Book

Understanding Global Security

Authors:
... He argues that there is a relationship between individual security and State security. Hough (2008) argues that when national security is defined negatively, as protection against outside military threats, the sense of threat is reinforced by the doctrine of the State sovereignty, which Abdul Aziz Al Alawi, Noor Sulastry Yurni Ahmad | The Impacts of COVID-19 on Oman's National Health Security. ...
... strengthens the boundary between a secure community and a dangerous external environment. For this reason, many critics of realism claim that if security is to start with the individual, its ties to State sovereignty must be severed (Hough, 2008). Buzan (1983) and Hough (2008) agreed that the national security concept has to be clear, meaning that what should we put in our mind when we define the national security is only the State, the individuals or both of them, because if the concept is not clear there will be a consequence. ...
... For this reason, many critics of realism claim that if security is to start with the individual, its ties to State sovereignty must be severed (Hough, 2008). Buzan (1983) and Hough (2008) agreed that the national security concept has to be clear, meaning that what should we put in our mind when we define the national security is only the State, the individuals or both of them, because if the concept is not clear there will be a consequence. Buzan (1983) made obvious argument about the national security and individual security. ...
Article
Full-text available
The COVID-19 has had a massive impact on the Oman national health security system, putting the officials and medical crews under sustained pressure and challenges to cope with this crisis. We need to improve the national health security system to achieve health equity and to protect us all from the threat of COVID-19 and future pandemics. This study addresses the impact of COVID-19 on Oman national health security system. The study focuses on three objectives to determine the relationship between COVID-19 and national health security in Oman, to investigate the impact of COVID-19 on national health security, and to identify the role of government in mitigating the impacts of COVID-19 on national health security. The study applies a qualitative method approach and was conducted in two parts using questionnaire surveys and interviews. The study has found that, having a strong relationship between COVID-19 and national health security, the COVID-19 has had impacts on Oman national health security system and the role of the government in mitigating the impacts is very important. The purpose of the study is to generate recommendation to Oman national health security system to pave the way to a robust and resilient national health security system.
... After the Cold War ended, there was a shift in the meaning, issues, and actors involved in security studies. According to Hough (2008), security issues no longer center on the state as the primary actor. Humans and their security aspects, on the other hand, have begun to be looked at as critical studies in security studies (Hough, 2008). ...
... According to Hough (2008), security issues no longer center on the state as the primary actor. Humans and their security aspects, on the other hand, have begun to be looked at as critical studies in security studies (Hough, 2008). As a growing field of study, security studies are seeing a shift in actors and issues, owing to the fact that the problems confronting the state and humans are already quite complex (Williams, 2013). ...
... Women do not have self-control as a result of social pressure. Source: (Hough, 2008;Whitworth, 2013).  Margin of Error: 5%. ...
Article
Full-text available
This study investigates the dangers of catcalling, which is harmful to women. Catcalling is a form of street sexual harassment that has a negative impact on women's mental health. The goal of this study was to see how well Universitas Pertamina students understood the dangers of catcalling. Pertamina University was chosen as the subject of the study by the author because it is only five years old and has never conducted a survey on catcalling behavior. The author employs a hybrid "explanatory sequential design."This method was used to collect statistical data from 401 respondents. The statistical data is intended to assess students' understanding of the catcalling phenomenon. The qualitative analysis of this study discusses in the security study using the Copenhagen School Security Study conceptual framework. According to the findings of this survey, one of the most common reasons for women to become victims of catcalling is that they were described as objects (63 percent). Furthermore, 47 percent of respondents understood what catcalling behavior entails. The remainder, or approximately 42 percent of respondents, agreed that catcalling is a bothersome activity. Meanwhile, 68.8 percent of respondents said the way women dressed triggered catcalling. Another 58.9 percent said patriarchal culture was the catalyst for this behavior. The author argues that Universitas Pertamina students already knows catcalling behavior. However, the authors conclude that universities must educate students on catcalling behavior, which stems from patriarchal culture, on a regular basis.
... First, the Human security approach, following the end of the cold War and the end of certainty that came with it, became the bedrock of security discourses; strategy and even a security paradigm that seeks to extol the primacy of human basic need as security measures itself, to forestalling insecurities (Hough 2004). The failure of governments to, through the usual traditional security paradigm, address the emerging human insecurities that threatened the existence of humanity led to the emergence of an alternative approach, that is, the Human security paradigm to approaching and understanding the rising profile of human-related insecurity issues. ...
... The failure of governments to, through the usual traditional security paradigm, address the emerging human insecurities that threatened the existence of humanity led to the emergence of an alternative approach, that is, the Human security paradigm to approaching and understanding the rising profile of human-related insecurity issues. More recently, analysts, following the United Nations Development Programmes (UNDP) 1994 Human Development Report and their notion of security as "freedom from fear and want" (Hough 2004), have settled on the phrase "human security" to emphasize the people-centered aspect of security efforts, strategies and paradigms. Human Security thus takes the individual as the primary guide, and also focuses on how best to protect them. ...
... Famines chiefly occur due to the combination of both natural and economic factors. Since, it is manmade phenomenon, they are sometimes economically motivated (Hough 2004). A critical problem has also been an insufficient political response by governments to the challenge of food insecurity. ...
Article
Full-text available
The rise of refugee problems worldwide, particularly the African refugee crisis, inherently under- lines the preponderance of the spiking degree of human insecurity in Africa and the definitional and operational shortcomings of the Geneva Refugee Convention of 1951, which was designed to protect the rights of refugees and asylum seekers to safety and express access to neighboring states. This article at- tempts to unpack how the spiking rate of human insecurity in Africa and the definitive and organizational shortcomings of the 1951 Geneva Refugee Convention have led to the troubling spate of the Mexico- American border African refugee crisis, amongst several unabating largescale migrations to developed world including the European countries. From a case-study methodological standpoint, this study utilizes the advantages of rigorous qualitative data and analysis techniques. Despite the development of the 1951 Geneva Refugee Convention and other international regimes, the increasing numbers of African refugees along the Mexican-American border and around the world remain alarmingly worrying. The African refugee crisis now poses unprecedented dangers to global human security, with over five million people internally displaced and thousands of African refugees seeking asylum along the Mexican-American border. A thorough human based security approach is recommended to address the ravaging human security challenges precipitating the influx of African migrants along the Mexico-American borders.
... The human security approach, following the end of the Cold War and the end of certainty that came with it, became the bedrock of security discourses, strategy and even a security paradigm that seeks to extol the primacy of human basic need as security measures itself, to forestalling insecurities (Hough, 2004). The failure of governments to, through the usual traditional security paradigm, address the emerging human insecurities that threatened the existence of humanity led to the emergence of an alternative approach, i.e., the human security paradigm to approaching and understanding the rising profile of human-related insecurity issues. ...
... More recently, analysts, following the United Nations Development Programmes 1994 Human Development Report and their notion of security as 'freedom from fear and want' (Hough, 2004), have settled on the phrase 'human security' to emphasise the people-centred aspect of security efforts, strategies and paradigms. Thus, human security takes the individual as primary referent, and also concentrates on how best to protect them. ...
... For instance, some of the threat caused by environmental degradation seems less clear-cut and direct than most other dangers to human life. Thus, the potential threat of global warming and ozone depletion appears far-off, when compared to more imminent threats, such as natural disasters and military attacks (Hough, 2004). However, the negative modifications in environmental conditions have heightened peoples' vulnerability to other threats, such as disease, and are thus largely an indirect threat to human security. ...
Article
Full-text available
While across known histories of societies the human societies had always developed within the confines of their limits of social justice, the security or otherwise of societies had always been directly proportional to their level of social justice. Invariably, this implies the higher the acceptance and recognition of the need for social justice by a society, the higher the society’s chances for national security. Social justice has thus proven to be a critical sine qua non for an egalitarian and a just society where equity, selflessness and equitable distribution of resources reign. However, the lack and deliberate emasculation of social justice within the society by the state and/or its machineries has over time, consequentially, informed a pathological situation; a situation where, due to the absence or deliberate neglect of the need for social justice in the accumulation of wealth, distribution of wealth and resources as well as social, economic and political relationships amongst the people, the rich are becoming richer whilst the less privileged are becoming more disadvantaged. The social implication and effect of this social pathology is the impulse by the rich or the privileged to see and use corruption to accumulate more wealth, resources and power in unjust social, economic and political exchanges in their bid to maintain the unjust socio-economic and political systems, whilst the poor and the less privileged tend to see and use corruption as a leveller and means to accumulating their own share of the societal wealth, resources and power. The corrupt environment created by social injustice is therefore antithetical to any country’s quest for national security. This is chiefly because national security objectives and corruption are two parallel lines that cannot and have never met. This article therefore argues that social justice backed by egalitarian and equitable distribution of wealth, resources and social services by the government would bring about a corrupt-free society where insecurity would be minimised and reduced to the barest minimum. Keywords: Social injustice, corruption, insecurity, Nigeria’s National Security, Nigeria.
... Whilst various paradigmatic and tested hypothetical rationalizations have been advanced to explain the wave of Boko Haram Insurgency, little or no attention has been given to the theorization of its relationship with Nigeria's development aspirations. The Human security approach, following the end of the Cold War and the end of certainty that came with it, became the bedrock of security discourses; strategy and even a security paradigm that seeks to extol the primacy of human basic need as security measures itself, to forestalling insecurities [Hough, 2004]. ...
... The failure of governments to, through the usual traditional security paradigm, address the emerging human insecurities that threatened the existence of humanity led to the emergence of an alternative approach, that is, the Human security paradigm to approaching and understanding the rising profile of human-related insecurity issues. More recently, analysts, following the United Nations Development Programmes (UNDP) 1994, Human Development Report and their notion of security as "freedom from fear and want" [Hough, 2004], have settled on the phrase "human security" to emphasize the people-centred aspect of security efforts, strategies and paradigms. Thus, human security takes the individual as primary referent, and also concentrates on how best to protect them. ...
... Famines chiefly occur due to the combination of both natural and economic factors. Since, it is manmade phenomenon, they are sometimes economically motivated [Hough, 2004]. An inadequate political response of governments to challenge of food insecurity has also been a critical issue. ...
Article
Full-text available
This study interrogates the continued manifestation of the Boko Haram terrorism that inheres in the prevailing human securities challenges in Nigeria, and why the Nigerian developmental quests had failed and are bound to fail in the future should the human insecurity challenges that accounted for the Boko Haram terrorism are left unabated in Nigeria. Collected qualitative and archival data lend credence to the centrality of the proposition of this study that Boko Haram terrorism would remain as long as the human security challenges such as poverty, inequalities, social injustice, unemployment, illiteracy remain unaddressed. This study therefore recommends a human-based approach to addressing the Boko Haram terrorism. Keywords: human insecurities; Boko Haram terrorism; the human security model; development; Nigeria.
... Similarly, in 1968, the ecologist Garrett Hardin brought to public attention a warning first issued in the nineteenth century by the economist William Forster Lloyd on the "inherent" vulnerability of common resources [3]. Hardin popularized the concept of "global commons" in his 1970s article "The Tragedy of the Commons", where he argued how self-interested human behavior concerning the environment would lead to mutual collapse, highlighting as the prime driving force the ever-expanding human population, which at the end would surpass the earth's "carrying capacity" [18] (pp. 137-138). ...
... U Thant went on to authorize the convening of a conference on human-environment interaction in response to a proposal from Sweden to the United Nations Economic and Social Council (UNESOC). On 5 June 1972, 113 states attended the Stockholm United Nations Conference on the Human Environment [18] (p. 136), [19] (pp. ...
Article
Full-text available
In this paper, we are interested in assessing the different environmental security concepts, policies, and actions of actors involved in the Common Security and Defence Policy (CSDP). Through exploratory qualitative research, we interviewed key stakeholders who formulate both the climate security discourse and its policy outcomes. Aiming at finding the different perceptions and practices among various actors, we conducted 27 qualitative interviews with practitioners from 17 different institutions, such as EU bodies and agencies, think tanks, and ministries of defense (MoDs). This article discusses the divergence between announced environmental and climate security strategies and policies related to their actual results. Notably, the findings indicate that the effectiveness of the political directives compared with the practices and the developed capabilities around the environment–security nexus are dependent on individual initiatives and efforts that a developing community of practitioners is attempting to carry out. Our study indicates that tailored environmental security policies and actions are needed to motivate both practitioners and policymakers to develop downstream methods and programs that are suited to resolving security-related challenges associated with environmental issues and especially climate change.
... Correspondingly, other studies have also focused on the morality of terrorism. An attraction which stems from the ideological interpretations of 'one man's terrorist is another man's freedom fighter', has become a justification for the violent acts of both state and non-state actors in a bid to contrast one side's legitimate killing to another side's illegitimate killing (Hough, 2008;Okoro, 2014). The activities of Hamas in Israel and the Tamil Tigers in Sri Lanka are two obvious examples of groups viewed as terrorist organisation in the eyes of governments and a segment of societies they have attacked but at the same time are praised as freedom fighters by those whose alleged interest they claim to be defending with the violence (Post, 2007). ...
... In fact, history even has it that the word terrorism "was first coined to describe the state directed violence and intimidation of French citizens by the Jacobins in the early years of the French Republic" (Hough, 2008:66). Since then similar events have been recorded as shown by the Nazi genocide and Libyan experience before the ousting of Colonel Muammar al-Qaddafi (Hough, 2008;Oakes, 2011). ...
Article
Contrary to studies that highlight the lethality or morality of terrorism, this paper makes the case that there is need to interrogate acts of terrorism from a political economic point of view. It was argued that this excessive focus on the violence neglected an economic understanding of modern terrorism from various groups across the globe. This paper thus situated the incidence of the Boko Haram and the Islamic State terrorist groups on a political economic framework. The study showed that terrorism was not a 'stupid thing'. The study further revealed that both terrorist groups and their sponsors were not psychopaths but rational beings who derived huge economic benefits from their violent acts. The paper concludes by arguing that until the economic reward on terrorism evaporates, such acts may never cease to occur in the regions and beyond.
... In other words, if members of an ethnic community have some degree of psychological solidarity or rapport with an identifiable group, then the state's repressive counterterrorism might strengthen the sympathy of that community toward the members of the terrorist organization (Munger, 2006;Ozdogan, 2008;Wintrobe, 2006). For example, hundreds of thousands of Iraqis blamed the US military for the loss of their relatives during the US war against terrorism and insurgencies in Iraq (Hough, 2014). ...
Preprint
Full-text available
To cite this article: Ali Ozdogan (2021): A game theory model of terrorist mobilization: the effects of repressive and accommodative counterterrorism and club goods on terrorist decision making, Behavioral Sciences of Terrorism and Political Aggression, ABSTRACT This study proposes a new theoretical model of the decision-making process that mobilizes individuals to engage in terrorism. The model accounts for the effects of a state's ability to retain power, a state's various counterterrorism strategies, and the club goods provided by terrorist organizations. The comparative statics demonstrate that a state's ability to retain power and a policy of counterterrorism that employs exclusive accommodation prevents terrorist mobilization, while the club goods provided by terrorist organizations have the reverse effect. In addition, repressive counterterrorism backfires if its direct effect is less than its provocative effect. The model contributes to the current knowledge base of theoretical understanding of terrorism by considering bipartite effect of repressive policies, and exclusiveness of accommodative counterterrorism policies. ARTICLE HISTORY
... Though the T4 programme caused eugenics theorists around the world to rethink the elimination of disability through euthanasia, the "democratic" or "voluntary" sterilization of people with disabilities remained a common practice well into the 1970s, for example, in Nordic countries and in the USA (Barnes & Mercer, 2010;Rimmerman, 2017;Tilley, Walmsley, Earle, & Atkinson, 2012). As recently as 1995, China enacted a law forbidding the marriage of couples carrying genetic or infectious diseases unless they first agree to sterilisation (Hough, 2013). Furthermore, disability rights advocates and scholars have linked eugenics theories to euthanasia, the New Genetics movement, pre-natal screening and the termination of foetuses with disabilities (Barnes & Mercer, 2003Shakespeare, 1998). ...
Thesis
Full-text available
People with disabilities are the largest minority in the world; a minority that continues to face high instances of direct, structural and cultural violence during times of peace, as well as during times of conflict and displacement. Exacerbating their marginalisation has been the absence of the disability community from Peace and Conflict Studies (PACS) research, literature and practice, which has perpetuated ableist ideologies and hindered the pursuit of “positive peace”. This research responds to this absence by investigating the intersectionality of disability, conflict and displacement from a PACS perspective. Its purpose is two-fold. The first aim is to conduct pure research that challenges the on-going marginalisation of people affected by disability, conflict and displacement, by intentionally de-subjugating and valuing their knowledge and experiences. The second aim is to use applied research to conceptualise and demonstrate ways in which PACS might actively advance inclusive and accessible positive peace. The design of this research was strongly influenced by critical theories, the transformative paradigm, appreciative inquiry, narrative inquiry and partial-insider research. Over a period of five weeks, twenty interviews were conducted in Ecuador with refugees and asylum seekers with disabilities from Colombia and Venezuela, and their family members. A further five interviews were conducted with service providers. The key findings were simple. Participants confirmed that the intersectional experience of disability, conflict and displacement can be dangerous and harrowing. As participants shared insights into how to navigate direct, structural and cultural violence during conflict and displacement, a second key finding was that a great deal can be learned from people with lived experience. Finally, this research revealed that when PACS is informed by rights-based approaches; when those with lived experience have equitable opportunities to determine their own research agenda and contribute knowledge and expertise; and when “nothing about us, without us” is at the forefront of peacebuilding research and activities, then inclusive and accessible positive peace can begin to be realised.
... security as an important component of the traditional security system by the United Nations in 1994 (Hough, 2004), Ole Waever, a renowned security scholar, had already interrogated the alternative security approach to the existing traditional security system owing to his intellectual curiosity to understand why some security threats were gaining more attention than the others. This culminated into the incubation of his securitization theory in 1993. ...
Article
Full-text available
Evidences from counterterrorism and the war on terrorism operations in Africa have revealed the inadequacies of the conventional counterterrorism strategy. The over-reliance on the use of simply hard-military and offensive strategy in prosecuting the war against terrorism and forms of insurgencies in Africa since the inception of the war on terrorism and counterterrorism in Africa has largely been counterproductive. From Boko Haram in Ni-geria to the Islamic State of West African Province in West Africa (ISWAP), to Al-Shabab in eastern parts of Africa, and then to Al-Qaeda in the Islamic Maghreb (AQIM), the rise and spike in terrorism in Africa remains indirectly proportionate to the conventional coun-terterrorism operations and strategy. The deficiency of the use of conventional counterter-rorism strategy in the prosecution of war on terrorism in Africa, coupled with its flawed outcome, has ignited calls for alternative counterterrorism strategies. Chief amongst these alternative counterterrorism strategies is the Community and Vigilante-Group Policing in Africa which emboldens culture, language, episteme, authority, and interest of the people in quest to address the scourge of terrorism and other security threats. This article is therefore an attempt to unpack the prospects and side-effects of the Community and Vigilante-Group Policing as an alternative counterterrorism strategy in the war on terrorism in Africa. Keywords: terrorism, counterterrorism, conventional counterterrorism strategy, Community and Vigilante-Group Policing, Africa
... Stoga HIV/AIDS kao zarazna bolest ima važne implikacije za ljudsku sigurnost jer je odnio milijune života i neizravne, ali i ne manje štetne, društvene posljedice koje imaju snažan učinak na ljudsku sigurnost (isto). Proširivanjem sigurnosne paradigme zarazne su bolesti stoga s razlogom predmet akademskih istraživanja na području sigurnosnih studija (Kittelsen i Enemark, 2007;Davies, 2008;Hough, 2008;Williams, 2008;Enemark, 2009;Kamradt -Scott i McInnes, 2012;McInnes i Rushton, 2013;Watterson i Kamradt -Scott, 2016;Bjørkdahl i Carlsen, 2019). ...
Article
Full-text available
Cilj rada je istražiti na koji je način bolest COVID‑19 konstruirana kao sigurnosna prijetnja u Hrvatskoj i jesu li se sekuritizacijski akteri našli pred sekuritizacijskom dilemom. Sekuritizacijska dilema nastaje kad sekuritizacijski akter uvođenjem izvanrednih mjera nastoji zaštititi određeni referentni objekt, što izravno utječe na ugrožavanje drugog referentnog objekta. Uz predstavljanje osnovnih postavki teorije sekuritizacije i detektiranja elemenata sekuritizacije bolesti COVID‑19 u Hrvatskoj, rad se fokusira na uvođenje i ukidanje restriktivnih mjera kojima su sekuritizacijski akteri naizmjenično štitili različite referentne objekte. Istraživanje je pokazalo da su sekuritizacijski akteri u RH koristili balansirani pristup između zaštite zdravlja građana i zaštite gospodarstva kao različitih referentnih objekata.
... The wide array of the literature reveals that securitization of infectious diseases has been simply a case of considering the implications of this threat for military security rather than the general security of individual people. To describe this phenomenon the American Professor of Law, David P. Fidler, coined the term microbialpolitik (Hough, 2004). ...
... Stoga HIV/AIDS kao zarazna bolest ima važne implikacije za ljudsku sigurnost jer je odnio milijune života i neizravne, ali i ne manje štetne, društvene posljedice koje imaju snažan učinak na ljudsku sigurnost (isto). Proširivanjem sigurnosne paradigme zarazne su bolesti stoga s razlogom predmet akademskih istraživanja na području sigurnosnih studija (Kittelsen i Enemark, 2007;Davies, 2008;Hough, 2008;Williams, 2008;Enemark, 2009;Kamradt -Scott i McInnes, 2012;McInnes i Rushton, 2013;Watterson i Kamradt -Scott, 2016;Bjørkdahl i Carlsen, 2019). ...
Article
Full-text available
This paper examines how COVID‑19 was constructed as a security threat in Croatia and raises the question if securitization actors faced a securitization dilemma. The securitization dilemma occurs when securitization actors try to protect a certain referent object by introducing extraordinary measures which directly endanger another referent object. Alongside basic assumptions of securitization theory and the detection of securitization elements of COVID‑19 in Croatia, the paper focuses on the introduction and suspension of restrictive measures by which securitization actors alternately protected different referent objects. The research indicates that securiti‑ zation actors in Croatia used a balanced approach between the protection of public health and the economy as different referent objects.
... The author has mentioned above that technological outreach does not know any border. To prevent their movement, state actors must collaborate and cooperate (Hough, 2008). Suppose one terrorist group can maximize technology outreach. ...
Article
Full-text available
The simplicity and flexibility of information and technology have made human life much easier. Terrorist groups nowadays have been using these things to disseminate terror, recruit new members, fundraise, and mobilize their activities. Technology provides terrorist group a leverage to conduct its hideous activity. Globalization eventually gives the double-edge sword that needs to be addressed by state actor regarding terrorist issues. The author used James D. Kiras’ four concepts of cyber-terrorism such as proselytizing, coordination, security, and mobility. Those four concepts are harnessed by terrorist group in modern world to achieve their interest. On the other side, the author harnessed comprehensive security from the Copenhagen School of Security Studies to analyze the threat which came from cyber-terrorism activity. The aim of this article is to analyze terrorist groups in conducting their activity based on Kiras’ four concepts of cyber-terrorism. By using Kiras’ concept in Comprehensice Security from Copenhagen School, the author aims to analyze the impact of cyber terrorism both on state and society. The author also used qualitative method as analytical tools to analyze the research problem. The author concluded that the state had to establish a rigid counter-terrorism system holistically at the domestic level without neglecting international strategic cooperation among international actors to counter this threat. Keywords: Cyber-terrorism, proselytizing, coordination, security, mobility.
... No âmbito deste artigo consideram-se as informações estratégicas de segurança, que se inscrevem como um elemento essencial dos sistemas de segurança e defesa nacional, sendo, todavia, concebidas de forma dissemelhante entre os Estados-Membros (Coqc, 2017). A globalização acarretou o entendimento amplo da segurança nacional, que inclui, atualmente, preocupações com diversos riscos transnacionais, para além das tradicionais ameaças político-militares (Buzan, 1991;Hough, 2004;Williams, 2008;Kaldor e Rangelov, 2014), tendo exigido uma natural expansão das áreas de intervenção das informações. No entanto, a globalização dos serviços de informações não tem sido assim tão rápida, mantendo-se as mesmas sobretudo no espaço das jurisdições nacionais (Aldrich, 2009). ...
Article
Full-text available
A segurança europeia apresenta uma natureza transnacional devido às interdependências das sociedades globalizadas. Daqui deriva a necessidade de cooperação e de partilha de informações de segurança entre os Estados-Membros. Este artigo apresenta uma revisão crítica ao funcionamento da comunidade de informações na União Europeia (UE), fazendo uma revisitação histórica que nos permite compreender se a cooperação transnacional tem, ou não, caminhado no sentido de uma maior integração. Para além de mapear os organismos que fazem parte desta comunidade, o artigo parte de um racional teórico da análise política para estruturar os desafios da partilha de informações de segurança na escala comunitária. Argumenta-se que a capacidade de produção de informações de segurança próprias por parte da UE é muito reduzida, estando dependente da partilha de informações efetuada pelos serviços nacionais. Adicionalmente, afirma-se que a partilha de informações policiais se encontra muito mais estruturada do que a partilha de informações de segurança. Por último, conclui-se que a comunidade de informações europeia acolhe diferentes culturas de informações no seu interior e centra as suas atividades numa cooperação difusa, que enfrenta os limites da soberania nacional, os défices de interoperabilidade e dificuldades no estabelecimento de relações institucionais de confiança.
... The scientists such as (Baldwin, 1997;Buzan et. al., 1998;Hough, 2008) define the economic security as a universal category that reflects the protection of subjects of socio-economic relations from the state to each of its citizens at all levels. The researches (Zucker, 1987;Cummins et. ...
Article
Full-text available
The article presents the methodological components of the system of ensuring the economic security of business at the micro and macro levels. The components of the impact on the economic security of the business are identified. A corporate scorecard has been developed to form an economic security information mechanism using a system of balanced indicators. A process approach to information security of economic security using a system of balanced indicators is also formed. A methodological approach to the functional division of work in the project team is developed having the aim of developing the approaches to managing information security of business. A map of using information for economic security on the basis of a balanced scorecard has been developed. The expediency of the model of choice of alternatives of information management in the system of ensuring economic security of business is formed and calculated. The mechanism of adopting approaches to information management for the purpose of ensuring economic security of business is considered as a special kind and relatively independent, local subsystem.
Conference Paper
Full-text available
This research investigates the impact of COVID-19 on financial inclusion in Ghana, utilizing primary data to offer a micro-level perspective. The study focuses on the equality of opportunities to access financial services during the pandemic and assesses its effects on the availability of financial services. Results indicate that while physical infrastructure-related variables did not significantly improve, non-physical infrastructure, including electronic banking and internet services, showed a positive correlation. The study further explores strategies to enhance financial inclusion in the post-COVID era, emphasizing consumer protection, enabling mobile financial services, and leveraging e-commerce data. The findings shed light on the complex dynamics of financial inclusion amid a global crisis and provide valuable insights for policymakers and financial institutions.
Preprint
Following the spate of insecurity in the state which began in 2001, the state government subsequently established a security joint task force known as Operation Rainbow. This security organization has contributed in no mean degree in managing the security challenges in the state. This is an example of how a state organized security outfit has served the interest of the state under the governor as the chief security officer. This is one of the rationales that prompted why researchers have been clamoring for state police to help contain intractable security conditions in the country as opposed to the centralized security structure currently in place. This is a sign that if the federal government formally accepts the establishment of state police system, it will help improve the security condition better. To effectively appraise the role of operation rainbow, oral sources, books, newspapers, speeches, among others have been consulted to unfold the contributions of this security outfit after over a decade of its existence. In this manner, it has contributed in addressing the challenge of paucity of literature on the subject of discourse. Qualitative method of research analysis was used in the course of this study. For objectivity, all data were completely subjected to assessment and examination. This was intended to explore the modus operandi of the operation within the designated areas of its responsibility. The authors recommended that more deliberate steps be taken by the government and security agencies in forestalling future violent occurrences, including strengthening of Operation Rainbow.
Preprint
The paper discussed the current menace of poverty in Nigeria and how it affects security as people evolve methods, including engaging in criminal activities to survive. Suffice to state that Nigeria is blessed with both human and natural resources which if harnessed would propel the country towards a level of sufficiency for her burgeoning population considering the attendant increase on an annual basis. It is important to assert that the nation should have overcome her challenges considering her abundant wealth over the years. The country has been given the appellation, "Giant of Africa", because of her capacity in the continent of Africa, however, it is important to note that the performance of leaders have been abysmal while the level of poverty increases daily, specifically in recent years. The country is currently regarded as the "Poverty Capital of the World" and the effects of poverty are exacerbated by factors such as terrorism and other forms of social ills. The scenario in Nigeria is that of poverty in the midst of plenty. This, to a large extent, has undermined the true essence of human welfare and security in the country. Though there is no justification for crime and criminality which some have been engaged in and which have forced some people to migrate to other environments and countries, non-state actors have always adduced reasons such as the endemic poverty and poverty-related issues like hunger, starvation as the rationale for resulting to their nefarious activities. Insecurity like the Boko-Haram group in the NorthEast , banditry in the NorthWest , activities of the secessionist group in the SouthEast , violent conflicts in different parts of the country, among others have advanced to full blown terrorism with the use of sophisticated weapons. It is now common knowledge that human life is not completely guaranteed, especially in the core North with dire insecurity while the toll arising from this security challenges in recent years is incalculable, thus, resulting in displacement and forced migration. Even the security apparatuses are not spared with the news awash about them losing their lives on daily basis. The study advanced contributing factors to poverty, which includes unemployment, corruption, inequality, poor education and non-diversification of the economy and its implications on human security and migration. The study recommended that concrete initiatives be taken to drastically reduce the rate of poverty, more industries should be built to employ the teeming young unemployed people while security must be prioritized.
Article
Full-text available
Plateau State has gone through orgies of violence with snowball effects on the people and the development of the state. This paper clearly examines ethno-religious conflicts in Jos from 2001 to 2010. Many lives were lost in these crises during this period. Literature reviewed pointed out that the precursors to these crises include "settlers", "natives", "indigenes", "immigrants", "Christians", "Moslems", etc., and these are issues that previous and successive administrations in the state have not fully addressed. The conflict trap theory was employed and factored to explain that the conflicts in Jos are interlaced with continuation, recurrence, escalation, and diffusion, i.e., the four pathways to conflict. The paper advanced the discussion by considering the 2001, 2008, and 2010 crises, which were largely responsible for the segregation in terms of settlements within the city. Attention focused on the negative impacts over the years on both genders, which can be perceived from the prism of economic implication, like loss of livelihood leading to poverty, and social implication, i.e., the disruption of social life vis-à-vis political issues, whereby women were mostly excluded from negotiations, especially in the post-conflict era, among others. The paper concluded by recommending severe punishment for perpetrators of conflicts, conflict merchants, comprehensive security, especially in crises prone areas and proper implementation of previous commissions of inquiry in order to forestall the recurrence of these crises.
Article
Deterrence is a subject of discussion across the disciplines of criminology and Security Studies. However, scholars in the latter discipline have access to a far richer relevant terminology. The terminology of deterrence in Security Studies has particularly grown in relation to terrorism. This paper seeks to use that terminology as an aid to the detailed examination of an approach to crime reduction: Focused Deterrence. Use of Focused Deterrence has delivered promising results, but mechanistic explanation of such outcomes has been found wanting. It is hoped that access to a more detailed terminology will assist those seeking to identify causal mechanisms.
Article
Full-text available
Students' interest in learning and teaching Pancasila Education has not yet thoroughly imbued awareness and sincerity. Students prefer to discuss the actualization and practice of the Pancasila precepts. The method used in this research is a qualitative approach with descriptive analysis and observation methods. Researchers conducted observations, interviews, and distributed google forms to find and dig the required information from students and several related lecturers. Looking at some of the responses and the obstacles felt by students in studying the philosophical and historical Pancasila, the researcher considers it essential to reconstruct the content of the Pancasila Education material in the face of the Industrial Revolution 4.0. The position and role of Pancasila ideology in the scope of Pancasila education must be strengthened and reconstructed more dynamically according to the times. The results obtained from this study show that Pancasila education materials need to be improved and adapted to the developments and guidelines of the digital era, not only centered on theories and concepts but materials are made more exciting and creative so that Pancasila ideology can survive and develop following the goals of the Sustainable Development Goals. (SDGs). So that the character, personality, and ethics of students needed in the 21st Century are fulfilled and optimized for various aspects of life.
Article
Full-text available
The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to modern military strategies. Although the Russian army has developed cyber capabilities and capacities over the years, Ukraine has quickly created a new and innovative cyber defence that includes public and private actors. Using online communication platforms to reach out to populations, internally and externally, has been instrumental for military success. Inventive thinking has enabled the actors to utilise the online space and develop new computing tactics to defend the country. The intense online presence of Ukrainian President Zelenskyy stands in clear contrast to Russian President Putin. President Zelenskyy is mastering online communication and is speaking directly to the people. Because of his constant use of virtual communication platforms, new public and private resistance movements have formed based on civic activism and a defiant stance against Russian aggression. Various non-governmental groups of hackers, hacktivists and activists have created a structure of resistance, where each has taken on a role in a nodal system depending on skills and engagement levels. This article will focus on how the Ukrainian leadership has been able to carry out a successful speech act that has activated numerous online users internally and externally. This speech act has enabled a new form of online civic activism where online actors fight with the military forces — but mostly without being employed by the state. Within the first 40 days, this activism has proven beneficial to the existing military force to defend Ukraine. The article investigates Ukraine’s role in the David and Goliath fight and how Ukraine’s initiatives have helped develop its cyber defence. The research is based on secondary sources predominately based on grounded theory, where the data collected are critically compared with theoretical content. All data is theoretically sampled and analysed based on the established socio-political approaches deriving from discourse analysis. The timeframe for this research is the first 40 days of the conflict, starting on February 24 2022.
Article
Full-text available
In the context of increasingly dynamic global threats to security, which exceed current institutional capabilities to address them, this paper examines the influence of actors with insular interests who seek to leverage anxieties, grievances and disinformation for their own advantage at the expense of the public. Such actors have a common interest in political dysfunction as a means of reducing institutional controls and oversite and use combinations of divisive messaging and disinformation to advance societally suboptimal goals. We first examine the emergence of a security deficit arising from globalization, climate change, and society’s failure to develop the institutions and norms necessary to address the threats produced by these combined phenomena. We then analyze how the politics of division and disinformation have undermined the ability of political and social systems to adapt to the new global threat landscape, employing a conceptual framework that integrates perspectives from sociology and political studies with advances in the cognitive sciences and psychology. Included in the analysis is an examination of the psychological and cognitive foundations of divisive politics and disinformation strategies employed by opportunistic actors to manipulate existing cultural biases and disinform the public of the genuine threats to their well-being. Finally, we provide examples of the interaction of the aforementioned dynamics and concomitant societal opportunity costs resulting from politically fueled division and disinformation. The paper intends to integrate insights from distinct disciplines (sociology, political science, political economy, psychology and cognitive science) to construct a new conceptual framework for understanding obstacles to addressing twenty-first century global threats, and identify gaps in the capacity of dominant security paradigms to fully recognize and assess such threats.
Chapter
Full-text available
Zusammenfassung Als exportabhängiges Land ist Österreichs Außenwirtschaft ein gewichtiger Bereich der Außenpolitik. Dieser Beitrag skizziert die außenwirtschaftspolitischen Entwicklungen seit der Entstehung der Zweiten Republik. Dabei geht er insbesondere darauf ein, wie der EU-Beitritt Außenhandelskompetenzen und -politiken neu konfiguriert hat. Er zeigt, wie die Außenwirtschaftspolitik von dem Beitritt und der damit verbundenen Zollunion profitiert, welche Strategien auf nationaler Ebene verfolgt werden, und wie sich die innenpolitische und gesellschaftliche Stimmung in der Handelspolitik wandelte.
Chapter
Full-text available
Zusammenfassung In diesem Beitrag werden die Beziehungen zwischen Österreich und dem Europarat in fünf chronologisch aufeinanderfolgenden Phasen dargestellt und Schwerpunkte in der österreichischen Außenpolitik identifiziert, wobei es sich aufgrund mangelnder geschichts- oder politikwissenschaftlicher Literatur zum Thema lediglich um einen ersten Abriss handelt. Anschließend werden Wege und Möglichkeiten aufgezeigt, um diese Beziehungen (außen-)politikwissenschaftlich zu untersuchen und damit den Erkenntnisstand zu einem bisher wenig beachteten Thema in der Analyse österreichischer Außenpolitik zu erweitern.
Chapter
Full-text available
Zusammenfassung Im Lichte historischer und aktueller Politikdeterminanten bildete der Zerfallsprozess Jugoslawiens ab 1989 einen außenpolitischen Aktionsschwerpunkt für Österreich, von der Vorreiterrolle in der Befassung internationaler Organisationen über die Unterstützung der Staatlichkeit Bosnien-Herzegowinas, bei der Unabhängigkeit Montenegros, bis hin zur Rolle im Zusammenhang mit der Unabhängigkeit des Kosovos, bei gleichzeitiger Aufrechterhaltung guter Beziehungen zu Serbien, und zur aktiven Unterstützung der EU-Annäherung aller Balkanstaaten.
Chapter
Full-text available
Zusammenfassung Österreichs Außenpolitik zu Italien war bis Anfang der 1970er Jahre vom Südtirolkonflikt geprägt. Mit dessen Ende begann eine allmähliche Normalisierung der Beziehungen, die begleitet wurde von einer intensiven grenzüberschreitenden Nachbarschaftspolitik auf substaatlicher Ebene. Mit dem EU-Beitritt Österreichs (1995) wurde die politische Asymmetrie der beiden Länder etwas eingeebnet. Dabei sind die politischen und wirtschaftlichen Beziehungen stark auf Norditalien konzentriert. Zwischendurch auftauchende Unstimmigkeiten werden meist in einem europäischen Kontext ausgetragen.
Chapter
Full-text available
This chapter attempts to briefly discuss some principles and boundary issues in dealing with scientific and technological ethics, drawn from the bioethics perspective as a class of specialized ethics. Here, an effort will be made to discuss the issue of bioethics as one of the scientific and technological ethnics vis-à-vis the issues of the model establishment of science and technology as a value-free quest for truth or autonomous activity for self-determination from its cultural and social framework using insights from the Nigerian (a major stakeholder in Africa) context. The requirement, virtue, and just delivery of resources that ought to be the critical aspects of scientific and technological ethics with reference to bioethics will also be highlighted. Conclusively, it is believed that scientific and technological ethics is one of the classes of specialized ethics that has not been given appropriate attention in Nigeria
Book
Full-text available
Organized Crime in the present time knows no boundaries of states and regimes. Network, well-organized, highly sophisticated criminal groups, all races and colors, in order to generate large profits, with a variety of “lucrative”, particularly those related to drug trafficking, arms trafficking, etc. Criminals roam electronic networks, with highly developed technologies, “wash” large amounts of money as an invisible, powerful force pulling back the wheel of civilization, degrading epochal achievements to date. It seems that our prose abounds in contradictions. On the one hand we have the remarkable progress in the scientific and technological civilization in general terms, to extreme levels, on the other hand, we have an expansion of the darkest and most bizarre phenomena, as a result of organized crime, primarily for economic reasons. It is understood that certain forms of organized crime, do not manifest themselves as outcasts, individual cases that are hermetically sealed. The types of crime are all different, but at the same time and complement each other, contributing to its growth and diversity, and rooting in all spheres of society. Conclusively established a set pattern, in which a strong criminal organization, not avoiding any criminal activity, provided that it is profitable. Also, organized crime, bringing fabulous wages, in accordance with the time at which it exists, is not “traditional”. So, it is not based on traditional ties, but connects and covers various segments of society, so it is sometimes very difficult to separate, legal elements of the crime. Furthermore, governments, banks, institutions and other sectors of society, they are often involved in criminal activities and benefit from it. At the same time, characteristic of organized crime, certainly the fact that criminal groups are rapidly integrate and adapt, not limited to one form or criminal activity, and more territory, and the cooperation of international criminal organizations developed in all fields.
Chapter
Full-text available
Son zamanlarda yaşanılan savaşlar, iç savaş ve çatışmalar, ekonomik kriz ve yaptırımlar maalesef politik şiddet ve terör saldırılarını artırarak devletlerin siyasi ve ekonomik kırılganlıklarını olumsuz yönde etkilemektedirler. Gelecekteki ekonomik senaryolarla ilgili yaşanılan hayal kırıklığı ve zayıf beklentiler politikacıları siyasi şiddete yönlendirebiliyorken, vatandaşları da terör faaliyetlerine sürükleyebilmektedir. Ekonomik kaygıların yanında dayanıklı ve ısrarcı bir yönetim anlayışının benimsendiği ülkelerde teröristlerin daha fazla dikkat çekmek için saldırı sayılarını arttırdıkları ve daha vahşi eylemler gerçekleştirdikleri bilinmektedir. Görüldüğü üzere politik şiddet, terör saldırıları ve ekonomi kavramları birbirleriyle yakından ilişkili olup devletin kırılganlığını belirleyen temel unsurlardır. Bu çalışmada da yeni kurulan Türk Devletleri Teşkilatı üyesi olan ve veri temininde sıkıntı yaşanılmayan Azerbaycan, Kazakistan, Kırgızistan ve Türkiye öznelinde devletlerin kırılganlıkları ile politik şiddet, terör saldırıları ve ekonomik etkinlik arasındaki ilişkinin ortaya konulması amaçlanmaktadır. Kültürel benzerlikleri bulunan ve ekonomik potansiyelleri birbirine yakın olan bu ülkelerde devlet kırılganlığını ölçmek için sistemik barış merkezi tarafından yayımlanan devlet kırılganlık endeksine başvurulmuştur. Bu endeks bir ülkenin çatışmayı yönetmek, kamu politikasını uygulamak, kamu hizmetlerini sunmak ve ilerici kalkınma anlayışını sürdürmek gibi temel işlevleri yerine getirme yeteneğini ölçmektedir. Ekonomik etkinlik verileri de yine sistemik barış merkezi veritabanından alınmıştır. Terör saldırıları sayısı küresel terörizm veritabanından, politik şiddetin yokluğu verisi de dünya bankası yönetişim göstergelerinden temin edilmiştir. Analizde ilk önce yatay kesit bağımlılığı ve heterojenite testlerine başvurulmuştur. Testler neticesinde yatay kesit bağımlılığını ve eğim heterojenitesini dikkate alan ikinci nesil birim kök testi olan Pesaran CIPS testi uygulanmıştır. Sonra analize dahil edilen değişkenler arasında uzun dönemli biri ilişkinin varlığını tespit etmek için panel eşbütünleşme testi yapılmış ve değişkenlerin uzun dönemde en az bir eşbütünleşik vektöre sahip oldukları yani uzun dönemli bir ilişkinin olduğu sonucuna ulaşılmıştır. Son olarak yatay kesit bağımlılığını dikkate alması ve sapmasız güvenilir sonuçlar sunması nedeniyle CS-ARDL yöntemine başvurularak analiz gerçekleştirilmiştir. Türk Devletleri Teşkilatı üyesi ülkeler üzerinde gerçekleştirilen analiz sonucunda politik şiddetin yokluğunun ve ekonomik etkinliğin kısa ve uzun dönemde devletin kırılganlığı üzerinde olumlu bir etkisinin olduğu tespit edilirken, terör saldırılarının hem kısa hem de uzun dönemde ilgili devletlerin kırılganlıkları üzerinde etkili olmadığı sonucuna ulaşılmıştır. Türk Devletleri Teşkilatı üyesi ülkelerde devletçi zihniyetin ön planda olması ve terör saldırıları karşısında yaşanılan birlik ve beraberlik devletin kırılganlığının azalmasına engel olmaktadır. Terör saldırılarında yaşanılan bir artışın güvenlik kaygısı ile devlete olan ihtiyacı daha da artırması ve toplumun kenetlenmesi çıkan bu bulguyu desteklemektedir. İktisat teorisinde de geçerli olan ekonomik etkinlikte yaşanılan bir artış devletin gücünü ve yapısını olumlu etkileyerek üretimin ve toplumun refahının artmasına neden olmaktadır. Politik şiddetin yokluğunda gözlemlenen bir gelişme ise politikada istikrarın yakalanması ve devletin kamu hizmet ve politikalarını etkin bir şekilde uygulamasına fırsat vermektedir. Dünya’da kırılgan ekonomiler arasında gösterilen Türkiye ve benzer sosyo-ekonomik yapıda olan diğer Türk devletleri, devletin kırılganlığını azaltmalı ve sağlam bir yapıya kavuşturmalıdır. Böylelikle devletler temel fonksiyonlarını etkin biçimde yerine getirebilecektir. Bunların sağlanmasında politik şiddetin kontrol altına alınarak ekonomide etkinliğin nasıl sağlanacağına dair araştırmaların yapılmasının önemi büyük olacaktır.
Chapter
Full-text available
Xİ JİNPİNG’İN COVID-19’LA MÜCADELESİ
Article
Full-text available
The post-1991 Ethiopia and Eritrea were hoped to become promising and exemplary states in Africa. But, after seven years of euphoria, national stability and security trapped both countries into a bloody conflict, and their relation is now in structural crisis: the ‘no war, no peace’ dilemma. Their security dilemmas are basically centered on the antagonistic foreign and national security as well as nation-building policies. The post-independence nation-building attempt to forge a militarized single national identity in Eritrea, under the motto of “one people, one heart” and the remaking of the age-old Ethiopian state based on ethnic federalism further deepen the nation-building dilemma. The post-1998 security dilemma between the two states is, therefore, the result of securing Eritrea’s nation-building policies and the militarization of the Yika’alo-Warsay generation where Ethiopia has been made to be “a relevant enemy to its Singaporization vision” and Eritrea is subsequently viewed as a “relevant enemy to Ethiopia’s renaissance vision and securitization of poverty”. During the militarization of the borders, Badme still remains symbolically the hotbed of the ‘no war, no peace’ regime. This article, therefore, analyzes the post-2000 security dilemma between Ethiopia and Eritrea and the subsequent dynamics that have led to securing and/or militarizing their relations.
Chapter
Full-text available
This paper using desk research, argues that discrimination and restrictions are symptoms of both inequality and structural violence that undermines women’s security. The paper aims at establishing whether the measures for combating GBV in Nigeria are sufficient response to ensuring women’s security, especially whether the National Gender Policy in Nigeria achieved its aim as regards GBV. It is however observed that despite the constitutional provisions in Nigeria and her commitments to regional and international human rights treaties and conventions, the rights of women and girls are still grossly undermined and under-valued, which is overtly evident in the overall low Gender Development Index for the country, and exacerbated in high rate of physical and sexual harassment and assault, trafficking, marital rape, early/forced marriage, and different phases of harmful traditional practices against women and the girl child. These practices have made development opportunities to continue to elude women. Worst still, the existing policy documents (e.g. the National Policy on Women) have failed to challenge the structure, which continues to reproduce gender inequality and the overall dis-empowerment of women. The paper concludes that the insertion of the human security perspective into policies is essential for abolishing these practices.
Article
All kinds of illegal trafficking, prostitution, pornography, gambling, fraud and counterfeiting, computer crime, corruption, piracy, illegal immigration and many other criminal activities can pose a threat to national and even international security if conducted by larger criminal groups or organizations. The phenomenon of organized crime has acquired a transnational character due to the increasing globalization of financial markets and communications as well as technological development. The three countries of East Central Europe – The Czech Republic, Hungary and Poland – can be of interest in terms of organized crime as recent political and economic developments in these countries have made them attractive to such criminal activities. Another problematic region in terms of organized criminal activities is the region of Central Asia which includes several countries of the former Soviet Union – Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan.
Article
Prispevek predstavlja kritično razmišljanje o internacionalizaciji visokega šolstva oziroma o njenem najbolj hitro naraščajočem in razvijajočem delu – čezmejnem izobraževanju in pregledu nad tveganji, ki so povezana z omenjenim pojavom v kontekstu vpliva na nacionalno varnost. Uporabili smo deskriptivno metodo, zlasti pri konceptualizaciji ključnih pojmov, in analizo vsebine primarnih in sekundar- nih virov, pri čemer smo podatke dobili iz domače in tuje strokovne literature, in- ternetnih virov in pravnih dokumentov. Nacionalne vladne politike pomembno vplivajo na proces in izide čezmejnega izobraževanja, zato je za strateško delovanje in napoved trendov bistven pregled nad trenutnim stanjem in morebitnimi tveganji (neokolonializem, beg možganov in korupcija). Ugotavljamo, da je z vidika zagota- vljanja gospodarske konkurenčnosti in posledično nacionalne varnosti posameznih držav nujno potrebna identifikacija trenutnega stanja in analiza pomena trendov na področju čezmejnega izobraževanja. The paper provides a critical reflection on the internationalization of higher education, more specifically of its most rapidly growing and evolving part – cross border education, as well as presents an overview of the risks associated with the above phenomenon in the context of the impact on national security. For the purposes of the paper we have used the descriptive method, especially in conceptualizing key points, and analysis of the primary and secondary sources content was done, where the data was drawn from the domestic and foreign literature, internet resources, and legal documents. National government policies have a significant impact on the process and outcomes of the cross-border education. Strategic performance and trend forecast are thus essential for an overview of the current situation and potential risks (neo-colonialism, brain drain and corruption). We have found that in terms of ensuring the economic competitiveness and, consequently, the national security of individual countries an identification of the current state and the analysis of trend importance in cross border education is needed.
Article
Full-text available
This research explains how China influences environmental security and peace in Mongolia. In Mongolia, China engages itself in several sectors such as ecosystem, energy, population, food, and economy. This activity caused environmental damage like desertification, wildlife extinction, deforestation, damage caused by the water-powered plant, food health, and environmental pollution caused by mining. Peter Hough, an environment security expert, explained in his book, "Understanding Global Security, Second Edition", that environmental problems could be an issue of human security. It means that environmental security is a part of the human security dimension. Environmental degradation is not just an environmental issue but also become a security issue. To explain this, the concept of environmental security dimension and environmental conflict approach was used, because this security phenomenon is focused on men instead of the state.
Article
Full-text available
COVID-19 küresel salgını, içinde yaşadığımız dünyayı sorgulamayı ve salgın sonrası dünya üzerine düşünmeyi gerekli kılmıştır. Sokağa çıkma kısıtlamaları, ekonomik zorluklar, artan işsizlik, maske vb. koruyucu ekipman tedarikinde yaşanan sıkıntılar gibi sorunlar, devletlerin bu küresel salgına ne kadar hazırlıksız yakalandığını ortaya koymuştur. Sağlık sorunu olarak başlayan salgın giderek bir küresel problem haline gelmiş ve güvenliği ilgilendiren bir soruna dönüşmüştür. Güvenlik kavramının tarih boyunca geçirdiği değişim sonucunda ortaya çıkmış insani güvenlik olgusu, bu salgın ile birlikte bir kez daha gündeme gelmiştir. Bu kapsamda bu çalışma, güvenlik olgusunun geçirdiği değişim ve insani güvenlik kavramının ortaya çıkışını açıkladıktan sonra COVID-19 salgın hastalığı örneği ile insani güvenlik kavramının gereken önemi görüp görmediği sorunsalına odaklanacaktır. Soğuk Savaş sonrası dönemde değişen güvenlik olgusu içerisinde yer alan ancak yeterli önemin verilmediği insani güvenlik kavramı salgın hastalık tecrübesi sonrasında oluşacak dünya düzeninde ön plana çıkacaktır.
Article
Full-text available
INTERNATIONAL INCIDENTS - CONCEPT AND TYPES Resume The paper deals with the complex problem of international incidents, which has both theoretical and practical significance. The introductory part deals with the notion of an international incident, which is defined as an unpleasant case, small conflict, etc., which endangers or spoils relations in the international community, especially between states or causes other more or less pronounced harmful consequences. Then, basic similarities and differences between international incidents, disputes, crises and conflicts were pointed out. The second part of the paper contains a classification of international incidents according to the reasons for which they occur. Here it is pointed out that incidents can occur as a consequence of decisions of governments, actions of state bodies independent of the will of the government, actions of independent individuals, accidents, natural events, but also for various other reasons, and even due to animal actions. The next part of the paper deals with the types of incidents according to their nature, where military incidents, border incidents, assassinations and diplomatic incidents are dealt with separately, because they most often break out between states and their consequences can be very severe. Finally, the last part of the paper deals with the types of incidents according to their consequences. There are analysis and examples of incidents that turned into disputes, incidents that escalated into crises and, finally, incidents that degenerated into conflicts, whether someone took advantage of certain events or even created incidents so that could use them for its own purposes, including even starting an armed conflict. The paper contains a really large number of cases from practice, some of which have been forgotten, while others concern the very recent events. Keywords: international law, international incidents, international disputes, international crises, international conflicts*32
Article
Full-text available
Ensuring economic security at all levels of the national economy is an integral part of ensuring national security. The article proposes a system of indicators for monitoring the economic security of municipalities, which can be adapted for any municipality and effectively used for comparative analysis of the levels of economic security of the territories under consideration, located at different hierarchical levels. We propose that the system includes 11 indicators and threshold values for each of them. We based our research on a systematic approach. The study involved dynamic, graphical analysis and economic and mathematical methods. This article is one of the first attempts to create a unified system of indicators for monitoring the economic security of municipalities.
Thesis
Full-text available
This study examines political insecurity and how that leads to human insecurity in Nigeria between 1999 and 2007. The study answers important questions on political insecurity, its indicators and factors leading to it. The study employs quantitative and qualitative methods to provide an in-depth analysis of the problem. Cingranelli-Richards (CIRI) and Political Terror Scale (PTS) datasets are employed in analyzing the problem under study. Furthermore, the study identifies three major factors leading to political insecurity in Nigeria i.e. clientelism, state weakness and military intervention in the domestic politics. The major conclusion drawn from the study affirms that political insecurity leads to human insecurity in Nigeria. Finally, the study recommends that researches of this nature should be encouraged in the academia and government authorities and Non Governmental Organisations (NGOs) should work together in bringing an end to the fatal problem of political insecurity in Nigeria
Article
Full-text available
This research aims to identify and describe the practices carried out by Soka Gakkai International (SGI) that are concerned with global issues such as human rights and sustainable development, to support human security in Indonesia, the Philippines and Singapore during the Covid-19 pandemic? Using a qualitative approach, case study methods and literature studies as well as a human security conceptual framework, this research was conducted. The results showed various practices of Soka Gakkai International that supported efforts to protect humans from the threat of Covid-19 in Indonesia, the Philippines and Singapore from March to July 2020. However, there are pros and cons among experts regarding SGI's human security practices during the pandemic. This can be a lesson about human safety practices during a pandemic. ----- Penelitian ini bertujuan untuk mengidentifikasi dan mendeskripsikan praktik-praktik yang dilakukan oleh Soka Gakkai International (SGI) yang hirau dengan isu-isu global seperti hak asasi manusia dan pembangunan berkelanjutan, untuk mendukung keamanan manusia di Indonesia, Filipina, dan Singapura ketika terjadi pandemi Covid-19? dengan menggunakan pendekatan kualitatif, metode studi kasus dan studi literatur serta kerangka konsep keamanan manusia penelitian ini dilakukan. Hasil penelitian menunjukkan berbagai praktik Soka Gakkai International yang mendukung upaya perlindungan manusia dari ancaman Covid-19 di Indonesia, Filipina, dan Singapura dari bulan Maret hingga Juli 2020. Namun, terdapat pro dan kontra di antara pakar mengenai praktik keamanan manusia dari SGI ketika pandemi. Hal ini dapat menjadi pembelajaran mengenai praktik keamanan manusia pada saat pandemi berlangsung.
Article
Full-text available
This paper intends to research the causality between evolving cultural models of the West and societies of Central and Eastern Europe, which accepted and emulated these models ever since the Cold War ended in a desire to be integrated into the West as they possibly could. After the Iron Curtain was lifted, both the post-communist countries and the West were eager to accept one another, as the Western values and the liberal consensus of that period reflected basic human and civil rights and freedoms – such as speech, movement, fair elections, independent media – all that these countries were lacking during the previous period. American cultural and diplomatic victory, combined with the fact that they were the only remaining global superpower allowed the American culture in the broadest sense to strongly influence nearly every country in the world, and particularly in those who saw salvation in every sense in Euro-Atlantic integrations. They began to introduce the Western cultural models and value system in their societies, but the problem occurred as these societies were not exactly compatible with these models and values. Additionally, the liberal consensus was constantly evolving, with a strong emphasis on political correctness and social sensitivity, which brought us to the current dominant cultural paradigm from the West, the woke culture. The goal of this paper was to identify how the current liberal consensus and the current cultural paradigm affect horizontal and vertical security aspects in countries of Central and Eastern Europe. The authors further identify a precise picture of both the dominant Western cultural paradigm and its reflections on societies of post-communist countries, with a detailed insight of Ukrainian example, which is at the same time the most extreme but the most representative example as well. Ukraine did not adopt pro-Western tendencies immediately after the Cold War ended, but they developed them with great intensity which culminated in 2004 street protests that brought pro-Western politicians to power. But Ukrainian people faltered in their dedication to the West, so they turned once again to pro-Russian politicians, only to falter again which brought another street protests and deposition of then-president. Due to strong anti-Russian sentiments prevalent after the latest revolution and ostracism of ethnic Russians and their culture that followed, ethnic Russians reacted by voting for annexation to Russia in Crimea and rebelled against the Ukrainian state in the eastern part of the country which is now de facto independent. All those events, combined with efforts to adopt Western values and culture even when they conflicted with their national identity made that country semi-functional, susceptible to ideas originating from extreme portions of the political spectrum, and created not only security threats, but war as the most extreme security threat. In closing chapters, the authors checked theoretical theses of eminent scientists against the lens of development and the current state of political, cultural and security situations in the countries of Central and Eastern Europe, and defined causalities between the current cultural paradigm and real situation in the subject region. In the end, the authors give short summary of potential security challenges and threats in the subject region as a result of previously elaborated cultural and social relations and mechanisms. Keywords: culture, woke culture, liberal consensus, the Cold War, the Warsaw Pact, Central and Eastern Europe
Article
Konflik internal pada Kepulauan Solomon mengakibatkan terjadinya krisis kemanusiaan yang berdampak kepada terancamnya keamanan manusia masyarakat negara tersebut. Hal ini di respon oleh negara-negara di kawasan Pasifik untuk menanggulangi konflik dengan membentuk RAMSI (Regional Assistance Mission to Solomon Islands). Dengan menggunakan metode riset kualitatif dan kerangka konseptual keamanan non tradisional, keamanan manusia, dan tanggung jawab untuk melindungi, pada artikel ini di dapatkan peran RAMSI dalam menanggulangi konflik di Kepulauan Solomon ada tiga bentuk. Pertama, tanggung jawab untuk mencegah yaitu RAMSI melakukan intervensi dan stabilisasi. Kedua, tanggung jawab untuk bereaksi yaitu RAMSI melakukan serangkaian aksi seperti penyitaan senjata kelompok yang berkonflik, mengejar tokoh-tokoh kriminal dan korup, serta melakukan penegakkan hukum. Ketiga, tanggung jawab untuk pemulihan yaitu RAMSI melakukan pembangunan kapasitas di bidang hukum, politik, keamanan, ekonomi di Kepulauan Solomon.Kata Kunci: Keamanan Manusia, Kepulauan Solomon, Konflik, RAMSI, Tanggung Jawab untuk Melindungi
Article
Full-text available
Nuclear terrorism has emerged as one of the principal concerns for states maintaining nuclear weapons technology as well as states maintaining peaceful nuclear programs. The idea is that non-state entities, in pursuance of their goals of achieving maximum tactical leverage over states, aspire to either jeopardize nuclear facilities as a means to warrant a radiological anomaly or would, in worst case scenario, acquire or construct weaponized devices. The concept of Improvised Nuclear Device (IND) or Radiological Dispersal Device (RDD) is both argued as a plausibility and as a reality in current global technological layout. More specified to South Asia, where non-state entities are allegedly employed for transnational target acquisition and the where the security paradigms are hampered by technological inferiority, it is speculatively concluded that chances of such occurrences are marginally higher as compare to other nations. Vulnerabilities of South Asia pertaining to radiological terrorism are extended internationally based upon proliferation patterns in South Asia, utilization of proxies for achievement of leverage, comparative technological inferiority of nuclear facilities and auxiliary systems, spread and introduction of terrorism in South Asia, lack of understanding of nuclear terrorism and inability to proactively participate in international non-proliferation regimes and designs. Important considerations in these regards would then have to focus on efficacy of security infrastructure from production to disposal and from civilian to military nuclear installations. Where in South Asia, states have maintained secrecy and state control over nuclear installations, radiological terrorism seems a highly unlikely scenario postulation but being cautious is still operationally necessary.
Chapter
Full-text available
LEARNING OUTCOMES: After completing this chapter, you will be able to: 1. Identify international security and security studies in the 21st century. 2. Describe the concept of international security. 3. Investigate peace studies and conflict resolution. 4. Examine current and future global threats/challenges. CHAPTER OUTLINE Introduction International Security and Security Studies in the 21st Century What is security? Peace Studies and Conflict Resolution Current and Future Global Threats / Challenges KEY TERMS International security, Security Studies, Peace Studies, Conflict Resolution, Global threats, Collective Security, Human Security, Responsibility to Protect, Conflict Theories, Conflict Intervention.
ResearchGate has not been able to resolve any references for this publication.