首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   695篇
  免费   8篇
  国内免费   6篇
  709篇
  2025年   1篇
  2024年   1篇
  2023年   5篇
  2022年   1篇
  2021年   17篇
  2020年   10篇
  2019年   29篇
  2018年   32篇
  2017年   36篇
  2016年   38篇
  2015年   23篇
  2014年   68篇
  2013年   105篇
  2012年   28篇
  2011年   40篇
  2010年   43篇
  2009年   37篇
  2008年   37篇
  2007年   27篇
  2006年   27篇
  2005年   28篇
  2004年   17篇
  2003年   20篇
  2002年   6篇
  2001年   6篇
  2000年   2篇
  1999年   5篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
排序方式: 共有709条查询结果,搜索用时 15 毫秒
11.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
12.
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors.  相似文献   
13.
Standard economic concepts of production and cost minimization subject to a production constraint are used to derive the conditions of optimal deployment of home and forward military forces for the production of home security. United States' participation in the NATO alliance is then analyzed in the context of a two‐ally (U.S. and Western Europe) optimal force deployment model of NATO. Next, U.S. force‐basing policy is adduced as an enforcement mechanism for the “transatlantic contract.” Lastly, statistical evidence on burden sharing within Western Europe, and the effectiveness of the U.S. contract enforcement policy, is presented.  相似文献   
14.
As worries have grown about global warming and the sustainability and price of fossil fuels, the demand for nuclear energy has increased, and nuclear power is increasingly viewed as a reliable and clean resource. However, the so-called nuclear renaissance coincides with an international security environment in which the norms of nuclear nonproliferation seem to be eroding. Turkey, a non-nuclear weapon state, plans to generate nuclear power to meet future energy demands, but it is aware of and concerned with regional proliferation trends. Questions have also been raised regarding Ankara's rationale for using nuclear energy, as well as its potential motivations and capabilities regarding future proliferation. This article will provide an overview of Turkey's nuclear energy history and plans, as well as the proliferation-related questions that could arise; it will also look at the domestic debate on nuclear energy and Turkey's status as a non-nuclear weapon state.  相似文献   
15.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
16.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。  相似文献   
17.
This paper develops a Dynamic Stochastic General Equilibrium model where national security is an argument in the agent’s utility function and the government chooses optimally the level of military spending to maximize social welfare. National defense depends on military expenditure and on the strategic environment reflecting a potential hostile external threat. We use aggregate data on consumption, investment, and military spending for the US economy to estimate the parameters of the model. Estimation results suggest that consumption and national defense are complements and that military spending variability is mainly explained by external threat shocks although it also depends on the macroeconomic conditions. We compute impulse response functions of the main macroeconomic variables to several shocks: a total factor productivity shock, a defense technology shock, and a strategic environment shock. Surprisingly, we find that the optimal response to an increase in the external threat (a worsening in the strategic environment) will rise output by reducing consumption and increasing investment.  相似文献   
18.
首先提出了改进信息熵的作战效能评估方法,将作战过程划分为若干作战节点,节点的效能发挥受若干因素影响,并用不确定性自信息量来描述影响的不确定程度。在影响因素选取上,引入了未知因素,有效解决了具体作战中难以全面考虑节点效能发挥的所有影响因素问题。其次基于综合反隐身作战中的信息流关系建立了信息流图,并构建了对应的作战效能评估指标体系,最后计算了不同传感器组合和不同作战方式组合下的作战效能,并得出了结论:反隐身作战中,越多样化的传感器组合和越综合化的作战方式,作战的不确定性自信息量越小,作战效能越大。  相似文献   
19.
公安边防部队的士官学历教育尚在起步阶段,任重而道远。各级领导应着眼部队长远建设,确立优先发展的战略地位;应立足部队现实需要,设置学科专业;应根据岗位任职需求,确定课程体系,突出实用性;应适应教学任务的要求,完善管理与保障体系。  相似文献   
20.
公安现役高校在公安教育体系中处于重要位置,承担着人才培养、科学研究和服务部队的重要任务,对构建和谐社会责无旁贷。准确定位公安现役高校在构建和谐社会中所扮演的角色,可以充分发挥职能作用,为构建和谐社会做出应有贡献。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号