首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29篇
  完全免费   52篇
  外交国际关系   81篇
  2022年   13篇
  2021年   9篇
  2020年   8篇
  2019年   9篇
  2018年   7篇
  2017年   3篇
  2016年   6篇
  2015年   5篇
  2014年   10篇
  2013年   5篇
  2012年   2篇
  2010年   1篇
  2009年   1篇
  2003年   2篇
排序方式: 共有81条查询结果,搜索用时 109 毫秒
1.
作为经典国际安全理论的安全困境理论无法充分说明后冷战时代东北亚区域国家安全状态。无论从体系引导型安全困境亦或国家引导型安全困境,都难以找到东北亚各国安全战略差异产生的根本原因。东北亚各国间的安全互动已经形成了一个超越安全困境并以美国为核心的地区国家安全体系。通过对东北亚国家安全体系结构和流动性安全要素的考察可以发现,各国安全战略的不同与其在国家安全体系结构中的位置和对流动性安全要素的控制能力密切相关。这有助于进一步探寻东北亚国家间安全关系从双边困境到多边合作的路径。  相似文献
2.
创新与超越:新地缘政治与国家安全   总被引:1,自引:0,他引:1  
运用地理关系谋划国家安全是地缘政治的本来使命.以扩张、对抗和谋霸为核心的传统地缘政治存在逻辑缺陷,不能合理解释当代国际政治现实,也无法有效应对国家安全面临的新挑战.为此,需要创新并超越传统地缘政治思维,以新地缘政治观来重新审视和谋划国家安全.中国在此方面进行了有益的探索和尝试,新安全观与和谐世界理论的提出与实践,表明新地缘政治具有相当的发展空间和现实应用价值.  相似文献
3.
非传统的总体国家安全观   总被引:1,自引:0,他引:1  
中国官方虽然在世纪之交就已提出了以“互信、互利、平等、协作为核心”的“新安全观”,但这一“新安全观”阐述的是对外方安全方面的非传统安全保障途径与措施,而没有涉及内部安全及更广泛的其他传统的和非传统的安全问题,因而是低级形态的非传统安全观,也是低级形态的非传统国家安全观。当超越对外安全和国际安全,综观内外及其他各方面的总体国家安全问题时,中国官方当时及此后一段时间内秉持的依然是传统的国家安全观。与此不同,“以人民安全为宗旨”的“总体国家安全观”,不仅在强调国家安全民本性上体现了非传统思维,而且更通过强调“既重视传统安全又重视非传统安全”等多方面的论述,统一了传统安全问题与非传统安全问题两方面的丰富内容,因而是一种高级形态的非传统国家安全观。总体国家安全观既与传统国家安全观相对,又与低级形态的非传统安全观及低级形态的非传统国家安全观不同,体现出对国家安全领域传统与非传统两方面众多问题的全面性、综合性、系统性、辩证性观察、认识和处理,具有系统的非传统思维和丰富的非传统内容。但是,总体国家安全观在论及丰富的非传统国家安全问题时,也论及各种传统国家安全问题。总体国家安全观之所以“非传统”,是因为它关注和强调了各种非传统的国家安全问题;总体国家安全观之所以“总体”,是因为它兼顾了传统与非传统两方面国家安全问题;总体国家安全观之所以“高级”,是因为它用非传统思维统合了传统与非传统两方面的国家安全问题。因此,我们要重视总体国家安全观阐述的各种传统国家安全问题,更要重视总体国家安全观阐述的各种非传统国家安全问题;要全面兼顾总体国家安全观对传统与非传统两个方面国家安全问题的论述,更要重点研究总体国家安全观中涉及的各种过去长期没有受到足够重视的非传统内容;要重视总体国家安全观包括的各种非传统国家安全内容,更要重视总体国家安全观内含的非传统安全思维。  相似文献
4.
国家安全领导体制的变革与东北亚地区安全   总被引:1,自引:0,他引:1       下载免费PDF全文
以国家安全委员会为代表的国家安全领导体制是现代国家安全决策、协调和咨询的最核心机构。从理论上讲,国家安全领导体制关系到国家安全战略的每个环节,可以结合外交政策分析的不同视角,同时又具有比较政治研究的重大意义。从实践上来看,美国、英国、法国等世界上主要大国都已建立起较为完善的国家安全领导体系,而东北亚中、日、韩三国从2013年开始也相继进行了国家安全领导体制的变革,建立了国家安全委员会及其常设机构。尽管从人员构成、战略目标、运行模式等方面来看,三国变革后的国家安全领导体制还有差异,但是国家安全领导体制的变化对东北亚局势还是造成了深远影响。中日关系、朝鲜半岛问题、东北亚地区的安全架构都出现了新的变化;同时,各国国内安全问题,特别是非传统安全问题已成为新的国家安全领导体制的主要涉及领域。东北亚地区国家安全领导体制改革是全球范围内国家安全转化和重构的一部分,未来的国家安全领导体制建设要从理论上探讨如何规避其中的官僚政治特别是小集团思维因素,在理念上要与国家安全观紧密结合起来,在实践上要充分考虑其长期性、复杂性,并为体制变革提供强有力的法律保障。  相似文献
5.
在信息化时代,网络空间承载着国家政治、经济、文化和军事发展与安全的重荷。网络空间存在的黑客攻击、网络犯罪和网络恐怖主义事件层出不穷,因此网络空间安全已上升到国家安全战略的层面,美国政府于2011年5月16日发布的《网络空间国际战略》引起世界各国瞩目。美国《网络空间国际战略》以"共同创造繁荣、安全、开放的网络世界"为基本宗旨,以"基本自由、隐私和信息流动自由"为核心原则,从经济、网络安全、司法、军事、网络管理、国际发展、网络自由等诸方面为美国未来网络安全战略的发展指明了方向。《网络空间国际战略》的出台表明美国政府已将网络安全提升到国际战略的新高度,它隐含着美国谋求网络空间霸权的战略目标,具有引领国际战略新变革和引发网络空间价值观冲突的现实战略效能,它对中美关系的影响和中国的应对之策也是值得认真分析和思考的。  相似文献
6.
The percentage of Israelis killed by terrorism is higher than in any other democracy. The article analyzes the threats Israel has faced, the impact terrorism has had on Israel, and the counter-terrorism policies Israel has adopted. Terrorism has had a decisive effect on Israeli elections and national security decisions, but not the economy. Israeli counter-terrorism has often been conducted without a coherent overall policy, has failed to reflect and conflicted with broader objectives, and has greatly undermined Israel's international standing. Conversely, it has enabled Israel to live in relative security and thrive, and provided its leaders with the latitude to pursue various policies, including peace, should they wish to do so.  相似文献
7.
Jane Duncan 《Communicatio》2018,44(1):107-129
This article assesses the implications of the controversial Protection of State Information Bill for academic freedom in South Africa, specifically for communications, media and journalism studies. The Bill requires the security cluster to classify sensitive documents on national security grounds. Academic teaching and research can help citizens to understand whether the security cluster is acting in the universal interest, rather than the interest of a political elite; it can also be used to assess media performance in reporting on national security matters. Using a critical approach to the concept of national security, I argue that the Bill favours secrecy over openness, and South Africa’s embrace of the human security definition of national security has contributed to the problem. This overemphasis on secrecy is likely to reduce the few spaces that exist in academia for critical, emancipatory work on security issues, which could hobble the sector’s attempts to understand the deeper processes at work in the security cluster. If such enquiry is marginalised, then the higher education system risks becoming an instrument for continuity rather than change in South Africa’s existing, highly unequal power relations: relations that are being maintained increasingly by force.  相似文献
8.
This article studies whether the action-reaction model holds on an “embryonic” terrorist group like Galician Resistance (REGA). After presenting an overview of REGA’s history, structure, financing, terrorist campaigns, and the police measures adopted against them, the text empirically contrasts whether deterrence is an efficient measure in reducing an incipient terrorist group’s actions. Our results show that deterrence does in fact reduce the number of attacks when aimed at the group’s periphery. However, it causes a backlash of new attacks when aimed at the group’s core. In addition, we prove that an increase in the number of attacks also causes a reaction by police forces and a higher number of detentions of core members. Our results give some meaningful insights into the design of counter-terrorism strategies aimed against “embryonic” groups.  相似文献
9.
A critical question in counterterrorism studies concerns the extent to which governments adequately balance the continual provision of individual rights and freedoms with the appropriate level of national security when faced with a terrorist attack. We experimentally assess this tradeoff utilizing a 2 × 2 × 2 between-groups factorial design, manipulating (a) the extent of terror-related threats, (b) the level of invasiveness of subsequent counterterrorism policies, as well as (c) the terror context: transnational and domestic. The results provide evidence that the public is more willing to accept greater reductions in civil liberties under a greater threat of terrorism only when the perceived effectiveness of those policies to prevent future acts of terrorism is high. Furthermore, we find these results to be specific to the context of a transnational terror threat. This suggests that the public will be unwilling to accept reductions in civil liberties when the source of the attack is domestic, regardless of the level of threat or how effective subsequent policies may be in preventing future attacks.  相似文献
10.
Using the revelations Edward Snowden passed over to the press regarding the actions of the U.S.’s National Security Agency and the UK’s Government Communications Headquarters and their use of the Prism project, this article examines the law surrounding intelligence gathering in the U.S. and UK. Underpinning the analysis is the legal principle of proportionality as applied to balancing the interests of national security and individual liberties. After examining intelligence exchange procedures, which for the UK is through negotiated agreements between national security agencies and through the European Union’s policing agency, Europol, the main part of the article discusses legal challenges that have been made regarding surveillance and the use of anti-terror laws on citizens and the rationale behind the judicial decisions made in both the U.S. and UK jurisdictions. The argument forwarded is that there is a requirement for wide preventative powers being granted to counter-terrorism agencies and that the interests of national security and individual liberty are inclusive and, as shown by the cases covered in this article, we should rely on the judiciary to perform their function in applying proportionality to each case on its own merits.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号