首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   609篇
  免费   3篇
  国内免费   5篇
  617篇
  2025年   1篇
  2024年   1篇
  2023年   1篇
  2021年   15篇
  2020年   8篇
  2019年   28篇
  2018年   31篇
  2017年   37篇
  2016年   38篇
  2015年   19篇
  2014年   55篇
  2013年   102篇
  2012年   15篇
  2011年   33篇
  2010年   43篇
  2009年   33篇
  2008年   38篇
  2007年   24篇
  2006年   21篇
  2005年   22篇
  2004年   15篇
  2003年   17篇
  2002年   4篇
  2001年   3篇
  2000年   4篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   2篇
  1991年   1篇
  1990年   1篇
排序方式: 共有617条查询结果,搜索用时 0 毫秒
81.
    
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   
82.
US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives.  相似文献   
83.
    
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
84.
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure.  相似文献   
85.
Despite its many institutional and political weaknesses and limitations, the African Union (AU) has been developing a variety of tools and mechanisms to respond effectively to complex disasters and emergencies (both natural and manmade) by building up a comprehensive regional security architecture. Furthermore, it has become the first and only regional or international organisation to enshrine the principle of ‘responsibility to protect’ (R2P) in its Constitutive Act. This regional approach to and formal endorsement of the R2P principle allowed it to assume a particular place in the promotion of peace and security in its area. This article aims to critically assess the effectiveness of the AU on the African continent by exploring its real capacity in preventing and responding to emergencies and violent conflicts, and therefore in rendering the principle of R2P operational. The article argues that the formalisation of principles does not necessarily mean their effective implementation. The organisation's use of the R2P principle is also greatly conditioned by internal and external factors.  相似文献   
86.
    
Africa and for that matter the Gulf of Guinea cannot be indifferent to the global energy politics of the 21st century. The increasing importance of the region has attracted major actors in the energy sector. The competing interests of these actors are played out in various forms. This heightened interest in the region, especially with the discovery of oil in huge commercial quantities, has brought the importance of the area into focus in global oil politics. This paper looks at the importance of the region in light of the huge energy potentials of the Gulf of Guinea and how the institution of proper governance systems could serve as an important factor in ensuring the proper management of the resource.  相似文献   
87.
The Sri Lankan Civil War (1983–2009) is regarded as a violent reflection of deepening divides along political and ethnic lines. During this civil war the Sri Lankan Government and its security forces have been implicated in unlawful killings carried out in a pervasive manner against civilians, whilst at the same time specifically targeting ethnic Tamils, humanitarian workers and journalists. The human rights of all citizens suffered as a result and ultimately led to the weakening of the rule of law. With the end of the civil war, the Sri Lankan Government has made little progress in providing accountability for wartime abuses. Its absence of and reluctance to ensure justice is seen as a logical culmination of decades of impunity. The importance of acknowledging historical behaviour and taking accountability for past violations will be discussed. In an analysis for paving the way to a new democracy in Sri Lanka, the main outcomes of this article are calls for accountability arising out of the government’s actions during the war; an investigation into the present state of human rights, the rule of law and finally; an examination into the political solution going forward to ensure a process of reconciliation and peaceful co-existence.  相似文献   
88.
    
As empathetic as distant nations may feel about an ongoing or looming catastrophe in a particular region of Africa, they are too far removed from the horror to grasp its gravity and impact. Geographical proximity to the atrocity, and the likelihood of its spreading to their neighbourhoods, make the communities and neighbouring countries in the imploding region the best and most effective first responders to a crisis in their own backyard. A response from ‘communal’ or ‘regional’ groups is, therefore, the most practical measure for preventing human rights violations in Africa from descending into an actual genocide or an intractable genocidal condition. A community approach to preventing genocide and other human rights abuses should serve as the foundation for a new concept of ‘moral pan-Africanism’ on the African continent in the 21st century. This article makes an argument for this genocide prevention model and new moral concept.  相似文献   
89.
    
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
90.
在分析基于格理论的信息流控制军用安全模型在实际应用中存在的不足的基础上,从安全类定义和信息流控制策略两个方面对原模型进行了理论扩展和安全性分析.扩展模型安全类在作为对象和主体时具有相同的表达方式,以及在保持原模型信息流关系情况下,允许同职权等级用户交流他们共知的信息,以及高职权等级用户访问低职权等级用户他们之间共知的信息.以数字文档安全管理系统为例对扩展模型应用进行了描述.实例表明扩展模型更适合实际系统对信息流控制的要求.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号