首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   487篇
  免费   41篇
  国内免费   17篇
  2023年   2篇
  2021年   14篇
  2020年   6篇
  2019年   29篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   51篇
  2013年   99篇
  2012年   8篇
  2011年   26篇
  2010年   35篇
  2009年   30篇
  2008年   35篇
  2007年   21篇
  2006年   18篇
  2005年   18篇
  2004年   11篇
  2003年   15篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   2篇
排序方式: 共有545条查询结果,搜索用时 62 毫秒
151.
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones.  相似文献   
152.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   
153.
This article revisits Zimbabwe's land question from the vantage point of having been written five years after the ‘fast-track’ land redistribution programme was launched. Without belittling the accomplishments of land reform in the first 19 years of the country's independence, it is generally clear that the sweeping programme of 2000–2003, the most comprehensive of its kind, created a new paradigm. Clearly, the consequences will take many years to work themselves out through the country's political, economic and social fabric.

The article briefly defines what may be termed ‘old’ and ‘new’ versions of Zimbabwe's land question before outlining the salient aspects of the reform process itself. It then assesses the outcomes of the redistribution, the apparent lacuna between ‘land’ and ‘agrarian’ reform, and the debate that the reform process itself has kindled. Transforming land distribution into qualitative agrarian reform has proved an Achilles heel in the arguments put forward by the proponents of the fast-track programme. Finally, recommendations are provided as to what is necessary to secure land and agrarian reform in the short, medium and long term.  相似文献   
154.
Much is made in the security sector reform literature of the role of civil society as an overseer and monitor of the security sector, contributing to improved accountability and governance. This paper looks at how the notion of ‘civil society capacity’ needs to be disaggregated in order to develop meaningful strategies to assist civil society organisations to impact security sector reforms in complex, post-conflict contexts like the Democratic Republic of Congo. It draws on fieldwork conducted with 200 Congolese civil society groups that are attempting to engage in current security sector reform processes, and looks at which capacities are required to improve oversight by civil society groups.  相似文献   
155.
The funding of international nuclear risk mitigation is ad hoc, voluntary, and unpredictable, offering no transparent explanation of who is financially responsible for the task or why. Among many non-nuclear-armed states, this exacerbates a sense of injustice surrounding what they see as a discriminatory nuclear regime. The resulting erosion of the regime's legitimacy undermines support for efforts to prevent nuclear weapons dissemination and terrorism. This article proposes a transparent, equitable “nuclear-user-pays” system as a logical means of reversing this trend. This system envisions states contributing financially to international efforts to mitigate nuclear risks at a level relative to the degree of nuclear risks created by each state. “National nuclear risk factors” would be calculated by tabulating the risks associated with each state's civilian and military nuclear activities, as well as advanced dual-use and nuclear-capable missile activities, multiplying the severity of each risk by the probability of it occurring, and combining these results. A nuclear-user-pays model would create financial incentives for national and corporate nuclear risk mitigation, boost legitimacy and support for nuclear control efforts among non-nuclear-armed states, assist in preventing nuclear weapons dissemination and terrorism, and advance nuclear disarmament by helping progressively devalue nuclear weapons.  相似文献   
156.
Though laws have been enacted in different parts of Nigeria to address some aspects of gender-based violence, domestic violence persists with serious consequences for social and economic development. Nigeria has not enacted specific domestic law that is applicable throughout the federation, despite the United Nations mandate to all countries to adopt and enforce such laws by 2015. This article examines the causes and nature of domestic violence in Nigeria, and the legal reform needed to address the situation. In addition to library sources, the study used focus group discussions and individual interviews (involving the general population, key informants, legislators and traditional rulers) to discover that enacting specific national domestic violence legislation is necessary to address the problem in Nigeria, but enacting laws alone is not a magic bullet.  相似文献   
157.
The stage may be set for what could be a historic turning point in America's reliance on nuclear weapons to meet its fundamental national security interests. Proponents of a refurbished nuclear stockpile and infrastructure are convinced that nuclear weapons will remain central to U.S. security interests, yet they admit that there is no national consensus on the need for and role of nuclear weapons. Nuclear opponents are gravely concerned that to the extent nuclear refurbishment creates a global perception that nuclear weapons remain essential instruments, it will eviscerate nuclear nonproliferation measures precisely at a time when nuclear ambitions are growing. Moreover, opponents see deterrence through advanced conventional weapons as decisively more credible than any nuclear alternative. With hopes of elevating discourse to the national level, this article examines the key current arguments pro and con within the specialist community and forecasts changes in the U.S. nuclear arsenal over the next decade. It concludes with a brief prognosis on prospects for complete nuclear disarmament.  相似文献   
158.
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   
159.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013  相似文献   
160.
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号