排序方式: 共有42条查询结果,搜索用时 15 毫秒
11.
12.
Although net natural increase accounts for slightly more than half of the over-all growth in the population of Metropolitan Toronto between 1966 and 1971, the redistribution of the 1966 population and the addition of people from outside the metropolitan area are more important in understanding spatial variations in population change. Longer-term residents have tended to move away from the inner municipalities, but the pattern of a suburbanizing population has been obscured by the tendency of recent immigrants to reside in the inner areas. 相似文献
13.
14.
Haroro J. Ingram 《Australian Journal of International Affairs》2015,69(6):729-752
Drawing on English and Arabic Islamic State (IS) communiqués produced by its central media units, wilayat information offices and broader supporter base, this study examines the strategic logic of IS information operations (IO). It argues that the overarching purpose of IS's IO campaign is to shape the perceptions and polarise the support of audiences via messages that interweave appeals to pragmatic and perceptual factors. Pragmatic factors—such as security, stability and livelihood—are leveraged in IS messaging by promoting the efficacy of its politico-military campaign and denigrating its enemies’ efforts via rational-choice (logic of consequence) appeals. Perceptual factors—which are tied to the interplay of in-group, Other, crisis and solution constructs—are leveraged via identity-choice (logic of appropriateness) appeals that frame IS as the champion of Sunni Muslims (the in-group identity), its enemies as Others complicit in Sunni perceptions of crisis, and IS as the only hope for solving this malaise. With this approach, IS seeks to resonate its message across a diverse ‘glocal’ constituency and supercharge supporters towards action. IS simultaneously targets its enemies with messaging that manipulates the inherent dualities underlying perceptual and pragmatic factors, vigorously counters criticisms and ‘baits’ opponents into ill-conceived IO responses. 相似文献
15.
16.
This article unpacks the discourse of Arctic geopolitics evident in the space-making practices of a wide variety of actors and institutions, offering an exploration of the ways in which the Arctic is emerging as a space of and for geopolitics. Tracing the well-aired story of Arctic geopolitics through neo-realist readings of climate change, the melting of polar ice, increasing competition for resources and so on, two kinds of spatial ordering are identified as being entwined in orthodox Arctic geopolitics. The first has to do with Arctic space as such, and its open, indeterminate nature in particular. The perceived openness of Arctic space enables it to become a space of masculinist fantasy and adventure, which is mirrored in contemporary accounts of Arctic geopolitics. It is suggested that this is entwined with and nourishes the second ordering of Arctic space in terms of state-building and international relations. The working out of these spatial orderings in recent interventions in Arctic geopolitics is explored via three examples (two Arctic exhibitions in London, the Russian Polar expedition of 2007 and ’sovereignty patrols’ by Canadian Rangers). In conclusion, the article presents avenues for further critical research on Arctic geopolitics that emphasizes embodiment, the resolutely (trans)local, and a commitment to the everyday. 相似文献
17.
The Internet is an interconnected network and cyber security requires collective action. How that action is organised has important implications for national security, including the defence against cyber attacks and malicious activities. This article explains the origins and institutionalisation of cyber security in Australia—particularly ‘civilian cyber security’. The authors trace the origin of Australia’s first computer emergency response team and explain how this organisational form spread from the USA. Through it, Australia helped enable international cooperation. Domestically, however, the authors argue that the Australian government has struggled with the delegation, orchestration and abdication of responsibility for civilian cyber security, underinvesting in civilian organisations while overrelying on military and intelligence agencies. The history of this organisational field provides valuable insight into how to improve national policy and operations for cyber security. 相似文献
18.
19.
Edward Ingram 《国际历史评论》2013,35(2):271-276
PIERS MACKESY. War without Victory: The Downfall of Pitt, 1799–1802. Oxford: Clarendon Press, 1984. Pp. xiv, 248. £25. 相似文献
20.
The Hull of Yenikapı Shipwreck YK 11: a 7th‐century merchant vessel from Constantinople's Theodosian Harbour
下载免费PDF全文
![点击此处可从《International Journal of Nautical Archaeology》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Rebecca Ingram 《International Journal of Nautical Archaeology》2018,47(1):103-139
YK 11, a small, heavily repaired merchantman, was one of 37 Byzantine shipwrecks excavated at Yenikap? in Istanbul, Turkey. This 7th‐century hull, abandoned in the harbour as a derelict, was studied by archaeologists from the Institute of Nautical Archaeology. Originally built with mortise‐and‐tenon edge joinery, the ship had undergone a series of significant repairs over its lifetime. Repairs included the replacement of planking as well as framing. Although the repaired vessel exhibits evidence of both shell‐first and skeleton‐first shipbuilding techniques, detailed study of the hull remains indicates that the ship was initially designed and built as a primarily shell‐based vessel. 相似文献