首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   4篇
  2015年   1篇
  2014年   17篇
  2013年   62篇
  2012年   3篇
  2011年   2篇
  2010年   3篇
  2009年   6篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
71.
奥运会是世界上规模和影响力最大的体育赛事,因其具有参与人员多、受关注程度高等特点,极易成为恐怖袭击的目标.分析索契冬奥会面临的主要安全威胁和成功举办的安保经验,探讨我国举办冬奥会等大型活动的安保措施。  相似文献   
72.
Using the Boko Haram terrorist group in Nigeria as a point of departure, this paper examines the implications of the operations of terrorist groups on the security and stability of states in West Africa. It predominantly utilises secondary sources of data. Findings indicate that the membership and operations of this terrorist group are spreading across the sub-region. This spread is consequent upon Boko Haram's collaboration with other terrorist groups within West Africa and beyond. This constitutes threats to the security and stability of states in the sub-region. Thus, the paper recommends, among other things: a thorough understanding of the operational strategies of terrorist groups by states and those involved in security policymaking in the sub-region; and for agreements to be reached among Economic Community of West African States (ECOWAS) member states and their governments for collaboration in various areas in order to curtail transnational crime and terrorism, and reduce socio-economic inequality that generates aggressive behaviours among the less privileged.  相似文献   
73.
Despite a generally valiant effort on the part of the United Nations (UN) since 1999 to bring peace and stability to the Democratic Republic of the Congo (DRC), the country continues to be destabilised by rebel forces. These armed movements pose a constant threat to the fragile transition in the DRC, and security in the country is continuously undermined. This article examines rebel forces in the DRC from two perspectives. Firstly, it examines such movements as a manifestation of sub-national terrorism. Secondly, it examines armed movements from the perspective of so-called ‘ungoverned spaces’. The view taken in this article supports the scholarly insight and argument that in countries such as the DRC, armed movements and militias are filling power vacuums that are the result of the inability and lack of military capacity of weak states to fight these movements effectively. Specifically, the eastern and north-eastern parts of the DRC have been major conflict zones where sub-national terrorists employ terror as a strategy. In this context, the DRC is severely affected by terrorism – a phenomenon in the DRC that is intimately linked to the failure to effect sustained development and to consolidate accountable and effective governance.  相似文献   
74.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   
75.
76.
77.
生化恐怖袭击及其应对策略   总被引:1,自引:0,他引:1  
本文指出了生化恐怖活动发展的历史趋势、分析了大规模生化恐怖活动兴起的原因 ,并分析了恐怖分子获得生化武器的可能性 ,对于可能发生的大规模生化恐怖活动提出了的应对策略  相似文献   
78.
In this article, we examine a model of terrorism that focuses on the tradeoffs facing a terrorist organization that has two qualitatively different attack modes at its disposal. The terrorist organization's objective is to successfully attack at least one target. Success for the target government is defined as defending all targets from any and all attacks. In this context, we examine how terrorist entities strategically utilize an efficient but discrete attack technology — e.g., suicide attacks — when a more conventional mode of attack is available, and the optimal anti‐terrorism measures.© 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
79.
随着恐怖主义愈演愈烈,"反恐"成为当今世界各国军事安全部门的中心任务.使用分类型可视化工具Parallel Sets分析国际恐怖主义数据库中多属性分类值间的关系,揭示数据库中的隐性信息,并针对Parallel Sets任意排列分类值产生较多交叉的不足,提出带降势的启发式分类值布局算法,自动优化分类值布局顺序,减轻视图中...  相似文献   
80.
The military effectiveness literature has largely dismissed the role of material preponderance in favor of strategic interaction theories. The study of counterinsurgency, in which incumbent victory is increasingly rare despite material superiority, has also turned to other strategic dynamics explanations like force employment, leadership, and insurgent/adversary attributes. Challenging these two trends, this paper contends that even in cases of counterinsurgency, material preponderance remains an essential—and at times the most important—factor in explaining battlefield outcomes and effectiveness. To test this, the paper turns to the case of the Sri Lankan state’s fight against the Tamil Tiger insurgency, a conflict which offers rich variation over time across six periods and over 25 years. Drawing on evidence from historical and journalistic accounts, interviews, memoirs, and field research, the paper demonstrates that material preponderance accounts for variation in military effectiveness and campaign outcomes (including military victory in the final campaign) better than strategic explanations. Additionally, a new quantitative data-set assembled on annual loss-exchange ratios demonstrates the superiority of materialist explanations above those of skill, human capital, and regime type.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号