首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38篇
  免费   6篇
  国内免费   1篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   3篇
  2014年   6篇
  2013年   14篇
  2012年   2篇
  2011年   5篇
  2009年   3篇
  2007年   1篇
  2004年   2篇
  2003年   1篇
  2001年   1篇
  1993年   1篇
排序方式: 共有45条查询结果,搜索用时 15 毫秒
31.
It is rare to find a well-formulated study that describes the behavioral aspects of leadership in the political realm. Even more infrequent is a combined study of individual behaviors as it applies to a large techno-political issue such as nuclear proliferation. India, Argentina, Australia, and France are used as cases for application of a national identity conception model. The model is based on two dimensions, solidarity and status, that when combined, result in a leader's identification with other nations’ abilities to be a player in the nuclear arms community. While the work is behavioral in context, there is no effort to avoid the technological side of proliferation, so as to provide a balanced review of a complex issue.  相似文献   
32.
十八大报告提出了推进公民道德建设工程的重大任务,而亲社会行为的培养正是公民道德建设工程的重要目标。道德认同是激发亲社会行为的重要动机,增进道德认同是培养社会成员亲社会行为的根本途径,因而亟须在道德认同视角下深入探讨亲社会行为的培养机制。当前社会背景下,完善亲社会行为的社会规则认同机制、社会归属认同机制、社会责任认同机制、社会支持暖化机制、社会回报强化机制和社会实践固化机制是针对现存突出问题应做出的理性选择。  相似文献   
33.
梁晓波  武啸剑  曾广 《国防科技》2018,39(3):017-026
话语体系是当今人文社会科学研究的热词,也已成为影响国家安全的一个重要因子。论文首先介绍话语体系的概念及其特点,报告了话语体系研究的缘起和发展脉络、主要学科与核心关键词以及主要相关文献,并对当前研究现状进行总结。分析了话语体系与国家的关系,并从国家的主体思想、发展道路、身份特质、文化自信、文明追求、话语权等方面阐述了话语体系对国家安全的重要性。论文指出,话语体系是影响国家安全的重要领域,也是国家之间博弈的重要阵地。  相似文献   
34.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   
35.
基于智能卡的身份认证在军事领域中具有广泛的应用前景,由于军事信息具有高度的敏感性与机密性,传统的、静态的、单向的身份认证方案不能满足军事应用的需求,通过对几种认证方案的研究,提出了一种基于RSA密码体制的实时的、动态的、极小泄漏的双向身份认证方案,不仅证明了它的完备性,并对其安全性进行了分析,结果表明它具有比以上几种认证方案更高的安全性.  相似文献   
36.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   
37.
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.  相似文献   
38.
证据理论与模糊神经网络相结合的身份估计方法   总被引:7,自引:0,他引:7  
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。  相似文献   
39.
Abstract

This paper offers a simple strategic framework to help governments identify various policy mechanisms to minimize public sector corruption. The paper offers a formal model that blends the economics of crime with identity economics and money laundering. It presents a partial equilibrium framework that focuses on a representative public official engaged in a mix of legal and illegal effort. The model introduces various levers a government might use to impact the costs and benefits of illegal effort. The ultimate goal is to help turn volatile vicious cycles of political instability, into steady virtuous cycles of stability, growth, and sustainable development.  相似文献   
40.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号