全文获取类型
收费全文 | 6544篇 |
免费 | 1207篇 |
国内免费 | 612篇 |
出版年
2024年 | 14篇 |
2023年 | 25篇 |
2022年 | 65篇 |
2021年 | 99篇 |
2020年 | 97篇 |
2019年 | 128篇 |
2018年 | 133篇 |
2017年 | 289篇 |
2016年 | 316篇 |
2015年 | 196篇 |
2014年 | 523篇 |
2013年 | 506篇 |
2012年 | 451篇 |
2011年 | 542篇 |
2010年 | 394篇 |
2009年 | 534篇 |
2008年 | 426篇 |
2007年 | 437篇 |
2006年 | 465篇 |
2005年 | 435篇 |
2004年 | 393篇 |
2003年 | 294篇 |
2002年 | 237篇 |
2001年 | 224篇 |
2000年 | 151篇 |
1999年 | 157篇 |
1998年 | 134篇 |
1997年 | 110篇 |
1996年 | 103篇 |
1995年 | 87篇 |
1994年 | 90篇 |
1993年 | 70篇 |
1992年 | 71篇 |
1991年 | 64篇 |
1990年 | 52篇 |
1989年 | 28篇 |
1988年 | 16篇 |
1987年 | 6篇 |
1975年 | 1篇 |
排序方式: 共有8363条查询结果,搜索用时 187 毫秒
991.
Chris M.A. Kwaja 《African Security Review》2013,22(2):153-161
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors. 相似文献
992.
Notwithstanding the embrace of modern institutions of social control, traditional social control mechanisms still enjoy patronage in Nigeria. This paper examines the traditional structures of social control in Iraye-Oke, Lagos. In-depth interviews, key informant interviews and case studies were used to obtain data from participants. Findings established the functionality of traditional structures in checking crime and its preference over the use of modern social control structures. Traditional structures used include: traditional spiritualists who provide measures to reduce victimisation; the family courts where adjudication takes place involving elders and family chiefs; and the apex traditional court, presided over by the king, where cases like murder, land disputes, adultery and fornication are decided. Traditional extrajudicial measures involve the invocation of ancestral spirits at shrines. 相似文献
993.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
994.
995.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献
996.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system. 相似文献
997.
ABSTRACTNuclear disarmament is often seen as eventually requiring access to nuclear warheads or to the warhead-dismantlement process to verify that a state has not hidden weapons or weapon-materials despite promising to disarm. This article suggests this view is misplaced, and that what is needed is a verification mechanism able to provide reliable assurances of the absence of fissile materials available for use in weapons after a state has disarmed. Such a mechanism will need an initial declaration of the amount of fissile materials held by a state for all purposes, military and civilian. In a state with a nuclear arsenal awaiting elimination, this declaration would have to include materials that may not be available for verification because they are in nuclear weapons or are in other classified or proliferation-sensitive forms. This article describes a verification arrangement that does not require access to materials in weapons and in sensitive forms while still allowing checks on the overall accuracy of the declaration. Verification of the completeness and correctness of the declaration is deferred to the time when the weapons-relevant material enters the disposition process, at which point it no longer has any sensitive attributes. By removing the focus on monitoring warheads and dismantlement, this new approach could provide a more manageable path to nuclear disarmament. 相似文献
998.
Nicholas G. Evans 《The Nonproliferation Review》2013,20(3-4):351-366
ABSTRACTScience and technology (S&T) review is key to anticipating developments in the life sciences that may benefit or run contrary to the aims of the 1972 Biological and Toxin Weapons Convention. It serves as a mechanism for both preparing against novel biological threats and identifying the best opportunities for developing and sharing the life sciences to the fullest extent. In the age of rapidly advancing biotechnology, S&T review needs to be wide ranging, involve a diverse set of inputs, and be transparent about its methods and data. This viewpoint considers four models of S&T review and their capacity to respond to the challenge of the life sciences: standing advisory boards; ad hoc working groups; peer review; and wikis. It then identifies a hybrid model that is suitably broad, diverse, and transparent. 相似文献
999.
Mariana Budjeryn 《The Nonproliferation Review》2013,20(2):203-237
ABSTRACTThere is a lingering disagreement among scholars on how the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) affects nonproliferation and disarmament outcomes. Drawing on constructivist scholarship on international norms, this article examines the extent of the NPT's effect in the case of Ukraine's nuclear disarmament. In the wake of the Soviet Union's collapse, Ukraine found itself host to the world's third largest nuclear arsenal. Despite Ukraine's initial commitment to become a non-nuclear state, it proceeded along a difficult path toward NPT accession. Most controversial and directly at odds with the NPT was Ukraine's claim to ownership of its nuclear inheritance as a successor state of the Soviet Union. This article argues that, while much domestic discourse about the fate of these nuclear weapons was embedded in the negotiation of Ukraine's new identity as a sovereign state vis-à-vis Russia and the West, the NPT played an important, structural role by outlining a separate normative space for nuclear weapons and providing the grammar of denuclearization with which Ukraine's decision makers had to grapple. 相似文献
1000.
Douglas B. Shaw 《The Nonproliferation Review》2013,20(3):357-363
The Middle East is a crucial region for the global nonproliferation regime. In 2010, the state parties to the Treaty on the Non-Proliferation of Nuclear Weapons proposed a conference on a Middle East Weapons of Mass Destruction-Free Zone. The nuclear weapon-free zone model, on which this idea builds, has achieved important results in other regions, but faces especially stark challenges in the Middle East. However, the attempt to apply the boldly imaginative zone approach to the Middle East holds promise for building a more inclusive dialogue on nonproliferation and regional security. 相似文献