首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   758篇
  免费   1篇
各国政治   28篇
世界政治   39篇
外交国际关系   384篇
法律   139篇
中国政治   27篇
政治理论   48篇
综合类   94篇
  2024年   5篇
  2023年   1篇
  2021年   10篇
  2020年   23篇
  2019年   36篇
  2018年   42篇
  2017年   44篇
  2016年   31篇
  2015年   23篇
  2014年   44篇
  2013年   281篇
  2012年   24篇
  2011年   9篇
  2010年   15篇
  2009年   24篇
  2008年   20篇
  2007年   15篇
  2006年   19篇
  2005年   26篇
  2004年   27篇
  2003年   22篇
  2002年   16篇
  2001年   2篇
排序方式: 共有759条查询结果,搜索用时 15 毫秒
21.
Because of its dynamic nature, those confronting the al-Qaeda threat must follow its evolution very closely. As demonstrated here, this task is particularly challenging when counterterrorism is carried out under the aegis of international organizations. This article explores the threat identification function of the al-Qaeda Sanctions Committee (also known as the 1267 Committee) charged with supervising the UN sanctions regime against al-Qaeda and its associates. Examination of the role of threat identification in the committee's work, and of the content of the threat analysis presented in the periodic reports of its subsidiary monitoring team, suggests the marginality of strategic threat assessment and underscores the constraints created by bureaucratic and political factors. The article also demonstrates the failure of the Committee and the monitoring team to thoroughly engage in central questions regarding al-Qaeda's nature, objectives, and organizational strategy.  相似文献   
22.
    
This article seeks to turn the debate about the definition of terrorism on its head by arguing: (1) that the definitional debate has served to obscure the substantial scholarly consensus that actually exists on what terrorism is; (2) that this consensus is, however, largely unnecessary and irrelevant to the effective use of the term in the heterogeneous contexts within which it is employed; and (3) that by focusing on the quest for a definition of terrorism, terrorism scholars have largely missed the really interesting question about the word, namely, why it is that, given the heterogeneous purposes and contexts for which the word is used, we nonetheless continue to use a single word for all. In other words, how is it that we continue to know terrorism when we see it?  相似文献   
23.
    
This article advances an argument for a contrapuntal reading of terrorism using the case study of India. In recent years, the work of Edward Said has received some attention in the field of international relations. As yet, however, most readings of terrorism, either in its traditional form of terrorism studies or in the guise of critical terrorism studies, have not addressed the interface between terrorism and security, drawing on the work of Said. We take his work as a point of departure, enabling the analysis in this article to critique the ‘clash of civilisations’ thesis whilst also exploring the relationship between mass casualty terrorism and crowded places. In doing so, we draw attention to the instantiation of a series of attacks in India. The final section of this article pulls the analysis together so as to question the relationship between poverty and resilience.  相似文献   
24.
25.
    
The Arab “hegemonic debate” on the causes of Islamist terrorism nurtures (pan-) Arab, anti-Western sentiments and delegitimizes criticism of the political status quo. The European Union's emphasis on multilateral means of conflict resolution and trade promotion leads to official pronouncements that barely address the Arab world's domestic problems, instead referring to international tensions such as the Arab-Israeli conflict as a particular cause of Islamist terrorism and the need for cooperation with Arab governments. By failing to challenge the official narratives of authoritarian Arab regimes the EU obstructs interests in the democratization of the region and the delegitimization of Islamist violence.  相似文献   
26.
    
This article compares and contrasts the Provisional Irish Republican Army (PIRA) and D-Company, two seemingly dissimilar organisations that nonetheless share some striking commonalities, especially in regards to the use of tactics that contradict their declared ideology in pursuit of a larger goal. First, the growing relationship between organised criminal syndicates and terror groups is discussed and Makarenko's well-known “Crime-Terror Continuum” introduced. Following this, a historical overview and an analysis of the organisational structure of the PIRA is provided and organisational models proposed. Further, the founding and development of D-Company is addressed in addition to the syndicate's intricate involvement in the 1993 Bombay Blasts. Similarly, organisational models are offered and conclusions drawn. This work then moves to a comparative analysis of the organisational and operating structure of the PIRA and D-Company and finishes with a brief conclusion. This article argues that although criminal syndicates and militant groups may have different organisation structures, the line that distinguishes their activities has begun to blur and the space between Makarenko's graduated levels is becoming smaller and less discernible, thus rendering her model obsolete.  相似文献   
27.
Knowledge about the ways in which suicide attacks are recruited and prepared and on the motivation of suicide bombers and the factors that influence the decisions of organizers of suicide attacks has so far been sketchy and sporadic, derived mostly from media sources. In this study, 15 Palestinian would-be suicides and 14 organizers of suicide attacks participated in semi-structured interviews designed to fill this lacuna. The paper focuses on the self-reported feelings and behavior of the suicide bombers from recruitment to dispatching, as well as on the organizers' self-reported views and decisions concerning suicide attacks.  相似文献   
28.
    
This article will develop an explanatory theory on terrorist safe havens. Focusing on Islamist Terrorist networks, this article argues that four specific conditions are necessary for the establishment of a safe haven for Islamist terrorist networks: geographic features, weak governance, history of corruption and violence, and poverty. At the conclusion of the article, the developed theory is applied to the Tri-Border Area of South America (TBA), where the frontiers of Argentina, Brazil, and Paraguay meet, an area overlooked by the 9/11 National Commission Report's list of Islamist terrorists' safe havens.  相似文献   
29.
    
Great many violent events happened during 1991–2005 in the 12 states that emerged after the collapse of the USSR but only a few civil wars are registered in the major datasets. That brings up a number of questions about the operational definitions of civil war that generally point in the direction of shifting the research attention from refining the quantitative parameters to grasping the essense of the phenomena in question. It is proposed that civil war partially overlaps with several other type of violent crisis: inter-state wars, civil unrest and revolutions, internal repression, military coups and mutinies, banditry and organized crime, and terrorism. These overlaps create six ‘gray zones’ where only very nuanced examination rather than application of rigid criteria could help in distinguishing civil wars from other crises. Therefore, data collection based on a single “robust” definition, which incorporates several verifiable parameters, is not necessarily the only path to scientific knowledge about civil wars.  相似文献   
30.
This article presents results of a survey of 141 Pakistani families of slain militants. This survey collected data about the militants and their households. While derived from a convenience sample, these data are unprecedented and offer a glimpse into the backgrounds of militants and the families who (mostly) supported their decision to join the jihad. Most militants served and died in Kashmir and seem to be “high quality” militants in that they, like their heads of household, are well educated and not predominantly coming from seminaries, as is often claimed. This analysis suggests that while the militants merit attention, so do the families that produce militants.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号