排序方式: 共有48条查询结果,搜索用时 15 毫秒
41.
关于公安执法理念的探讨 总被引:1,自引:0,他引:1
王青 《中国人民武装警察部队学院学报》2004,20(2):54-57
公安机关领导和民警的执法理念 ,直接影响和决定了公安队伍执法工作和队伍建设。在剖析执法理念含义的基础上 ,客观分析了执法实践中存在的理念偏差和不足 ,并结合“三个代表”重要思想的学习贯彻 ,阐述了现代执法理念应包含的内容 相似文献
42.
43.
When rational choice theory is applied to the study of terrorism, it is important that attention be given to the derived principles of constrained utility maximization. Particularly useful is the Slutsky equation, which rigorously analyzes the quantity response in one activity to a price change in another. By directing attention to assumptions and/or information about compensated cross price elasticities, expenditure shares, and income elasticities, the Slutsky equation can provide critical guidance in both theoretical and empirical analysis. 相似文献
44.
45.
Bruce ‘Ossie’ Oswald 《Small Wars & Insurgencies》2013,24(1):174-192
This article addresses the principles that should guide commanders, and the rules they must adhere to, when dealing with community disputes in Afghanistan. An important feature of these principles and rules is that they have been developed to ensure that coalition forces minimize the harm caused to the local population; and that members of the coalition do not violate their own laws and policies. The principles and rules have also been developed to be consistent with counterinsurgency guidance as practiced in Afghanistan. The article concludes with a number of ‘Dos and Don'ts’ concerning dispute settlement that are relevant for coalition forces dealing with disputes at the tactical level. The article also has two appendices, which are intended to guide commanders to better understand dispute settlement systems in Afghanistan. 相似文献
46.
苏昊 《兵团教育学院学报》2012,(6):56-59
公共课心理学是体现师范特色的重要必修课,但在课程安排、教材内容、教师、教学方法和教学效果方面还存在着一些问题。针对这些问题,研究者们主要对教学体系和教材进行了改革,本文也根据教学实际提出一些具体的改革措施和建议。 相似文献
47.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
48.
底层功能实现模块是程控交换机多媒体仿真训练系统通用设计平台的关键部分。硬件配置是交换机工作的基础 ,是底层功能实现模块的重要组成部分。该文介绍了交换机硬件系统的建模 ,利用两种典型机型硬件实际的工作情况 ,解释并验证了所建立的通用功能流程图 ,并介绍了参数接口的管理与应用 相似文献