首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   185篇
  免费   22篇
  国内免费   12篇
  2022年   2篇
  2021年   1篇
  2020年   5篇
  2019年   10篇
  2018年   12篇
  2017年   14篇
  2016年   20篇
  2015年   7篇
  2014年   13篇
  2013年   55篇
  2012年   9篇
  2011年   14篇
  2010年   6篇
  2009年   7篇
  2008年   4篇
  2007年   4篇
  2006年   6篇
  2005年   4篇
  2004年   9篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1998年   2篇
  1997年   1篇
  1996年   2篇
  1995年   1篇
  1990年   1篇
排序方式: 共有219条查询结果,搜索用时 15 毫秒
211.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   
212.
分析了传统的灭火作战方案优选方法存在的弊端,提出了基于模糊集理论的计算理想点距离的优选法,明确了语言变量与模糊集理论的相关定义,规定了模糊评价语言与三角模糊数的换算方法,阐述了理想点距离的计算方法,建立了灭火作战方案优选模型,验证了该方法在灭火作战方案优选方面的科学性、有效性以及合理性.  相似文献   
213.
Understanding contemporary conflicts in Africa remains directly dependent on the approaches employed to decipher or interpret them. This article first examines the bias of conventional approaches (inherited from the Cold War) and then those of a series of supposedly “newer” approaches. Relying primarily on West African examples, it offers a brief overview of current knowledge, issues, and avenues for research, based on three apparent characteristics of a “new generation” of conflicts: the regionalization of wars, the privatization of violence and security, and the recourse to extreme forms of brutality. These three major trends bear witness to a rapid transformation of war and armed violence over the past 20 years, but they are not sufficient to establish a radical historical break between “old” and “new” conflicts in Africa. By concealing elements of continuity a priori, the most influential “new” approaches actually make it impossible to ponder their own limits. To that end, fashionability and struggles for influence within the Africanist field play a major role in perpetuating dominant, sensationalistic, or simplistic (and invariably incorrect) portrayals of African conflicts.  相似文献   
214.
基于复合标度的二元语义评价方法,提出了一种用于分布式指挥控制决策冲突问题的一致性模型。该模型首先对决策者的一致程度进行判断;其次,测量出个人与整体的偏好偏差,并由模型中的反馈机制提出相关反馈建议;最后通过算例表明该模型可以较好解决决策过程中由于个人认知不同而产生的冲突问题。  相似文献   
215.
从焦元为非单元素集合的角度出发,考虑焦元之间存在相等、包含、相交的关系,对焦元mass函数进行细分计算,得到一种新的冲突系数计算方法。将该方法应用到新的证据组合规则之中,并通过数值仿真实验验证了新的证据组合规则的有效性。  相似文献   
216.
ABSTRACT

Following South Sudan's secession in 2011, the country faced significant political, social and economic challenges. The country emerged from a long andarduous nation-building journey, including almost 50 years of violent conflict, that would continue after declaring independence. This nation-building process would suffer a significant set-back in December 2013 when the most recent civil war broke out. This article provides a new perspective on South Sudan's nation-building trajectory that tends towards violence and complicates peace-building. It does so by utilising the leadership process approach from the Leadership Studies literature. While popular literature and commentary tends to fault the South Sudanese elite for the current crisis, there has not been a systematic effort to understand the leadership challenge and its role in conflict, peace and nation-building in South Sudan. In this article, South Sudan's nation-building process and its three primary components of (a) identity construction, (b) statehood and (c) collective will and responsibility, are analysed from a leadership perspective, focusing on issues of power and influence. The conclusion is reached that South Sudan's nation-building has been and will likely continue to trend towards a violent process due to a leadership process that lacks mutuality and is founded on insufficient sources of power.  相似文献   
217.
ABSTRACT

There is a dearth of studies on indirect victims of sexual violence in counter-terrorism efforts. Using Nigeria as a case study, this paper argues that global and state-level counter-terrorism policies have generally failed to account for the psychological effects of the engagement of female NGO workers in counter-terrorism operations or mitigating the effects of terrorism in conflict zones. Specifically, there has been an increase in sexual violence perpetrated by some members of the security agencies involved in counter-terrorism operations in North-eastern Nigeria. As a result, female NGO workers carry out Medicare, psychosocial counselling and advocacy for these victims. Female NGO workers become exposed to the trauma of victims of sexual violence, which affects their mental health and thus performances in counter-terrorism activities in the country. This altered their worldview on issues of safety even among secured locations or among the presence of security agents and reinforced feelings of powerlessness.  相似文献   
218.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   
219.
ABSTRACT

Recent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号