首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   148篇
  免费   3篇
  国内免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   5篇
  2015年   4篇
  2014年   18篇
  2013年   62篇
  2012年   3篇
  2011年   4篇
  2010年   3篇
  2009年   7篇
  2008年   3篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2000年   1篇
  1999年   1篇
排序方式: 共有152条查询结果,搜索用时 31 毫秒
101.
This article aims to review some of the key lessons learnt by the Royal Ulster Constabulary's (RUC) Special Branch in the 37 years of the troubles in Northern Ireland. Above all counter-terrorism is an intelligence led operation and Special Branch are the key agency for this in all UK police forces, who have now benefited enormously from the expertise that the RUC's Special Branch built up over the years and have passed on to their colleagues throughout the UK. Intelligence is more often than not a human role and relies on human agencies, which was the case in Northern Ireland. The bulk of intelligence gathering was carried out at quite low levels although the sifting and analysing of it became a more specialist skill. Electronic intelligence and computerised systems were often quite low down in the order of priorities and uses, which tends to confound popular impressions. Agents, informers and good old fashioned ‘coppers’ who knew their patch were much more important both in terms of gathering information and in terms of undermining the terrorists morale from within and it was these factors that fundamentally defeated the IRA in Northern Ireland.  相似文献   
102.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   
103.
恐怖主义犯罪是威胁新疆社会稳定的一个不可忽视的因素。反恐情报收集工作是新疆反恐维稳工作的前提。将“爱民固边”战略方法与公安边防反恐情报收集工作相结合,指出“爱民固边”战略在新疆反恐情报收集q-的应用问题现状,并针对问题提出了方法措施,从而最大限度地发挥“爱民固边”战略优势,维护新疆边境地区的安全与稳定。  相似文献   
104.
Abstract

This study seeks to estimate the causal effects of PKK separatist terrorism on economic development in Turkey using the synthetic control method. By creating a synthetic control group that reproduces the Turkish Gross Domestic Product (GDP) before PKK terrorism emerged in the late 1980s, we compare the GDP of the synthetic Turkey and the actual for the period 1955–2008. Our study finds that the Turkish per capita GDP would have been higher by about $2600 had it not been exposed to terrorism. This translates into an average of 21.4% higher per capita GDP over a period of 21 years.  相似文献   
105.
Nuclear energy is an integral part of China's energy strategy and will increasingly contribute to China's total energy supply. China has more than twenty civilian facilities, including power reactors, mines, and enrichment plants, to support its nuclear power program. As China operates more nuclear plants, more nuclear materials will be produced and stockpiled, and more nuclear facilities will be spread around the country. To ensure that this expanded network of nuclear facilities does not increase the risk that nuclear materials will be diverted or become the target of attack, China will need to develop more reliable domestic nuclear security strategies. China is also poised to become a major exporter of nuclear energy technology. China has committed to keeping nuclear technologies out of the hands of dangerous states and/or sub-state organizations, but in order to fulfill its nonproliferation obligations as well as its treaty-based commitment to share nuclear technologies, China will need to strengthen nuclear export controls and practices. This report examines and evaluates security measures at Chinese civilian nuclear power plants and suggests ways to improve them. It also reviews current export control policies and systems, identifies likely challenges to the expanding nuclear sector, and proposes possible solutions.  相似文献   
106.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   
107.
Boko Haram terrorism has been recognized by Nigerian President Jonathan as the most threatening and complex security issue in Nigeria since independence. In response, the Federal Government of Nigeria has committed itself to different counterterrorism measures, which are largely dominated by “hard politics” and military mobilization. Spending heavily on defense to upgrade military hardware and train personnel in a counterterrorism role, Nigeria has also boosted its strategic importance in the “Global War on Terror”. However, this attempt has become unpopular as it has failed to contain Boko Haram within a short time frame and has made insufficient headway against unabated terror, with human rights costs among the host communities and amidst a surge of stakeholders' discordance. As a matter of concern, this article seeks to assess Boko Haram as an opponent in Nigeria's war on terror (WOT) and to ascertain the challenges the country faces, the alternative measures open to it, and possible ways forward.  相似文献   
108.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   
109.
Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities.  相似文献   
110.
This paper is the first global investigation of the relationship between remittances and terrorism. To discern this relationship, we draw terrorism event data from the Global Terrorism Database and International Terrorism: Attributes of Terrorism Events. When a host of standard terrorism controls is employed, lagged remittances as a share of gross domestic product have a positive and significant impact on both domestic and transnational terrorist attacks. For the venue country’s viewpoint, lagged remittances have a greater marginal impact on domestic than on transnational terrorism. However, when we investigate remittances to the home country of the perpetrator, lagged remittances have the greatest marginal impact on transnational terrorism. Throughout our investigation, standard terrorism controls perform according to our priors and those of the literature, lending credence to the isolation of the impact of remittances. We also account for endogeneity concerns.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号