首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   91篇
  免费   0篇
  91篇
  2021年   3篇
  2020年   5篇
  2019年   9篇
  2018年   6篇
  2017年   4篇
  2016年   1篇
  2015年   2篇
  2014年   5篇
  2013年   41篇
  2011年   3篇
  2010年   4篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2004年   1篇
  2003年   2篇
  1992年   1篇
排序方式: 共有91条查询结果,搜索用时 0 毫秒
71.
    
Security Intergovernmental Organizations, here illustrated by NATO, persist in a “permitted interval” of internationalization, i.e. permitted by its member-states. On the one hand, they are seldom or never permitted to vanish due to member-states' vested interests in retaining them as tools of statecraft, even if their original purposes have become redundant. On the other hand, there is an internationalization ceiling that they must respect: they should not become too autonomous and thereby no longer be suitable as member-state tools. In spite of post-Cold War reform, interviews carried out at NATO Headquarters (HQ) in the late 1980s compared to interviews in 2012 display that a continuous pulling and hauling of forces of internationalization and renationalization have taken place around NATO HQ. The only instance of clear internationalization can be observed in the proactive diplomacy of Secretary General Fogh Rasmussen. There is stiff opposition to the internationalization of abolishing the Military Committee/International Military Staff among minor and South European states, and there is no waning in states' attempts to micro-manage the International Staff. Only external shocks can overcome resistance to internationalizing reform.  相似文献   
72.
    
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
73.
本文从当今国际维和行动现状出发,分析了国际维和行动的特点,剖析了国际维和行动面临的挑战问题,最后对国际维和行动的发展提出几点思考,并系统阐述了维和行动的相关问题。  相似文献   
74.
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?”  相似文献   
75.
    
The drone is the latest tool to promote interests of a nation-state. It is clear that USA as well as other major powers anticipate that robotics will play a key role in future warfare. Today, more than 70 countries have already acquired drone technology and many others are desperate to join the ranks. This urge for drone technology will ultimately lead to a “boundless and borderless war without end.” In the case of Pakistan, the US drone campaign has raised some important issues regarding how their use could, or should, be regulated in the future. This article analyses the legal issues raised by the US's use of drone technology in non-combat zones, such as Pakistan. It is argued that a reckless disrespect of Pakistan's sovereignty has had adverse implications and consequences for the legitimacy of the Pakistani government. Drone strikes have prompted instinctive opposition among the Pakistani population, hurt their feelings and estranged them from the government. This in turn has added to Pakistan's instability and stimulated a ground-swell of animosity toward the USA.  相似文献   
76.
    
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces.  相似文献   
77.
This article analyzes the public side of the NH90 network consisting of four participating countries (Germany, France, Italy, and the Netherlands) and their industrial partners. Comparable to observations in earlier international projects in the defense sector, the development and production of the NH90 defense helicopter did not match original plans and costs estimates. On the basis of four mechanisms that were intended to facilitate the cooperation between the partnering countries (the General Memorandum of Understanding; coalition formation; the role of the central agency; and the process of vertical escalation) the question is posed whether or not there was a true alignment of national interests and “logics.” The lack of standardization, as well as program delays and issues concerning the division of the work-share, lead to the emerging alignment being characterized as “quasi-alignment” at best.  相似文献   
78.
    
ABSTRACT

While nuclear suppliers compete in markets, they simultaneously partner in other fields. This produces a delicate relationship between civilian nuclear programs and nuclear weapon proliferation. This study explores how export competition affects suppliers’ conditions of supply related to nuclear nonproliferation. We investigated three export cases (India, North Korea, and South Korea) and identified four effects that competition has on the conditions of supply related to nonproliferation. First, under highly competitive conditions, suppliers might hesitate to enforce the conditions of supply to avoid negotiation conflicts with recipients. Second, suppliers focus on politically and economically attractive recipients while mostly ignoring unattractive ones, perhaps allowing proliferation problems to fester out of view in marginal states. Third, suppliers can build consensus on the conditions of supply to avoid being the only party experiencing negotiation conflicts. Fourth, suppliers can constrain others from relaxing the conditions of supply to maintain economic benefits and nonproliferation norms. The first two effects accelerate proliferation while the last two promote nonproliferation. Although the extent of these effects can vary with changes in nonproliferation norms, they can contribute to our understanding of the relationship between nonproliferation and civilian nuclear programs.  相似文献   
79.
    
Since the terrorist attacks of 11 September 2001, the continent of Africa, particularly Greater East Africa, has played an increasingly signifi cant role in United States (US) national security strategy. Transnational security threats and political authoritarianism continue to plague the region, creating calls for greater US and international involvement. Before reacting to the situation, however, it is prudent to pause, reflect, and understand that the United States developed strategic relations with nation-states in the region well before contemporary concerns for international terrorism and ungoverned spaces entered the strategic lexicon. Toward a more comprehensive understanding of Greater East Africa's strategic history, this paper examines the core strategic relationship in the region, US-Kenya relations, its origins and implications, and offers policy recommendations that will affect future international security.  相似文献   
80.
    
ABSTRACT

The strategic culture approach has been suffering from a prolonged theoretical stalemate, despite a surge in case studies, which culminated in the Johnston-Gray debate and subsequent schism. The present paper outlines a new approach designed to overcome this deadlock, and consists of three arguments. First, the three previous generations of strategic culture studies have failed to explain how strategic culture influences behaviour. Second, aligning strategic culture theory-building with discursive institutionalism offers a way to overcome this fundamental fallacy. Third, a research programme for strategic culture should draw on computational social science to enable it to present and test middle-range theories.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号