首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5028篇
  免费   926篇
  国内免费   420篇
  2024年   11篇
  2023年   21篇
  2022年   51篇
  2021年   78篇
  2020年   79篇
  2019年   111篇
  2018年   115篇
  2017年   231篇
  2016年   237篇
  2015年   152篇
  2014年   431篇
  2013年   454篇
  2012年   351篇
  2011年   426篇
  2010年   325篇
  2009年   422篇
  2008年   324篇
  2007年   330篇
  2006年   323篇
  2005年   308篇
  2004年   291篇
  2003年   214篇
  2002年   174篇
  2001年   166篇
  2000年   102篇
  1999年   95篇
  1998年   84篇
  1997年   74篇
  1996年   71篇
  1995年   55篇
  1994年   61篇
  1993年   44篇
  1992年   49篇
  1991年   41篇
  1990年   35篇
  1989年   18篇
  1988年   14篇
  1987年   5篇
  1975年   1篇
排序方式: 共有6374条查询结果,搜索用时 15 毫秒
791.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   
792.
793.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
794.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system.  相似文献   
795.
ABSTRACT

Nuclear disarmament is often seen as eventually requiring access to nuclear warheads or to the warhead-dismantlement process to verify that a state has not hidden weapons or weapon-materials despite promising to disarm. This article suggests this view is misplaced, and that what is needed is a verification mechanism able to provide reliable assurances of the absence of fissile materials available for use in weapons after a state has disarmed. Such a mechanism will need an initial declaration of the amount of fissile materials held by a state for all purposes, military and civilian. In a state with a nuclear arsenal awaiting elimination, this declaration would have to include materials that may not be available for verification because they are in nuclear weapons or are in other classified or proliferation-sensitive forms. This article describes a verification arrangement that does not require access to materials in weapons and in sensitive forms while still allowing checks on the overall accuracy of the declaration. Verification of the completeness and correctness of the declaration is deferred to the time when the weapons-relevant material enters the disposition process, at which point it no longer has any sensitive attributes. By removing the focus on monitoring warheads and dismantlement, this new approach could provide a more manageable path to nuclear disarmament.  相似文献   
796.
ABSTRACT

Science and technology (S&T) review is key to anticipating developments in the life sciences that may benefit or run contrary to the aims of the 1972 Biological and Toxin Weapons Convention. It serves as a mechanism for both preparing against novel biological threats and identifying the best opportunities for developing and sharing the life sciences to the fullest extent. In the age of rapidly advancing biotechnology, S&T review needs to be wide ranging, involve a diverse set of inputs, and be transparent about its methods and data. This viewpoint considers four models of S&T review and their capacity to respond to the challenge of the life sciences: standing advisory boards; ad hoc working groups; peer review; and wikis. It then identifies a hybrid model that is suitably broad, diverse, and transparent.  相似文献   
797.
ABSTRACT

There is a lingering disagreement among scholars on how the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) affects nonproliferation and disarmament outcomes. Drawing on constructivist scholarship on international norms, this article examines the extent of the NPT's effect in the case of Ukraine's nuclear disarmament. In the wake of the Soviet Union's collapse, Ukraine found itself host to the world's third largest nuclear arsenal. Despite Ukraine's initial commitment to become a non-nuclear state, it proceeded along a difficult path toward NPT accession. Most controversial and directly at odds with the NPT was Ukraine's claim to ownership of its nuclear inheritance as a successor state of the Soviet Union. This article argues that, while much domestic discourse about the fate of these nuclear weapons was embedded in the negotiation of Ukraine's new identity as a sovereign state vis-à-vis Russia and the West, the NPT played an important, structural role by outlining a separate normative space for nuclear weapons and providing the grammar of denuclearization with which Ukraine's decision makers had to grapple.  相似文献   
798.
The Middle East is a crucial region for the global nonproliferation regime. In 2010, the state parties to the Treaty on the Non-Proliferation of Nuclear Weapons proposed a conference on a Middle East Weapons of Mass Destruction-Free Zone. The nuclear weapon-free zone model, on which this idea builds, has achieved important results in other regions, but faces especially stark challenges in the Middle East. However, the attempt to apply the boldly imaginative zone approach to the Middle East holds promise for building a more inclusive dialogue on nonproliferation and regional security.  相似文献   
799.
On October 1, 2008, Congress enacted a proposal that originated with President George W. Bush in 2005 to approve an unprecedented nuclear trade pact with India by removing a central pillar of US nonproliferation policy. Despite the numerous political challenges confronting the Bush administration, the initiative won strong bipartisan support, including votes from Democratic Senators Joseph Biden, Hillary Clinton, and Barack Obama. The four-year struggle to pass the controversial US-India nuclear trade agreement offers an exceptionally valuable case study. It demonstrates a classic tradeoff between the pursuit of broad multilateral goals such as nuclear nonproliferation and advancement of a specific bilateral relationship. It reveals enduring fault lines in executive branch relations with Congress. It vividly portrays challenges confronting proponents of a strong nonproliferation regime. This article is based on an analysis of the negotiating record and congressional deliberations, including interviews with key participants. It assesses the lessons learned and focuses on three principal questions: how did the agreement seek to advance US national security interests?; what were the essential elements of the prolonged state-of-the-art lobbying campaign to win approval from skeptics in Congress?; and what are the agreement's actual benefits—and costs—to future US nonproliferation efforts?  相似文献   
800.
Governments are increasingly recognizing the problem posed by internally weak nuclear-capable states. The problem, however, is under-theorized. This article brings together literature on sovereignty and international order, the nonproliferation regime, and weak states, and introduces new concepts to provide a more structured understanding of this problem. Insight comes from focusing attention on the function and governance of two nuclear estates (termed the production and operational estates), and on their resilience to decay and disorder occurring within the state and society. Drawing on empirical observation, the authors suggest a typology of weakness in nuclear states, involving state fragmentation typified by the former Soviet Union, the “hard weak state” typified by North Korea, and the internally conflicted state typified by Pakistan. Although these types give rise to distinctive difficulties, their alleviation depends heavily on the maintenance of internal authority within the state and estates, the presence or absence of cooperative relations, and the international regulatory framework's vitality.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号