首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   40篇
  免费   2篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   3篇
  2015年   3篇
  2014年   1篇
  2013年   10篇
  2012年   2篇
  2011年   3篇
  2010年   4篇
  2009年   3篇
  2006年   1篇
  2004年   1篇
  2001年   1篇
  2000年   1篇
  1993年   1篇
  1986年   1篇
  1983年   1篇
  1980年   1篇
  1978年   1篇
  1975年   1篇
排序方式: 共有42条查询结果,搜索用时 15 毫秒
11.
12.
Although net natural increase accounts for slightly more than half of the over-all growth in the population of Metropolitan Toronto between 1966 and 1971, the redistribution of the 1966 population and the addition of people from outside the metropolitan area are more important in understanding spatial variations in population change. Longer-term residents have tended to move away from the inner municipalities, but the pattern of a suburbanizing population has been obscured by the tendency of recent immigrants to reside in the inner areas.  相似文献   
13.
14.
Drawing on English and Arabic Islamic State (IS) communiqués produced by its central media units, wilayat information offices and broader supporter base, this study examines the strategic logic of IS information operations (IO). It argues that the overarching purpose of IS's IO campaign is to shape the perceptions and polarise the support of audiences via messages that interweave appeals to pragmatic and perceptual factors. Pragmatic factors—such as security, stability and livelihood—are leveraged in IS messaging by promoting the efficacy of its politico-military campaign and denigrating its enemies’ efforts via rational-choice (logic of consequence) appeals. Perceptual factors—which are tied to the interplay of in-group, Other, crisis and solution constructs—are leveraged via identity-choice (logic of appropriateness) appeals that frame IS as the champion of Sunni Muslims (the in-group identity), its enemies as Others complicit in Sunni perceptions of crisis, and IS as the only hope for solving this malaise. With this approach, IS seeks to resonate its message across a diverse ‘glocal’ constituency and supercharge supporters towards action. IS simultaneously targets its enemies with messaging that manipulates the inherent dualities underlying perceptual and pragmatic factors, vigorously counters criticisms and ‘baits’ opponents into ill-conceived IO responses.  相似文献   
15.
16.
This article unpacks the discourse of Arctic geopolitics evident in the space-making practices of a wide variety of actors and institutions, offering an exploration of the ways in which the Arctic is emerging as a space of and for geopolitics. Tracing the well-aired story of Arctic geopolitics through neo-realist readings of climate change, the melting of polar ice, increasing competition for resources and so on, two kinds of spatial ordering are identified as being entwined in orthodox Arctic geopolitics. The first has to do with Arctic space as such, and its open, indeterminate nature in particular. The perceived openness of Arctic space enables it to become a space of masculinist fantasy and adventure, which is mirrored in contemporary accounts of Arctic geopolitics. It is suggested that this is entwined with and nourishes the second ordering of Arctic space in terms of state-building and international relations. The working out of these spatial orderings in recent interventions in Arctic geopolitics is explored via three examples (two Arctic exhibitions in London, the Russian Polar expedition of 2007 and ’sovereignty patrols’ by Canadian Rangers). In conclusion, the article presents avenues for further critical research on Arctic geopolitics that emphasizes embodiment, the resolutely (trans)local, and a commitment to the everyday.  相似文献   
17.
The Internet is an interconnected network and cyber security requires collective action. How that action is organised has important implications for national security, including the defence against cyber attacks and malicious activities. This article explains the origins and institutionalisation of cyber security in Australia—particularly ‘civilian cyber security’. The authors trace the origin of Australia’s first computer emergency response team and explain how this organisational form spread from the USA. Through it, Australia helped enable international cooperation. Domestically, however, the authors argue that the Australian government has struggled with the delegation, orchestration and abdication of responsibility for civilian cyber security, underinvesting in civilian organisations while overrelying on military and intelligence agencies. The history of this organisational field provides valuable insight into how to improve national policy and operations for cyber security.  相似文献   
18.
19.
PIERS MACKESY. War without Victory: The Downfall of Pitt, 1799–1802. Oxford: Clarendon Press, 1984. Pp. xiv, 248. £25.  相似文献   
20.
YK 11, a small, heavily repaired merchantman, was one of 37 Byzantine shipwrecks excavated at Yenikap? in Istanbul, Turkey. This 7th‐century hull, abandoned in the harbour as a derelict, was studied by archaeologists from the Institute of Nautical Archaeology. Originally built with mortise‐and‐tenon edge joinery, the ship had undergone a series of significant repairs over its lifetime. Repairs included the replacement of planking as well as framing. Although the repaired vessel exhibits evidence of both shell‐first and skeleton‐first shipbuilding techniques, detailed study of the hull remains indicates that the ship was initially designed and built as a primarily shell‐based vessel.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号