation, thereby underscoring the role of assistance for inhibitive ends.  相似文献   
72.
A recently published collection of captured Iraqi records offers an opportunity to better understand Saddam Hussein's perception of US and Israeli deterrence signals, affording innovative insights into the reasons behind Iraq's restraint from using weapons of mass destruction against Israeli targets during the 1991 Gulf War. This article tests a wide range of suggested hypotheses, and suggests that US and Israeli deterrence played only a minimal role in dissuading Iraqi use of WMD. The article concludes with some thoughts on the practical implications, particularly on the effectiveness of a “no-first-use” nuclear policy.  相似文献   
73.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously.  相似文献   
74.
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40.  相似文献   
75.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
76.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   
77.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   
78.
This article analyzes the quality of the Egyptian and Israeli intelligence advice and decision-making process in the October 1973 War as key factors that determined its course. Following a background to the subject, we focus on the 9–13 October standstill stage, in which Sadat decided, despite his generals’ advice, to renew the Egyptian offensive. Effective Israeli intelligence collection about the coming attack, which was well used by the decision-makers, saved Israel from accepting an undesired ceasefire. The result was the 14 October failed Egyptian offensive that turned the tide of the war and led to Israeli military achievements at the war’s final stage  相似文献   
79.
Based on full access to Norwegian archives up to 1970, the article describes the origins and development of ‘stay-behind’– an organized preparedness, under the aegis of the Norwegian Intelligence Service, for intelligence and sabotage behind enemy lines in case of a Soviet occupation. Initiated by Defence Minister Jens Christian Hauge, wartime leader of the Norwegian military resistance, the set-up built on lessons learnt during the German occupation, when effective resistance was hampered by inexperience and improvisation. Secrecy and security, and national Norwegian control albeit with cooperative links with British and American secret services, were distinctive features of the networks that came into being from 1948 onwards. NATO began to take an interest from 1952, but SACEUR's main concern was for ‘retardation’– guerrilla and sabotage activities to delay Soviet forces even before entering NATO territory.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号