首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6544篇
  免费   1207篇
  国内免费   612篇
  2024年   14篇
  2023年   25篇
  2022年   65篇
  2021年   99篇
  2020年   97篇
  2019年   128篇
  2018年   133篇
  2017年   289篇
  2016年   316篇
  2015年   196篇
  2014年   523篇
  2013年   506篇
  2012年   451篇
  2011年   542篇
  2010年   394篇
  2009年   534篇
  2008年   426篇
  2007年   437篇
  2006年   465篇
  2005年   435篇
  2004年   393篇
  2003年   294篇
  2002年   237篇
  2001年   224篇
  2000年   151篇
  1999年   157篇
  1998年   134篇
  1997年   110篇
  1996年   103篇
  1995年   87篇
  1994年   90篇
  1993年   70篇
  1992年   71篇
  1991年   64篇
  1990年   52篇
  1989年   28篇
  1988年   16篇
  1987年   6篇
  1975年   1篇
排序方式: 共有8363条查询结果,搜索用时 187 毫秒
991.
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors.  相似文献   
992.
Notwithstanding the embrace of modern institutions of social control, traditional social control mechanisms still enjoy patronage in Nigeria. This paper examines the traditional structures of social control in Iraye-Oke, Lagos. In-depth interviews, key informant interviews and case studies were used to obtain data from participants. Findings established the functionality of traditional structures in checking crime and its preference over the use of modern social control structures. Traditional structures used include: traditional spiritualists who provide measures to reduce victimisation; the family courts where adjudication takes place involving elders and family chiefs; and the apex traditional court, presided over by the king, where cases like murder, land disputes, adultery and fornication are decided. Traditional extrajudicial measures involve the invocation of ancestral spirits at shrines.  相似文献   
993.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   
994.
995.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
996.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system.  相似文献   
997.
ABSTRACT

Nuclear disarmament is often seen as eventually requiring access to nuclear warheads or to the warhead-dismantlement process to verify that a state has not hidden weapons or weapon-materials despite promising to disarm. This article suggests this view is misplaced, and that what is needed is a verification mechanism able to provide reliable assurances of the absence of fissile materials available for use in weapons after a state has disarmed. Such a mechanism will need an initial declaration of the amount of fissile materials held by a state for all purposes, military and civilian. In a state with a nuclear arsenal awaiting elimination, this declaration would have to include materials that may not be available for verification because they are in nuclear weapons or are in other classified or proliferation-sensitive forms. This article describes a verification arrangement that does not require access to materials in weapons and in sensitive forms while still allowing checks on the overall accuracy of the declaration. Verification of the completeness and correctness of the declaration is deferred to the time when the weapons-relevant material enters the disposition process, at which point it no longer has any sensitive attributes. By removing the focus on monitoring warheads and dismantlement, this new approach could provide a more manageable path to nuclear disarmament.  相似文献   
998.
ABSTRACT

Science and technology (S&T) review is key to anticipating developments in the life sciences that may benefit or run contrary to the aims of the 1972 Biological and Toxin Weapons Convention. It serves as a mechanism for both preparing against novel biological threats and identifying the best opportunities for developing and sharing the life sciences to the fullest extent. In the age of rapidly advancing biotechnology, S&T review needs to be wide ranging, involve a diverse set of inputs, and be transparent about its methods and data. This viewpoint considers four models of S&T review and their capacity to respond to the challenge of the life sciences: standing advisory boards; ad hoc working groups; peer review; and wikis. It then identifies a hybrid model that is suitably broad, diverse, and transparent.  相似文献   
999.
ABSTRACT

There is a lingering disagreement among scholars on how the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) affects nonproliferation and disarmament outcomes. Drawing on constructivist scholarship on international norms, this article examines the extent of the NPT's effect in the case of Ukraine's nuclear disarmament. In the wake of the Soviet Union's collapse, Ukraine found itself host to the world's third largest nuclear arsenal. Despite Ukraine's initial commitment to become a non-nuclear state, it proceeded along a difficult path toward NPT accession. Most controversial and directly at odds with the NPT was Ukraine's claim to ownership of its nuclear inheritance as a successor state of the Soviet Union. This article argues that, while much domestic discourse about the fate of these nuclear weapons was embedded in the negotiation of Ukraine's new identity as a sovereign state vis-à-vis Russia and the West, the NPT played an important, structural role by outlining a separate normative space for nuclear weapons and providing the grammar of denuclearization with which Ukraine's decision makers had to grapple.  相似文献   
1000.
The Middle East is a crucial region for the global nonproliferation regime. In 2010, the state parties to the Treaty on the Non-Proliferation of Nuclear Weapons proposed a conference on a Middle East Weapons of Mass Destruction-Free Zone. The nuclear weapon-free zone model, on which this idea builds, has achieved important results in other regions, but faces especially stark challenges in the Middle East. However, the attempt to apply the boldly imaginative zone approach to the Middle East holds promise for building a more inclusive dialogue on nonproliferation and regional security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号