首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   106篇
  免费   1篇
  国内免费   1篇
  2022年   1篇
  2020年   1篇
  2019年   1篇
  2018年   7篇
  2017年   7篇
  2016年   7篇
  2015年   4篇
  2014年   17篇
  2013年   48篇
  2012年   1篇
  2011年   4篇
  2010年   4篇
  2009年   2篇
  2008年   1篇
  2006年   1篇
  2005年   1篇
  1991年   1篇
排序方式: 共有108条查询结果,搜索用时 328 毫秒
1.
安理会决议表达联合国的意见或意志,具有强制性和法律效力。以安理会第1509号决议为基础,对联合国利比里亚特派团的授权任务进行解析,并论述利政府和联合国利比里亚特派团面临的挑战和相应办法,利于我维和人员了解特派团任务进展情况,有利于更好地执行使命。  相似文献   
2.
ABSTRACT

Recent nuclear-weapons-related consultation in NATO within the framework of the Defence and Deterrence Posture Review sheds light on historical experiences with nuclear consultation in NATO. In the early years of the Nuclear Planning Group (NPG), which became the main forum for multilateral nuclear consultation in the alliance, developing a nuclear weapons first use doctrine was of particular importance. This process led to the adoption of the Provisional Political Guidelines (PPGs) on the threat to initiate the use of nuclear weapons. With a focus on West Germany as the primary addressee of the NPG, it will be postulated that nuclear consultation functioned and may still be seen as an essential tool to manage the credibility of US extended nuclear deterrence in the framework of NATO.  相似文献   
3.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   
4.
联合国维和行动目前面临着日益严峻的困难和挑战。其中的一个重要原因在于维和人员被赋予了过多的建设和平的职责,使得维和行动处于两难的境地。要缓解这一困境,国际社会需重新审视和定义维和行动的职责范围,大力加强和平委员会的能力建设,并给予更多的授权。在实现这些长期目标之前,维和特派团将继续代替建和委履行建设和平协调员的职责。  相似文献   
5.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
7.
Abstract

China has a strong interest in pursuing a smart power strategy towards Southeast Asia and has worked laboriously to engage with regional countries economically, socially, and politically. But China has been only partially successful in achieving its goals in the region. This paper argues that China’s security policy towards Southeast Asia significantly contradicts many other objectives that Beijing wishes to accomplish. Given the deep-seated, narrowly-defined national interests of the Chinese military in the South China Sea disputes, it is likely that the People’s Liberation Army (PLA) will continue to pose the main obstacle to the effective implementation of a Chinese smart strategy in Southeast Asia.  相似文献   
8.
新疆维稳形势严峻,预警是维护社会稳定的重要途径。情报收集是成功预警的前提和基础。当前的新疆维稳预警情报收集工作还存在收集主体素质不高,群众优势未能充分发挥,缺乏有效交流与合作等问题。为此。必须加强情报队伍建设,构筑人民防线,完善协作机制,加强情报交流,以改进情报收集工作。  相似文献   
9.
From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed.  相似文献   
10.
This paper models the interactions between the defense industry market structure and the defense needs of Israel, the USA and Western Europe, which produce several heterogeneous defense goods. The model specifies that the defense industries of the US and Europe are ‘large’ while that of Israel is ‘small’. The US military aid to Israel is also an integral part of the model. The results show that net defense costs of Israel are minimal when the number of its defense firms is one. The model predicts that an increase in US military aid reduces Israel’s government expenditure, its defense industry’s profits and its net defense costs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号