{"title":"IDS研究报告研究摘要77:马里北部安全管理:犯罪网络和冲突解决机制","authors":"","doi":"10.1111/j.2040-0217.2012.00077_1.x","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":100617,"journal":{"name":"IDS Research Reports","volume":"2012 77","pages":"i-ii"},"PeriodicalIF":0.0000,"publicationDate":"2013-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1111/j.2040-0217.2012.00077_1.x","citationCount":"0","resultStr":"{\"title\":\"IDS Research Report Research Summary 77: Security Management in Northern Mali: Criminal Networks and Conflict Resolution Mechanisms\",\"authors\":\"\",\"doi\":\"10.1111/j.2040-0217.2012.00077_1.x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":100617,\"journal\":{\"name\":\"IDS Research Reports\",\"volume\":\"2012 77\",\"pages\":\"i-ii\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-01-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1111/j.2040-0217.2012.00077_1.x\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IDS Research Reports\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/j.2040-0217.2012.00077_1.x\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IDS Research Reports","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/j.2040-0217.2012.00077_1.x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}