排序方式: 共有622条查询结果,搜索用时 0 毫秒
251.
Dale R. Herspring Author VitaeAuthor Vitae 《Orbis》2010,54(2):284-301
Despite the manifold problems in Russian Defense Minister Anatoliy Serdyukov's radical reform agenda, there is clear evidence that such a program is being implemented regardless of opposition from those in uniform, especially on the General Staff. It is no exaggeration to suggest that depending on how fully it is implemented, this reform could have an impact on the lives of all Russian officers no matter where they serve now. The mass mobilization principle has been abandoned and the transition from a division-based system to the new brigade structure is complete. Meanwhile, despite careful planning by the General Staff, we do not believe the Russian military will emerge as a modern fighting force until 2020, if then. Budget cuts, production inefficiencies, poor maintenance and sloppy work will all inhibit the construction of a modern Russian army.
This is essentially a totally different army, the foundation of which was laid this year. And this is the country's organizational victory.(Colonel (retired) Vitaliy Shlykov, Liliya Biryukova, Aleksandr Sargin, Denis Telmanov, Gazeta, November 20, 2009.)相似文献
252.
Walter A. McDougall Author Vitae 《Orbis》2010,54(2):165-184
Two big issues that scholars and strategists need to address are simply: does grand strategy have to be articulated for it to be said to exist at all; and if not, can grand strategy be said to move a nation even when that nation's fluctuating roster of (often competent) leaders are unsure as to why they do anything? My task here is that of a rapporteur and provocateur raising issues on which we may need to reach some consensus. 相似文献
253.
Robert S. Ross Author Vitae 《Orbis》2010,54(4):525-545
This article examines the reach of China's growing economic and military power in East Asia. It examines the economic and military sources of the rise of China and the implications of the development of Chinese strategic influence on the Korean Peninsula and across the Taiwan Strait. It also considers where in East Asia China has yet to develop greater coercive or deterrent military capabilities, so that the strategic status quo in this area persists, thus establishing the regional strategic boundaries of the rise of China and the emerging U.S.-China great power order in East Asia. 相似文献
254.
Thomas U. Berger Author Vitae 《Orbis》2010,54(4):565-582
255.
The control of northern Mali in 2012 by Tuareg rebels and Islamist fighters aligned with al Qaeda proved a serious challenge to Western counterterrorism policies. This article looks at several aspects often overlooked in discussions of the internal dynamics of al Qaeda-linked groups. Using defections related to the al Qaeda in the Islamic Maghreb (AQIM) offshoot group, the Movement for Unity and Jihad in West Africa (MUJAO), in Mali as a case study, this article considers the issues of race and legitimacy connected to the group and the threat and policy implications that flow from this analysis. 相似文献
256.
257.
Harvey Sicherman Author Vitae 《Orbis》2011,55(3):353-359
On the eve of Bill Clinton's second term, Harvey Sicherman wrote that the President must educate public opinion, cultivate congressional consensus, manage international coalitions, and use military power decisively when needed. 相似文献
258.
Jakub Grygiel Author Vitae 《Orbis》2011,55(4):663-684
What happens when states or empires face multiple and geographically dispersed assaults along their frontiers from non-state, tribal actors? It is plausible to argue that the result may be state decentralization, both military and administrative. In some cases, this may be a conscious strategy pursued by the central authorities, but in others, it may be the result of centrifugal tendencies pursued by disaffected local leaders. This article illustrates this argument by describing the end of the Roman empire, caused by multiple assaults of barbarian groups. The lesson is that in such an environment a centralized state that arrogates to itself all the functions of security provision may undermine its own safety. 相似文献
259.
Marcus TurleAuthor Vitae 《Computer Law & Security Report》2009,25(1):51-58
The loss by Her Majesty's Revenue and Customs (HMRC) of two CDs containing 25 million child benefit details has changed the data security landscape forever. No longer is data security the exclusive and rather arcane preserve of spotty technology professionals or data protection lawyers. HMRC has thrust data security onto the front pages of the mainstream media and brought it very suddenly to the top of the political and commercial agendas of senior politicians and boards of directors. In this article, the author will outline the reasons behind the rise of data security as a front line issue and examine the lessons to be learnt from HMRC. He will analyse the different facets of data security risk and explore ways in which organisations can go about managing it. He will outline the attitude of regulators to data security and where regulatory developments are likely to take us. The final part of the article looks into the future, with particular focus on the emergence of privacy enhancing technologies. 相似文献
260.
Open Source Software (OSS) has hit the mainstream in recent years and its scope is set to increase. Best seen as a range of associated licensing techniques, there are many different types of OSS licences. Coupled with a lack of settled case law and rapidly developing market practice, legal interpretation of the OSS world presents challenges to lawyers. Of the ‘top 20’ OSS licences, the GPL is the most commonly used and among the most radical in legal effect. The GPL's legal radicalism centres on its Article 2(b) concept of ‘copyleft’. Copyleft is an inheritance requirement to pass on the GPL's terms to other software that ‘contains’ or is ‘derived from’ the initially used GPL software. I illustrations of Article 2(b) issues from the Linux and Java worlds are provided. Current case law (such as it is) is then overviewed. Finally, contractual and policy implications of OSS governance are then reviewed as the increasing uptake of OSS in the organisation is mirrored in the growing importance of OSS governance. 相似文献