首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   1篇
  134篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   4篇
  2015年   1篇
  2014年   17篇
  2013年   62篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2009年   6篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
61.
Despite a generally valiant effort on the part of the United Nations (UN) since 1999 to bring peace and stability to the Democratic Republic of the Congo (DRC), the country continues to be destabilised by rebel forces. These armed movements pose a constant threat to the fragile transition in the DRC, and security in the country is continuously undermined. This article examines rebel forces in the DRC from two perspectives. Firstly, it examines such movements as a manifestation of sub-national terrorism. Secondly, it examines armed movements from the perspective of so-called ‘ungoverned spaces’. The view taken in this article supports the scholarly insight and argument that in countries such as the DRC, armed movements and militias are filling power vacuums that are the result of the inability and lack of military capacity of weak states to fight these movements effectively. Specifically, the eastern and north-eastern parts of the DRC have been major conflict zones where sub-national terrorists employ terror as a strategy. In this context, the DRC is severely affected by terrorism – a phenomenon in the DRC that is intimately linked to the failure to effect sustained development and to consolidate accountable and effective governance.  相似文献   
62.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   
63.
64.
The United States has multiple nuclear detection initiatives to secure against a terrorist nuclear attack, including the Container Security Initiative, installation of radiation detectors at U.S. border points of entry, and establishment of the Domestic Nuclear Detection Office (DNDO). The current nuclear detection system architecture falls short of being able to reliably catch fissile nuclear material in transit, specifically shielded Highly Enriched Uranium (HEU) and Plutonium (Pu), both within the US and abroad. Checkpoints at border crossings can be circumvented, and no adequate system is under development to deter the transport of fissile materials. Using nuclear link-budget calculations, we show why a network relying primarily on handhelds, fixed detectors, and portals is not sufficient. We examine the technical, economic, and operational feasibility of a comprehensive national network incorporating in-vehicle detectors to reliably detect and deter the transport of fissile material inside the vehicle itself.  相似文献   
65.
Defusing Armageddon: Inside NEST, America's Secret Nuclear Bomb Squad, by Jeffrey T. Richelson. W.W. Norton & Company, 2009. 318 pages, $27.95.  相似文献   
66.
67.
This article will seek to provide a detailed examination of the IRA's operational intelligence methodologies. Providing not only a lengthy discussion on the organization's intelligence collection protocols, it will also examine the interplay between intelligence and IRA decision-making. It will be contended that intelligence's influence resided in its ability to introduce a strong element of predictability into the IRA's decision-making process. This depended on an ability to construct a detailed intelligence picture of the target and its geographical milieu so as to minimize the likelihood of volunteers encountering unforeseen circumstances that could adversely affect planned or anticipated outcomes.  相似文献   
68.
ABSTRACT

Al Qaeda following 9-11 experienced a period of stagnation which it sought to remedy through a project of re-branding. Critical of this approach, Islamic State claimed that al Qaeda was an elitist organization that had facilitated the stagnation of the Salafi Jihadist project. In an attempted to claim dominance over the jihad, Islamic State’s endeavored to discredit al Qaeda through a process it presented as ideological correction, linked to Islamic eschatology, sectarian agitation, permissive violence, and the caliphate. Following Islamic State’s acquisition of vast territory in Iraq and Syria, arguments proliferated that Islamic State had surpassed al Qaeda. As the caliphate has collapsed what effects will this have on al Qaeda’s fortunes and strategy? It is argued that Islamic State has provided al Qaeda’s strategic approach with renewed vigour to help ensure its survival and pursue resurgence. Al Qaeda acting in concert with the meta-strategy for survival concept, has altered an existential threat into an advantage through disavowing Islamic State’s methods, continuing to engage with localism, and pursuing rebranding by positioning itself as a moderate alternative. The cases of al Qaeda affiliates in Yemen, Syria, West Africa, and South Asia are instructive in assessing the effectiveness of al Qaeda’s resurgence.  相似文献   
69.
Book review     
This paper investigates the economic roots of separatist terrorism in Turkey. The political conventional wisdom is that poverty in highly Kurdish‐populated, south‐eastern Turkey is one of the most important causes of separatist terrorism and Turkish–Kurdish conflict in Turkey. Therefore, many economic policies have been implemented to improve the economic conditions in the south‐eastern part of the country. Using the Global Terrorism Database and Vector Autoregression (VAR) methodology, I find that there is no causal relationship between economic conditions in south‐eastern Turkey and separatist terrorism. Therefore policy‐makers should be cautious in using economic measures to prevent separatist terrorism in Turkey.  相似文献   
70.
Using the ITERATE dataset, we explore the origins of transnational terrorist activity, from 1982 through 1997, in 118 countries. We model terrorism, not as a function of a nation’s ethnic, religious or linguistic fractionalization, but as an independent measure of perceived ethnic tensions. When we control for institutional quality, evidence that political rights and civil liberties mitigate the terrorism‐producing effects of ethnic tensions exists only since 1990. Economic freedoms, on the other hand, robustly reduce the number of terrorist attacks originating in ethnically tense societies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号