首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   0篇
世界政治   3篇
外交国际关系   5篇
政治理论   5篇
  2014年   1篇
  2013年   5篇
  2011年   1篇
  2005年   1篇
  2004年   2篇
  1983年   2篇
  1981年   1篇
排序方式: 共有13条查询结果,搜索用时 15 毫秒
1.
This note focuses on the best means for achieving civilian control of border security in the Balkans. Civilian control may be achieved through societal control (as in civilian complaint reviews) but such procedures require an established political culture that does not yet exist in the region. Civilian control also requires a degree of technical expertise, which is not always available among international officials, let alone local communities.  相似文献   
2.
Abstract

Any account of European security that ignores border security is incomplete, and any account of border security that disregards functional issues is unfinished. Border security is an empirical manifestation of a state's adaptation to its political environment, so a comprehensive analysis of European security requires that both the empirical and conceptual parameters of border management should be identified. However, this is problematic. Not only is functional security benignly neglected by the academy, but also border management is based on competing political imperatives, operational necessities, and social realities, rather than a coherent theoretical framework. Although the rationalities of European border security have yet to be systematically analysed, the Schengen accord is unlikely to provide the foundations needed for a comprehensive paradigm of European (border) security. This article focuses on the empirical and practical—rather than theoretical—dimensions of border security in order to rebalance the debate.  相似文献   
3.
The purpose of US foreign assistance has shifted in the wake of 2001, and Washington has resurrected practices previously associated with police aid during the Cold War. In particular, the Bush administration has broadened the remit of the United States Agency for International Development (usaid) in such a way as to make it a quasi-security agency. The consequences of this could be significant for both usaid and democratic-style police assistance programmes more generally, for today's threat-driven policies are part of a trend which in the past has had worrying consequences. Using the critical variable of public policing (which is illustrated by reference to developments in Kenya), I argue that using usaid to improve the counter-terrorist capacity of Africa's police in the pursuit of US national security objectives is a seriously flawed strategy.  相似文献   
4.
Matt Hills 《社会征候学》2013,23(2):133-149
This paper uses the work of Michel de Certeau (1988 de Certeau M 1988 The practice of everyday life Berkeley: University of California Press  [Google Scholar]) to argue that it is possible to distinguish between “expert” or “authorised” approaches to media theory, construed as existing “strategically” within the “proper place” of the academy, and “tactical” appropriations of media theory operating in audience discourses. It takes media fan audiences as one case study in relation to this process, arguing that fans should be viewed as “poaching” from “official” media theory as well as from “official” media texts. It then goes on to suggest that we should not univocally celebrate or romanticise fans' uses of media theory, but should remain alert to the sociological and cultural reproductions that otherwise “tactical” media theory can participate in. This means rethinking fans' “tactics” not merely as the “arts of the weak” (de Certeau 1988 de Certeau M 1988 The practice of everyday life Berkeley: University of California Press  [Google Scholar], 37), but simultaneously as forms of appropriation that might enact forms of (sub)cultural power for fans.  相似文献   
5.
Prompted by Grindle's identification of a next-steps approach to governance, this article uses the experience of Mogadishu's police force to consider the minimal conditions of governance required to address development-related challenges. At one level, the introduction of development-oriented governance is obstructed by the inability of international actors to influence local power brokers or mitigate the distrust and insecurity affecting daily life in a city such as Mogadishu. More fundamentally, the capacity of an approach predicated on contextually-based analytics is limited by its advocates' understanding governance and development in technical terms aligned to liberal goals, rather than as entrepreneurial opportunities reliant on negotiation and trust-based relationships. In practice, minimal governance has more to do with the stability needed for people to go about their everyday business in relative safety than with democracy or poverty reduction. For such reasons, the new diagnostics is a refinement of existing approaches, rather than a significant analytical advance.  相似文献   
6.
This study reports the findings of a 3‐year investigation into dimensions of trust in governmental capacity to deal with environmental risks (air pollution, sustainable development, waste, and water). We explore if levels of trust in Hong Kong correspond with the two‐dimensional structure identified in the research of Poortinga and Pidgeon. Findings of this multi‐method study (survey and focus group) conducted between 2005 and 2008 point towards largely low but unchanging levels of trust in the Hong Kong government. By contrast, the number of dimensions of trust reduced over the study period, pointing towards growing levels of scepticism. This leads us to conclude that, in relation to environmental risks, Hong Kong is characterised by cynicism. These findings reflect a wider argument that there are two underlying dimensions of trust—reliance and scepticism. The implications of these findings are discussed, and strategies to address low levels of trust are outlined. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
7.
8.
U.S. welfare reforms, whether promoting work first or human capital development, have had in common an emphasis on employment as the key to improving the life chances of children living in single‐mother families. We describe in this article a different type of reform—a “third way” in welfare reform. The welfare reforms carried out in the United Kingdom since the “New Labour” government of Tony Blair was elected in 1997 have included promotion of paid work, but alongside two other components—an explicit commitment to reduce and eventually eliminate child poverty, and a campaign against long‐term disadvantage under the label of tackling “social exclusion.” Welfare‐to‐work reforms promoting employment for single mothers have been active but not as punitive as in the United States. At the same time, the tax credit and cash benefit system has been radically overhauled, benefiting low‐income families with children, whether or not parents are working. Early indications suggest a more rapid fall in child poverty in the United Kingdom since its reforms began than in the United States since its reforms, and a faster rise in single‐mother employment. © 2004 by the Association for Public Policy Analysis and Management.  相似文献   
9.
The lack of a coherent security paradigm capable of explaining the concerns of both traditional and ‘new’ security is evident from the US-led occupation of Iraq. Security is the critical element in Iraq's reconstruction, and understanding the multiple meanings and relationships through which it is exercised is essential for empirical and analytical reasons, yet policy is flawed and the debate remains polarized. Thus Washington assumes that conventional security can be provided—and US power employed—independently of the relationship in which it is to be exercised, whereas Iraqi concerns focus on security at the level of the individual. The result can be seen in the paradigmatic examples of coalition operations in Basra in 2003 and Falluja in 2004. This article suggests that the interaction between coalition authorities and Iraqis, and, by extension, conventional and new forms of security, is best understood in terms of power relations; a comprehensive understanding of security must incorporate a relational dimension.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号