首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   145篇
  免费   2篇
  国内免费   1篇
  2022年   1篇
  2020年   2篇
  2019年   5篇
  2018年   10篇
  2017年   9篇
  2016年   9篇
  2015年   5篇
  2014年   16篇
  2013年   74篇
  2012年   3篇
  2011年   3篇
  2010年   5篇
  2009年   2篇
  2008年   1篇
  2005年   1篇
  2003年   1篇
  1991年   1篇
排序方式: 共有148条查询结果,搜索用时 281 毫秒
1.
安理会决议表达联合国的意见或意志,具有强制性和法律效力。以安理会第1509号决议为基础,对联合国利比里亚特派团的授权任务进行解析,并论述利政府和联合国利比里亚特派团面临的挑战和相应办法,利于我维和人员了解特派团任务进展情况,有利于更好地执行使命。  相似文献   
2.
ABSTRACT

Recent nuclear-weapons-related consultation in NATO within the framework of the Defence and Deterrence Posture Review sheds light on historical experiences with nuclear consultation in NATO. In the early years of the Nuclear Planning Group (NPG), which became the main forum for multilateral nuclear consultation in the alliance, developing a nuclear weapons first use doctrine was of particular importance. This process led to the adoption of the Provisional Political Guidelines (PPGs) on the threat to initiate the use of nuclear weapons. With a focus on West Germany as the primary addressee of the NPG, it will be postulated that nuclear consultation functioned and may still be seen as an essential tool to manage the credibility of US extended nuclear deterrence in the framework of NATO.  相似文献   
3.
Abstract

Post-uprisings Middle East politics is frequently described as a ‘regional cold war’ involving proxy warfare that emphasises the role of shared identities linking external and local actors. But does the ‘content’ of identities impact proxy war dynamics? This article considers the present ‘battle for Syria’, a local conflict that became a theatre for multiple proxy wars involving actors emphasising identities on various levels, most notably national, religious/ sect and ethnic. It suggests that identity content does matter, with global powers more reluctant than regional players to back groups identifying at sub-national level, while foreign non-state actors are enthusiastic backers of sub-national identity.  相似文献   
4.
本文运用SWOT分析方法对新疆高校开发中亚教育市场中面临的优势、劣势、机遇、威胁四个方面进行了全面分析。新疆留学生教育的发展,优势与劣势并存、机会与威胁同在,关键是如何充分利用优势、消除劣势。并借助SWOT模型中的不同战略组合提出了新疆开发中亚留学市场的的LCVP战略选择方式,为发展新疆留学生教育提供了依据。  相似文献   
5.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   
6.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
7.
汪丰麟 《国防科技》2017,38(4):018-022
美国长期以来大量对外国进行武器出口,一方面获取巨额利润,另一方面借此影响相关地区的形势.2017年上半年,伴随着美国政府对外政策的调整,美国对外军事贸易也出现了一些变化,在对亚太地区、中东地区、欧洲地区和其他潜在热点地区的武器出口方面有着不同的表现.  相似文献   
8.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
9.
Abstract

China has a strong interest in pursuing a smart power strategy towards Southeast Asia and has worked laboriously to engage with regional countries economically, socially, and politically. But China has been only partially successful in achieving its goals in the region. This paper argues that China’s security policy towards Southeast Asia significantly contradicts many other objectives that Beijing wishes to accomplish. Given the deep-seated, narrowly-defined national interests of the Chinese military in the South China Sea disputes, it is likely that the People’s Liberation Army (PLA) will continue to pose the main obstacle to the effective implementation of a Chinese smart strategy in Southeast Asia.  相似文献   
10.
新疆维稳形势严峻,预警是维护社会稳定的重要途径。情报收集是成功预警的前提和基础。当前的新疆维稳预警情报收集工作还存在收集主体素质不高,群众优势未能充分发挥,缺乏有效交流与合作等问题。为此。必须加强情报队伍建设,构筑人民防线,完善协作机制,加强情报交流,以改进情报收集工作。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号