首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
5.
6.
7.
8.
The process whereby queen Athaliah was deposed and replaced as monarch of Judah by the boy‐king Joash in the seventh century bce warrants analysis as a typical ‘coup d'etat’. The purpose of the present article is to interpret the relevant biblical narratives (II Kings II and 11 Chron. 23) in terms relevant to that political concept. Specifically, it posits that the organization and implementation of this highly successful coup can be illuminated by reference to modern political science literature on regime change. Thus read, the biblical records of the episode constitute a detailed ‘how to’ manual of political action.  相似文献   

9.
10.
11.
12.
13.
Despite the apparent virtues of UN sanctions in terms of legitimacy and universality, attention in recent years has focused on their questionable achievements and adverse consequences. In particular, the cost of imposing sanctions is unevenly spread, while comprehensive measures harm the civilian population in the target and spare those responsible for the offending policies. This article discusses the merits of UN sanctions in the context of the membership and practice of the Security Council and looks closely at flaws in sanctions programmes and in their administration. Experience suggests careful review of alternative means of pressure as well as reform of existing procedures.  相似文献   

14.
15.
There is a widely held perception that intelligence is the purloining of secret information from foreign countries, which is then used for advantage in wartime and as an aid to diplomacy and statecraft in peacetime, and the catching of foreign spies, or counterintelligence. In reality, intelligence serves a number of other purposes, such as technology development in support of other intelligence programmes, support to treaty negotiations and monitoring, arms control, and more. Several recently declassified Cold War intelligence activities are reviewed as examples of some of the other uses and benefits of intelligence gathering, and to show that leaders, policy makers and other consumers of intelligence may choose to use, abuse or ignore it, depending upon their own predilection, prejudices, biases, or political agendas, and sometimes altering the original intent of the intelligence.  相似文献   

16.
Internal security and judicial cooperation in the EC have developed outside the framework of the treaties in the past. The completion of the Single Market and the provisions of the Maastricht treaty make effective cooperation among the Twelve and EC and other bodies on these issues imperative. This article looks at the EC's security competence; the scope of internal security policy; asylum and immigration; operational issues and security cooperation within Schengen and with Central and Eastern Europe. It concludes that streamlining the multiplicity of bodies engaged in similar activities is imperative.  相似文献   

17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号