Academic literature on the topic 'Security, International Case studies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security, International Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security, International Case studies"

1

kunz, Waldemar. "The European Case for International Security." Security Dimensions 41, no. 41 (July 29, 2022): 52–71. http://dx.doi.org/10.5604/01.3001.0015.9447.

Full text
Abstract:
Armed conflicts between states and friction within international organizations, not forgetting wars in the economic-technological, and economic-commercial dimension, including issues related to natural resources, raw materials, and energy, are part of an attempt to position elites in a new axiological-political space. This article takes up the complex and contentious issue of the security crisis in the European dimension, with an emphasis on international and transnational issues, while focusing on the transformation of the existing political, social, axiological, and cultural order. In other words, the issue concerns the new paradigm of civilization, which has been taking shape on a global scale since the turn of the 20th and 21st centuries. The main intention and purpose of the study is to present the complex problem of specificity of the European security, pointing to the processes and phenomena that change the architecture of the world order, taking into account the international, transnational, and migration contexts. As far as the diagnosis of the current international situation is concerned, it concerns the conviction about the regression of the old civilization and cultural patterns, valid in the 19th and 20th century, and the formation of a new paradigm from the turn of the 20th and 21st century (until 2019), determining the economy, politics, and society.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Abhishek Narain, and M. P. Gupta. "Information Security Management Practices: Case Studies from India." Global Business Review 20, no. 1 (November 9, 2017): 253–71. http://dx.doi.org/10.1177/0972150917721836.

Full text
Abstract:
In recent years, information security has gained attention in organizations across diverse businesses and sectors. Primary reasons of this can be the new and innovative ways of information handling (during generation, processing, storage and distribution), and dependence of business processes on new and emerging IT/ICT mediums in organizations to carry out daily business activities. This has made organizations agile in terms of functioning and, at the same time, has posed new challenges. In this direction, the present study aims to explore and examine information security management (ISM) practices of two IT development and services organizations in India. In case study design, the study adopts qualitative research route to understand the current ISM practices of the case organizations. The observations derived from semi-structured interviews are presented using descriptive analysis methodology. Further, SAP-LAP (Situation, Actor, Process—Learning, Action, Performance) method of inquiry is used to analyse the findings from case studies. Results highlight the importance of consistent top management support, organizational information security culture and a proper monitoring system for ISM effectiveness in organizations. Insights derived from the study can be helpful for managers and decision makers in managing organizational information security practices.
APA, Harvard, Vancouver, ISO, and other styles
3

Shipilov, Alexander Yurievich. "West African International Studies: Approaches to Regional Security." Vestnik RUDN. International Relations 19, no. 2 (December 15, 2019): 207–17. http://dx.doi.org/10.22363/2313-0660-2019-19-2-207-217.

Full text
Abstract:
This article covers the most significant theoretical schools in West Africa in the framework of the international relations analysis, with special focus on the regional security. Major respective theoretical approaches to the given issues are assessed based on the writings of local experts that frequently reevaluate the major articles of faith connected with neo-Realist, neo-Liberal and Marxist views. Particular attention is drawn to the examination of various interpretations of the role that belongs to supranational regional structures in West African conflict resolution using the case of the Liberian civil war. The most crucial part of the research presented is an analysis of publications issued by Adekye Adebajo and Ismail Rashid, two leading West African specialists in the field of regional security. Their appraisal of collective security mechanisms’ perspectives in the most poverty-stricken and unstable regions of the world is elaborated upon. The aim of the article is to determine the extent of uniqueness present in Adebajo and Rashid’s approaches compared to their Western and African colleagues but also to figure how West African 1990-2000’s conflicts’ analysis did have an impact on the scholars’ theoretical views and more broadly what was its contribution to the regional understanding of international relations. The research is based upon comparative and historical-genetic methods as well as case studies. The major elements composing the scholars’ analysis of successes and failures in the path of West African integration are presented along with their appraisal of the ECOWAS security component. A comparison is made between their views and those of their regional colleagues belonging to other schools of thought as well as Western theories that had the greatest impact on these authors.
APA, Harvard, Vancouver, ISO, and other styles
4

S Ghosh, Partha. "Refugees and National Security: Two South Asian Case Studies." Artha - Journal of Social Sciences 18, no. 4 (October 1, 2019): 43–55. http://dx.doi.org/10.12724/ajss.51.3.

Full text
Abstract:
Among non-traditional threats to security, the problem of refugees is an important one. Because of political turmoil in several parts of the world, refugee flows are going beyond the capacity of the international system of handle. In South Asia, because of the ongoing conflict between two major nations, India and Pakistan, the issue assumes a serious dimension. We can understand this by studying the following two case studies: the Bangladesh war and the Afghan war. In both cases, the number of refugees was massive and in both cases, America was the principal external actor. But while in the case of Bengali refugees, the host state tried to take advantage of the situation for promoting its foreign policy goals, in the case of Afghan refugees, the host nation tried to use the situation to promote its foreign policy as well as domestic political goals. Although every host state had to face unforeseen consequences, in the long run, it underlines the relevance of the discourse of the refugee-security interface.
APA, Harvard, Vancouver, ISO, and other styles
5

Baldwin, David A. "Security Studies and the end of the Cold War." World Politics 48, no. 1 (October 1995): 117–41. http://dx.doi.org/10.1353/wp.1995.0001.

Full text
Abstract:
The end of the cold war has generated numerous reflections on the nature of the world in its aftermath. The reduced military threat to American security has triggered proposals for expanding the concept of national security to include nonmilitary threats to national well-being. Some go further and call for a fundamental reexamination of the concepts, theories, and assumptions used to analyze security problems. In order to lay the groundwork for such a reexamination, the emergence and evolution of security studies as a subfield of international relations is surveyed, the adequacy of the field for coping with the post—cold war world is assessed, and proposals for the future of security studies are discussed. It is argued that a strong case can be made for reintegration of security studies with the study of international politics and foreign policy.
APA, Harvard, Vancouver, ISO, and other styles
6

Farid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.

Full text
Abstract:
<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.</p><div><p class="Els-keywords">Keywords: Cybercrime, State Security, Human Security, Securitization</p></div>
APA, Harvard, Vancouver, ISO, and other styles
7

Farah, Paolo Davide. "Strategies to balance energy security, business, trade and sustainable development: selected case studies†." Journal of World Energy Law & Business 13, no. 2 (April 1, 2020): 95–99. http://dx.doi.org/10.1093/jwelb/jwaa011.

Full text
Abstract:
Abstract Energy is pivotal for socio-economic and cultural development. Last century witnessed a drastic increase, on one hand on the consumption of energy and, on the other on greenhouse gases emissions. Traditionally, energy security has been linked with the need to guarantee supply and, in turn, enables economic growth. Against this background, countries focused on diversifying both energy sources and trade partners while at the same time increasing investment in energy infrastructure and technology. Investment in low-carbon energy sources for enhancing national energy policies prompts for a new understanding of energy security. The aim is, in fact, not anymore limited to securing provision but also to strengthen diversification and counteract the negative effects of energy consumption on the environment. The need to include a sustainability component to energy in trade, business and in the society at large, is adding a further layer of complexity in shaping national and international energy policy. Strategies to balance energy security, business, trade, and sustainable development are urgently needed in the Anthropocene. Creative and innovative approaches to energy policy could be found in countries where energy consumption is on a steady rise and environmental degradation is crystal clear.
APA, Harvard, Vancouver, ISO, and other styles
8

Dilawar, Shahid, Asghar Khan, and Muhammad Nawaz Khan Jadoon. "A Gender Approach to Militancy (Extremism) in Pakistan –A Case Study of North-Western Region." Pakistan Journal of Gender Studies 18, no. 1 (March 8, 2019): 165–78. http://dx.doi.org/10.46568/pjgs.v18i1.31.

Full text
Abstract:
The agenda of gender and security in the debate of international relations has much to achieve yet. The notion is based on normative differences of feminism and realism. The former is a flag bearer of feminist agenda of political studies and the latter is a leading International Relations paradigm. There have been many case studies and accounts in which women as victims of conflicts are studied and their plights are analyzed, however, the role of women as ‘security agent’ had hardly been previously touched. The gender inequality worsens the situation in Pakistani society as it promotes radical/extremist tendency which subsequently poses immense security challenges to the social fabric. Due to lack of research on this particular issue, the study has been opted for further exploration. Pakistan being at the forefront in the war against terror since its onset in 2001, has predominantly a military based security agenda. However, the country with 52% of female population, makes it an appropriate case study to understand security and gender. This paper pertains to some conflict hit areas of Pakistan where women role has been analyzed as security agent. This paper is an attempt to explore and analyses the theoretical and academic debate of gender and security with particular reference to North-Western Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
9

Madeira, João Paulo. "Security Challenges for Small Island Developing States: The Case of Cape Verde." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 2 (February 28, 2020): 155–77. http://dx.doi.org/10.18359/ries.3756.

Full text
Abstract:
This article is an exploratory, descriptive study, with a qualitative and interdisciplinary approach. It integrates concepts and perspectives of contemporary history, international relations, and security studies. Its main aim is to analyse security issues in Africa, taking as a reference the Cape Verde archipelago, which is part of the group of Small Island Developing States. This matter suggests a wider multidimensional approach that prioritizes the intersection of data obtained from a critical analysis in order to deepen regional cooperation and integration mechanisms. This can provide the Cape Verdean state with strategic options to prevent and mitigate potential security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Misiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (December 16, 2022): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.1.

Full text
Abstract:
Energy security is the basic analytical category for this conducted study and its findings that are included in the article. This category defines the scope and the specific character of research and its relation to security studies. It is an important element of the epistemic layer of the conducted research. On the other hand, in terms of social reality and ontology, energy security is a foreign policy objective, an international value, and a dynamic process. It concerns various types of actors: from individuals to large social groups, institutions, states, nations, and international systems. Therefore, energy security policy aims to protect the state and society against numerous threats, the multitude, unpredictability, and complexity of which result from the polyarchic international system. The research objective of the study is to analyse the essence and specificity of energy security in the light of research on international security. Thus, various theoretical approaches, useful in the analysis of energy security issues, were taken into account. Their usefulness was also determined in the case of the analysis of the specificity of the contemporary energy market. The analysis allows us to conclude that energy security issues take into account long-term development trends as well as unpredictable events related to the functioning of energy market and energy technology. Thus, unexpected, sudden phenomena resulting from the dynamics of the international environment gain in importance. The dilemma related to non-linear thinking often ignores a variety of solutions that, taken together, can cause a radical turn in the energy security concept and its evolution.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security, International Case studies"

1

Kanchana, Kamonphorn. "Studies on Energy Security and International Relations: The Case of Regional Cooperation in Southeast Asia." Kyoto University, 2016. http://hdl.handle.net/2433/215646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, YuJane. "The economic security of Taiwan : a case study of cross-strait relations between Taiwan and China, 2000-2004." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:11083.

Full text
Abstract:
This thesis aims to demonstrate that economic security is also a significant pillar of safeguarding national security. Aside from military security measures, adopting peaceful economic engagement and economic measures can be an alternative security policy choice through which a state may achieve its national security agenda. To facilitate an understanding of economic security, this thesis submits a working definition of economic security, which has been delineated as 'the protection of a core value from all forms of potential or actualised threat by using economic measures and policies'. The core value refers to national interests and security Objectives. With this framework, the current thesis takes Taiwan as a case study to assess Taiwan's effort of implementing economic security strategy to accomplish its national security agenda within the context of the complex and hostile cross-Strait relations yet growing economic integration. This research intends to answer three categories of questions. Firstly, how large is the cost to Taiwan of pursuing economic security vis-a-vis China, and what is Taiwan's capability to afford such cost? Secondly, what factors would contribute to or undermine Taiwan's efforts in practising economic security, and to what extent? Thirdly, do cross-Strait economic ties strengthen or weaken Taiwan's economic security with respect to its economic performance, and to what extent? From three perspectives, this study analyses the above questions. Firstly, it analyses how Taiwan has employed economic power to construct its national security within the international system. Secondly, it examines how Taiwan has utilised economic measures to resist China's political and economic influence. Thirdly, from an economic perspective, it examines whether Taiwan's economic security objectives, in the context of its capability of sustaining economic prosperity, have been enhanced when it has engaged in economic exchange with China.
APA, Harvard, Vancouver, ISO, and other styles
3

Kettle, Louise. "Learning from history in British overseas security : case studies from intervention in the Middle East." Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/30575/.

Full text
Abstract:
Recent problematic military interventions, as part of the Global War on Terror, have led to widespread criticism that British policy-makers have failed to learn lessons from history. At the same time as the accusations of not learning, the British government has repeatedly claimed that lessons have been learned, particularly from the disastrous war in Iraq. This thesis investigates these contradicting claims by analysing learning from the past in the Foreign and Commonwealth Office, Ministry of Defence and the Intelligence Community across four case studies of British military intervention in the Middle East; 1958 in Jordan, 1961 in Kuwait, the 1990-1991 Gulf War and 2003-2009 Iraq War. It provides a fresh analysis of these highly significant events, using previously undisclosed documents, offers an assessment of learning processes and concludes by recommending practical suggestions for the improvement of learning from history in the future.
APA, Harvard, Vancouver, ISO, and other styles
4

Lucas, David Ryan. "Between Non-intervention and Protection: A study on the case of Darfur and the Responsibility to Protect." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/388.

Full text
Abstract:
This thesis explores the obstacles in establishing a consistent and effective response framework for humanitarian catastrophe and the importance of maintaining a sustained dialogue to this end. It does so by recognizing the underlying conflict between two positions: the norm of non-intervention of states into the affairs of others, and the protection of individuals caught in the middle of violent conflict. The importance of working towards a resolution of this conflict is illustrated through the case study of Darfur, where a divided international community led an insufficient response to the crisis that can ultimately be judged as a failure. Lastly, a recent attempt at reconciling the non-intervention/protection conflict is examined through the report of the Responsibility to Protect, which takes important steps in the direction of consensus, but ultimately suffers from inflated expectations regarding its scope or purpose.
APA, Harvard, Vancouver, ISO, and other styles
5

Julius, Paul Omoh. "Nigerian political elite’s perception and construction of security strategies 1999-2013 : the case of the Niger Delta oil conflict." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/33409/.

Full text
Abstract:
This study grounded within the discipline of conflict resolution in the field of international conflict is an empirical investigation and comprehensive analysis of the politics of security decision- making in an African petro-state called Nigeria. It explores how the Nigerian political elite perceive national security threat and the impact of this perception on the construction of security strategies in the oil producing Niger Delta region of the country. The study challenges the traditional thinking mode of national security and explores the transformative potential of the human security concept. In doing so, the study arrives at a central thesis that the specific interpretation of national security threat within the Nigerian political elite has escalated the level of insecurity in the state, especially in the Niger Delta region which is the research case study. The issues are addressed in eight chapters with the central themes of elite and security illustrated with theoretical as well as empirical accounts of the making of political elite and the roots of threat perception in Nigeria. By injecting a theoretical framework that comprises both discursive and non-discursive approaches through the two variants of securitisation theory - Copenhagen and Paris Schools, the study strips bare the security perception of the Nigerian political elite. Through qualitative and quantitative research methods, the study explored three different groups’ perceptions as its unit of analysis; and the specific nuances and commonalities within them analysed. The central hypothesis is that state institutions are not just a consequence of early historical conditions, but because agency and structure do evolve over time, the contingent processes and events such as natural resource discovery, nationalisation and the timing of key historical events create a set of governance resources, political economy incentives and elite culture that frames the behaviour of state actors and policy-makers. Nonetheless, these critical junctures may open windows of opportunity to push for a far-reaching changes in frameworks for decision-making and re-shape the mode of governance. The originality of the work is twofold. First, is its utility of an analytical framework that comprises both discursive and non-discursive practices as proposed by the Copenhagen and Paris Schools of securitisation theory to unravel elite perception of security. Second, is its application of a deconstructivist approach through qualitative data coding to analyse the evolving security dynamics in the Niger Delta of Nigeria. The study concludes that the lack of a process to allow the views of those who prioritise state security over citizens security, and those who view security the other way round to communicate and find a common ground is a major problem that needs to be overcome.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Kasaji, Mohannad K. "Evaluating the Jordanian National Security Strategy Toward the Palestinian_Jordanians (Palestinian_Jordanians as a Securitization Case-Study)." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/554.

Full text
Abstract:
In its approach to the Palestinian-Jordanians’ issue, this dissertation employs a security-based theory and technique, which deal with the issue as a securitization case-study. It employs a modified version of the securitization theory offered by the Copenhagen School to evaluate the classical Jordanian national security strategy toward Palestinian-Jordanians. It addresses, reviews, weighs and evaluates the four strategies and tools of the Jordanian securitization model toward Palestinian-Jordanians: exclusionism, tribalism, cooptation and ideologization, which present the independent variables of this study. This evaluation process is based on a multi-standard strategy, which discusses the goals, the evidence, the outputs and the structure of the Jordanian securitization model since Black September 1970. In terms of methodology, the dissertation adopted a multi-method strategy, which used field research, participant observation and elite interviewing as primary methods for data acquisition. In its security-based re-reading of the modern Jordanian history and its evaluation of the Jordanian national security strategy, the dissertation concludes that the Jordanian securitization model has led to a number of dangerous adverse reactions and hazards, which threaten Jordanian national security. The awakening of the extreme versions of nationalism, the rise of social/tribal violence and the emergence of the radical Islamist Salafi-Jihadi movement are examples of the hazardous outputs of the classical Jordanian national security strategy. Although the classical strategy has succeeded in maintaining the physical survival of the state/regime in Jordan since 1921, it has failed to cure the structural crises of statehood and nationhood, which the Jordanian state suffers from. Also, the classical strategy has failed to decisively answer the strategic questions of "what is Jordan?" and "who are Jordanians?". This strategic failure of the classical Jordanian national security strategy toward Palestinian-Jordanians rings alarm bells about the strategic and urgent need for an alternative national security strategy based on egalitarianism, modernism, populism and democratization.
APA, Harvard, Vancouver, ISO, and other styles
7

Theron, Jenny. "The commodification and commercialisation of peace operations and security co-operations : a case study of Operation Rachel /." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/2505.

Full text
Abstract:
Thesis (MA (Political Science. International Studies))--Stellenbosch University, 2005.
Peace operations and security co-operations are expensive. Even though there are a variety of factors that influences peace agents when they consider approving a new, expanding an existing, or closing down a peace operation or security co-operation, one of these factors is the cost factor. If we were to isolate the cost factor it would follow that a reduction in the cost of peace operations and security co-operations, are likely to contribute to peace agents being more willing to approve new, expand existing or to give existing missions more time to consolidate before closing them down. There are a variety of ways how the cost of peace operations or security co-operations can be lowered. This thesis suggests an alliance with the private sector in the form of corporate sponsorships. In short, that peace operations and security co-operations be commodified and commercialised. This would entail introducing corporate sponsorship of some of the commodities that are used in peace operations and security co-operations, followed by the corporate sponsor using their involvement in the peace operation or security co-operation to their commercial advantage. The commodification and commercialisation of peace operations and security co-operations should result in the relevant operations and co-operations benefiting in a cost-effective as well as practical effectiveness sense, whereas the private sponsor should benefit in either or both a financial (profit) or an image-making sense. The psychological theory supporting such an argument is that of social identity theory. This theory explains how positive connotations made with peacemaking in warlike conditions will motivate industries to use this opportunity to show that their products can succeed in such demanding circumstances. Accordingly, social identity theory provides us with evidence as to how the commercialisation and commodification of peace operations and security co-operations can succeed. We also support our argument by providing a case study, Operation Rachel, which serves as a successful example of an operation that was (partially) commodified and commercialised. Operation Rachel, which can be seen as either or both a peace operation and security co-operation, shows that in the case of security co-operations, these operations should be presented as peace operations during the commodification and commercialisation processes.
APA, Harvard, Vancouver, ISO, and other styles
8

Olivier, Laetitia. "Pursuing human security in Africa through developmental peace missions : ambitious construct or feasible ideal?" Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/4080.

Full text
Abstract:
Thesis (MMil (Military Sciences. School for Security and Africa Studies))--Stellenbosch University, 2008.
ENGLISH ABSTRACT: This thesis explores the feasibility of the concept Developmental Peace Missions (DPMs). It seeks to answer the question whether DPMs is an ambitious construct or a feasible ideal and whether DPMs could be effectively applied during peace missions. The study takes the form of a descriptive analysis of the theoretical underpinnings of the concept of DPMs, and includes the analysis of various relevant case studies in terms of the application of the concept of DPMs. The study further explores the evolution that has taken place in terms of United Nations peace missions, in that most modern peace missions include both peacekeeping and peacebuilding initiatives. The study also illustrates the modern approach to peace missions, based on an integrated systems-thinking approach by means of which the activities of all relevant role-players are integrated and fused towards a common end state: that of sustained security and development. In order to analyse the concept of DPMs, the theoretical underpinnings of the concept human security, the security-development nexus and peacebuilding were researched in depth. These concepts were then coupled to the concept of DPMs in terms of their utility during current complex peace missions, both internationally and on the African continent. The concept of DPMs was studied in the context of contemporary peacekeeping in terms of three case studies, namely the peace missions in Kosovo, Sierra Leone and the DRC. The DPMs concept was applied to these case studies and analysed in terms of the extent to which the peace interventions in these countries were conducted in accordance with the philosophical and theoretical underpinnings of DPMs. The study concludes that DPMs, in terms of its theoretical basis, is indeed a feasible ideal for peace missions, as it is based on and in line with the approved current UN- and AU-integrated planning processes. However, in terms of its practical utility in Africa, it currently remains an ambitious construct, given the limited capacity and resources of the AU and regional organisations. Therefore, DPMs should not be viewed as a short-term solution to, or panacea for, all intra-state wars. The study proposes that the UN, the AU, as well as relevant regional organisations will have to adjust and make changes in terms of their institutions, structures, funding and the provision of resources in order to operationalise the concept of DPMs successfully. This is especially true as far as the AU is concerned, as the AU currently experiences severe limitations in both material and human resources. However, the fact that both the UN and the AU have adopted the Integrated Mission Planning Process concept as planning tool for their respective missions is an indication that progress is being made towards the achievement of establishing a more holistic and integrated approach to finding sustainable solutions to global conflict. Ultimately, the success of DPMs will be determined by the will and commitment of all the relevant role-players involved in finding a lasting solution to intra-state conflicts. The concept itself cannot provide sustainable peace and development.
AFRIKAANSE OPSOMMING: Dié tesis verken die lewensvatbaarheid van die begrip Ontwikkelingsvredesendings. Daar sal gepoog word om ‘n antwoord te kry op die vraag of Ontwikkelingsvredesendings ‘n ambisieuse konstruk of ‘n haalbare ideal is. Verder sal gepoog word om te bepaal of dit effektief tydens vredesoperasies toegepas kan word. Die studie neem die vorm aan van ‘n beskrywende analise van die teoretiese grondbeginsels van die begrip Ontwikkelingsvredesendings en sluit die analise van verskeie relevante gevallestudies ten opsigte van die begrip in. Die studie ondersoek die evolusie wat plaasgevind het ten opsigte van vredesendings wat deur die Verenigde Nasies (VN) onderneem word, naamlik dat die meeste moderne vredesendings, vredesbewarings, sowel as vredesbou (nasiebou) inisiatiewe insluit. Die studie illustreer ook die moderne benadering wat ten opsigte van vredesendings toegepas word, naamlik dat die aktiwiteite van al die betrokke rolspelers geïntegreer word en op ‘n gedeelde einddoel gefokus word. Die teoretiese grondstelllings van die begrippe veiligheid en ontwikkeling, die veiligheid-ensekuriteit- neksus, sowel as die begrip van vredesbou (nasiebou) is in diepte ondersoek ten einde die begrip Ontwikkelingsvredesendings te analiseer. Hierdie begrippe is daarna in verband gebring met die begrip Ontwikkelingsvredesendings soos wat dit tans tydens moderne komplekse vredesendings toegepas word – beide internasionaal sowel as op die Afrika kontinent. Die begrip Ontwikkelingsvredesendings is bestudeer teen die agtergrond van eietydse vredesbewaring ten opsigte van drie gevallestudies, naamlik die intervensies in Kosovo, Sierra Leone en die Demokratiese Republiek van die Kongo. Hierdie drie gevallestudies is gekies aangesien dit die eerste sendings was waartydens die VN die nuwe geïntegreerde benadering tot vredesendings, soos in die Brahimi-verslag aanbeveel, toegepas is. Die studie het bevind dat Ontwikkelingsvredesendings, wat betref die teoretiese grondstellings inderdaad uitvoerbaar is, aangesien dit gebaseer is op en in ooreenstemming is met die huidige aanvaarde beplanninsprosesse van die VN en die AU. Maar, wat betref die praktiese bruikbaarheid van die begrip in Afrika, bly dit tans ‘n ambisieuse konstruk, gegewe die beperkte vermoë en hulpbronne van die AU en streeksorganisasies. Die begrip Ontwikkelingsvredesendings moet dus nie as ‘n korttermynoplossing vir alle interne oorloë beskou word nie. Die studie het bevind dat die VN, die AU, sowel as die betrokke streeksorganisasies, ingrypende veranderings sal moet ondergaan ten einde die begrip Ontwikkelingsvredesendings suksesvol te kan toepas, veral ten opsigte van strukture, befondsing en die voorsiening van hulpbronne. Dit is veral waar in die geval van die AU, aangesien die AU tans geweldige uitdagings in die gesig staar wat betref menslike sowel as materiële hulpbronne. Ten spyte van laasgenoemde uitdagings dui die aanvaarding van die Geïntegreerde Sendingbeplanningsproses as besluitnemings-meganisme deur beide die VN en die AU op die vordering wat gemaak word ten opsigte van die daarstelling van ‘n meer holistiese en geïntegreerde benadering vir volhoubare oplossings vir konflik. Die sukses van Ontwikkelingsvredesendings sal uiteindelik bepaal word deur die wil en toewyding van alle betrokkenes by die soeke na langdurige vrede – die begrip op sigself kan nie volhoubare vrede en ontwikkeling bewerkstellig nie.
APA, Harvard, Vancouver, ISO, and other styles
9

Matthews, Danielle Tianne. "Dedicated to Norms of Interests? A Comparative Case Study of the United Nations Security Council Reactions in Authorizing Humanitarian Intervention in the Rwandan and Sudanese Genocides." Thesis, Webster University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1523364.

Full text
Abstract:

This thesis addresses the role of geopolitical interests in the voting record of the UNSC (UNSC) in authorizing action, specifically humanitarian intervention, in the cases of genocide in Rwanda and Sudan. The classic theories of international relations, realism and liberalism, are applied to determine which theory has higher explanatory power in determining the level of involvement and humanitarian intervention by the UNSC in these specific cases. Realist assumptions would expect that the possible economic or strategic interests of states within the Council would influence the level of involvement or humanitarian intervention authorized. In contrast, liberalist notions would expect that the level of conflict severity or duration would determine the level of involvement or humanitarian intervention authorized. This thesis finds that the economic and strategic interests of the members of the UNSC can serve as a better indicator in determining the level of intervention authorized in these cases. Thus, realist theory holds higher explanatory power of the UNSC reactions to the cases of Rwanda and Sudan.

APA, Harvard, Vancouver, ISO, and other styles
10

Lewis, Olivier Rémy Tristan David. "Explaining military, law enforcement and intelligence cooperation between Western states." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/16419.

Full text
Abstract:
This thesis answers the question “Why does security cooperation occur between Western states?”. The basic answer is: “Because most state actors do not want their states to integrate”. In other words, cooperation occurs as a coping mechanism, as an imperfect substitute for integration. But the thesis does not only investigate the reasons for cooperation, what Aristotle called the final cause. The thesis also examines the material, formal and efficient causes of cooperation. Such an unorthodox causal explanation of cooperation is based on a Critical Realist philosophy of social science. The application of this philosophy to the empirical study of International Relation is rare, making this thesis original. Beyond the philosophy of social science, the thesis' research design, many of the cases, and much of the data are also rarely used. The research design is an embedded multiple-case study. The states studied are the United States of America, France and Luxembourg. Within each state, the embedded subcases are three types of state security organisations: the armed forces, law enforcement and intelligence agencies. Rarely have these three types of security organisations been compared. Similarly, Luxembourg is seldom studied. Comparing different types of states and different types of state security organisations has not only allowed the main research question to be answered. It has also allowed temporal, spatial, national, and functional variation in cooperation to be identified and theorised. The empirical evidence studied includes participant observation (at the North Atlantic Treaty Organisation) and documents (e.g. state policy documents, annual reports by organisations, reports by parliaments and non-governmental organisations, autobiographies, books by investigative journalists, articles by newspapers and magazines). The thesis is also based on a score of elite interviews (e.g. with ambassadors, diplomatic liaisons, ministerial advisors, foreign ministry officers, military commanders, etc.), and the careful study of both declassified and classified archival records.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security, International Case studies"

1

James, Midgley, and Tracy Martin, eds. Challenges to social security: An international exploration. Westport, Conn: Auburn House, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security and development. New York: Berghahn Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Clements Kevin, Ward Robin, and Evans Gareth J. 1944-, eds. Building international community: Cooperating for peace : case studies. Canberra, ACT: Allen & Unwin in association with the Peace Research Centre, RPSAS, ANU, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Comparative regional security governance. New York: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alava, Henni. Exploring the security-development nexus: Perspectives from Nepal, northern Uganda and "Sugango". Edited by Finland Ulkoasiainministeriö. Helsinki]: Ministry for Foreign Affairs, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1967-, Dominguez Roberto, ed. The security governance of regional organizations. New York: Routledge, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

James, Midgley, and Sherraden Michael W. 1948-, eds. Alternatives to social security: An international inquiry. Westport, Conn: Auburn House, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Militarism and international relations: Political economy, security and theory. New York: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emilio, Viano, ed. Global organized crime and international security. Aldershot, Hants, England: Ashgate, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Onoja, Lawrence Anebi. Peace-keeping and international security in a changing world. Jos, Plateau State: Mono Expressions, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security, International Case studies"

1

Mottaleb, Khondoker Abdul. "Impacts of Transboundary Crop Diseases on Sustainable Crop Production: The Case of Maize Lethal Necrosis (MLN) in Africa." In Emerging-Economy State and International Policy Studies, 163–79. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5542-6_13.

Full text
Abstract:
AbstractMore than half of the world’s population relies on wheat, maize, and rice for their daily dietary energy. In 2019, the daily per person average calorie intake was 2,963 kilocalories (kcal), in which the share was more than 18.2% (538 kcal) for wheat, 5.4% (159 kcal) for maize, and 18.3% (542 kcal) for rice. It is projected that by 2050, the total global population is expected to reach between 8.9 and 10.6 billion from 7.8 billion in 2020. Thus, it will be imperative to produce more wheat, maize, and rice to ensure the food security of the world’s burgeoning population. While it is imperative to produce more food, the emergence and re-emergence of lethal crop diseases and their spread from the epicenters to new regions continuously threaten crop yield, farmers’ income, and the world’s food security. For example, the emergence of maize lethal necrosis (MLN) in Africa has generated a credible threat to global and African food security. This study quantified MLN-induced maize production loss in Kenya, DR Congo, and Tanzania. Applying the time-series projection method, this study estimates that the loss in maize production due to MLN was 442 thousand tons in Kenya, nearly 12 thousand tons in DR Congo, and 663 thousand tons in Tanzania. As more pest- and disease-related crop losses are expected due to the changes in global climate, this study concludes by suggesting that it is imperative to invest more in research and development of disease-resistant crop varieties globally to ensure food and nutrition security, particularly in the global south.
APA, Harvard, Vancouver, ISO, and other styles
2

Bergamini, Elisabetta, Francesca Jacobone, Donato Morea, and Giacomo Primo Sciortino. "The Increasing Risk of Space Debris Impact on Earth: Case Studies, Potential Damages, International Liability Framework and Management Systems." In Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference, 271–80. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91791-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Spanier, Benny. "Freedom of Navigation in the Suez Canal and the Channels: Law of the Sea." In Palgrave Studies in Maritime Politics and Security, 117–33. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-15670-0_6.

Full text
Abstract:
AbstractThe chapter examines the status of international canals and straits connecting Two Parts of the High Seas under the Law of the Sea. Strait is a natural phenomenon, while a canal is artificial. At the same time, having a similar role and designation—a passage between seas—one could assume that their legal status, as far as freedom of navigation is concerned, would be the same. Straits have been extensively and comprehensively dealt with over the years by littoral nations, and today there is a complete and innovative chapter on this subject in the 1982 United Nations Convention on the Law of the Sea. However, the Convention is silent on canals. In the first part of the chapter, the terms “strait” and “canal” will be defined with an emphasis on the Suez Canal with regard to the right to freedom of navigation. The second part will describe the development of the right to freedom of navigation in the Suez Canal and the straits. One can see that while with straits there has been, over the years, a process of development with regard to navigation rights in the Law of the Sea, this is not the case with regard to canals subject to specific conventions, and specifically, the Suez Canal. The third part of the chapter will be devoted to a discussion leading to some conclusions on the differences between the two passages, which will assess whether these differences have future significance in the particular context of the Suez Canal.
APA, Harvard, Vancouver, ISO, and other styles
4

Dietrich, Christopher R. W. "Suez and the United States: Oil, Lifelines, and “All of Mankind” in the Cold War." In Palgrave Studies in Maritime Politics and Security, 71–93. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-15670-0_4.

Full text
Abstract:
AbstractThis chapter analyzes the rhetoric and policy of U.S. officials regarding oil and the Suez Canal during the early Cold War. When William J. Casey warned experts that the 1970s energy crisis was “a strategy of progressive strangulation” and that American military power was the best response, he drew on a decades-long set of beliefs that identified the Suez Canal as an artery for the economic health of “the West.” According to that perspective—which took root after World War II and drew on earlier strategic discourses of the British Empire—the supply of cheap oil was crucial to the political-economic health and national security of the capitalist world. Beginning with the threat of economic nationalism and the creation of the concepts of a “world oil market” and interdependence, that powerfully ingrained perception is critical to our understanding of twentieth century international history.
APA, Harvard, Vancouver, ISO, and other styles
5

Viegas, Virgilio, and Oben Kuyucu. "Case Studies." In IT Security Controls, 245–62. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hartung, William D. "International arms trade." In Security Studies, 467–81. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hafner, Manfred, and Pier Paolo Raimondi. "Energy and the Economy in Europe." In The Palgrave Handbook of International Energy Economics, 731–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86884-0_36.

Full text
Abstract:
AbstractEurope’s energy landscape is characterized by a great heterogeneity due to differences in terms of population, economy, energy resources (availability of different energy sources) and differing policies in favor or against specific energy sources. Over the decades, the European energy mix has undergone important transformations. The EU set an energy policy framework based on three pillars (security of supply, competitiveness and sustainability) with the goal to address three different priorities: competitiveness (affordable prices), security (of energy supply) and sustainability (clean energy). These three pillars appear to pursue contradictory goals, especially in the short term, but they are seen as converging in the longer term. This chapter aims to analyze how these different objectives have been key drivers of the European energy policy and economics. To illustrate this, the authors also present five case studies: the United Kingdom, Italy, France, Germany and Poland. Lastly, the chapter presents the “European Green Deal”, whose ultimate goal is to reach carbon-neutrality by 2050. The chapter analyzes how a climate-neutrality goal requires a substantial transformation of the EU economy, which comes with some internal and external frictions.
APA, Harvard, Vancouver, ISO, and other styles
8

Ryan, Matthew. "Ransomware Case Studies." In Advances in Information Security, 65–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66583-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Laobing, and Genserik Reniers. "Case Studies." In Advanced Sciences and Technologies for Security Applications, 111–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92618-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Flouros, Floros. "Case Studies." In Energy Security in the Eastern Mediterranean Region, 145–75. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09603-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security, International Case studies"

1

Jones, Micah, and Kevin W. Hamlen. "Enforcing IRM security policies: Two case studies." In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/isi.2009.5137306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gao, Chao, Lan Luo, Yue Zhang, Bryan Pearson, and Xinwen Fu. "Microcontroller Based IoT System Firmware Security: Case Studies." In 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, 2019. http://dx.doi.org/10.1109/icii.2019.00045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Kai, Alexandra Smith, Adam Zimmel, Korina Alcantara, and Yong Wang. "Medical Device Security Regulations and Assessment Case Studies." In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 2022. http://dx.doi.org/10.1109/mass56207.2022.00116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morrison, Patrick, Benjamin H. Smith, and Laurie Williams. "Measuring Security Practice Use: A Case Study at IBM." In 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in Industry (CESI). IEEE, 2017. http://dx.doi.org/10.1109/cesi.2017.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mouhtaropoulos, Antonis, Panagiotis Dimotikalis, and Chang-Tsun Li. "Applying a Digital forensic readiness framework: Three case studies." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oda, S. Michelle, Huirong Fu, and Ye Zhu. "Enterprise information security architecture a review of frameworks, methodology, and case studies." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec." In The 6th International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001732900030012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O'Brien, Brianne F., Anita D'Amico, and Mark E. Larkin. "Technology transition of network defense visual analytics: Lessons learned from case studies." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harrell, Christopher R., Mark Patton, Hsinchun Chen, and Sagar Samtani. "Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions." In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clark, Jason W. "Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage." In 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security, International Case studies"

1

Amar Flórez, Darío. International Case Studies of Smart Cities: Medellin, Colombia. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gutiérrez Bayo, Jaime. International Case Studies of Smart Cities: Santander, Spain. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Toch, Eran, and Eyal Feder. International Case Studies of Smart Cities: Tel Aviv, Israel. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Inkret, Lisa, and John Scott. National Security & International Studies Quarter 1 2021 Newsletter. Office of Scientific and Technical Information (OSTI), January 2021. http://dx.doi.org/10.2172/1760560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Singapore, Republic of Singapore. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Anyang, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Songdo, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, and Jongbok Kim. International Case Studies of Smart Cities: Pangyo, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schreiner, Clara. International Case Studies of Smart Cities: Rio de Janeiro, Brazil. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Namyangju, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography