首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   148篇
  免费   3篇
  国内免费   1篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   5篇
  2015年   4篇
  2014年   18篇
  2013年   62篇
  2012年   3篇
  2011年   4篇
  2010年   3篇
  2009年   7篇
  2008年   3篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2000年   1篇
  1999年   1篇
排序方式: 共有152条查询结果,搜索用时 312 毫秒
1.
现代恐怖活动的形式特点及对策   总被引:2,自引:0,他引:2  
警卫工作如何加强防范措施 ,以应对当前恐怖破坏活动不断发展变化的新形势 ,确保各项警卫任务的圆满完成 ,是警卫部队需要解决的重要课题。本文阐述了现代条件下恐怖活动的表现形式和特点 ,提出了警卫工作中反恐怖的对策。  相似文献   
2.
恐怖主义犯罪作为由某些组织在恐怖主义理念支配下 ,通过暴力或其他危险方法造成社会恐怖 ,以实现其政治、宗教或其他意识形态目的的犯罪行为 ,是一种新的犯罪样态。这种犯罪往往具有较为独特的认知、情感特点和意志品质 ,也具有较为独特的行为特点。为更好地打击、预防这种犯罪 ,应加强其心理和行为特点的研究。  相似文献   
3.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   
4.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of states and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   
5.
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare.  相似文献   
6.
恐怖活动已成为世界一大公害,给一些国家和人民带来巨大的精神压力和心理恐惧,给国家政局稳定和经济发展造成巨大的负面影响。探索警卫工作中反恐怖斗争的方法、对策,对于防范和打击恐怖活动,确保各项警卫任务的圆满完成具有重要意义。  相似文献   
7.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   
8.
Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy’s three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy’s choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g. Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each’s own domain (Interpol, Budapest Convention).  相似文献   
9.
恐怖主义是威胁当今世界和平与稳定的主要因素。“藏独”和“疆独”是我国当前面临的主要恐怖势力。传统单一性的反恐处置模式在打击恐怖主义时很容易陷入顾此失彼的困难境地。坚持立足全局和放宽视野,从系统化的角度提出一套反恐处置战略具有十分重要的理论价值和实践意义。在反恐处置机制中,要充分发挥法律战的基础性作用、情报战的先导性作用、经济战的根源性作用、心理战的瓦解性作用、舆论战的宣传性作用以及协作战的堵截性作用。  相似文献   
10.
为了给在核化生事件中遂行任务的应急处置人员提供符合要求的个人防护装备,美国于2001年实施了NFPA1994《化学、生物恐怖事件用防护装具标准》.介绍了该标准中提出的化学、生物恐怖事件防护装备的技术要求,包括设计要求和技术性能要求,并讨论了各级防护装具的使用场合和时机、防护服的型式结构和对防护材料的要求.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号