Journal articles on the topic 'Security, International Case studies'

To see the other types of publications on this topic, follow the link: Security, International Case studies.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security, International Case studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

kunz, Waldemar. "The European Case for International Security." Security Dimensions 41, no. 41 (July 29, 2022): 52–71. http://dx.doi.org/10.5604/01.3001.0015.9447.

Full text
Abstract:
Armed conflicts between states and friction within international organizations, not forgetting wars in the economic-technological, and economic-commercial dimension, including issues related to natural resources, raw materials, and energy, are part of an attempt to position elites in a new axiological-political space. This article takes up the complex and contentious issue of the security crisis in the European dimension, with an emphasis on international and transnational issues, while focusing on the transformation of the existing political, social, axiological, and cultural order. In other words, the issue concerns the new paradigm of civilization, which has been taking shape on a global scale since the turn of the 20th and 21st centuries. The main intention and purpose of the study is to present the complex problem of specificity of the European security, pointing to the processes and phenomena that change the architecture of the world order, taking into account the international, transnational, and migration contexts. As far as the diagnosis of the current international situation is concerned, it concerns the conviction about the regression of the old civilization and cultural patterns, valid in the 19th and 20th century, and the formation of a new paradigm from the turn of the 20th and 21st century (until 2019), determining the economy, politics, and society.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Abhishek Narain, and M. P. Gupta. "Information Security Management Practices: Case Studies from India." Global Business Review 20, no. 1 (November 9, 2017): 253–71. http://dx.doi.org/10.1177/0972150917721836.

Full text
Abstract:
In recent years, information security has gained attention in organizations across diverse businesses and sectors. Primary reasons of this can be the new and innovative ways of information handling (during generation, processing, storage and distribution), and dependence of business processes on new and emerging IT/ICT mediums in organizations to carry out daily business activities. This has made organizations agile in terms of functioning and, at the same time, has posed new challenges. In this direction, the present study aims to explore and examine information security management (ISM) practices of two IT development and services organizations in India. In case study design, the study adopts qualitative research route to understand the current ISM practices of the case organizations. The observations derived from semi-structured interviews are presented using descriptive analysis methodology. Further, SAP-LAP (Situation, Actor, Process—Learning, Action, Performance) method of inquiry is used to analyse the findings from case studies. Results highlight the importance of consistent top management support, organizational information security culture and a proper monitoring system for ISM effectiveness in organizations. Insights derived from the study can be helpful for managers and decision makers in managing organizational information security practices.
APA, Harvard, Vancouver, ISO, and other styles
3

Shipilov, Alexander Yurievich. "West African International Studies: Approaches to Regional Security." Vestnik RUDN. International Relations 19, no. 2 (December 15, 2019): 207–17. http://dx.doi.org/10.22363/2313-0660-2019-19-2-207-217.

Full text
Abstract:
This article covers the most significant theoretical schools in West Africa in the framework of the international relations analysis, with special focus on the regional security. Major respective theoretical approaches to the given issues are assessed based on the writings of local experts that frequently reevaluate the major articles of faith connected with neo-Realist, neo-Liberal and Marxist views. Particular attention is drawn to the examination of various interpretations of the role that belongs to supranational regional structures in West African conflict resolution using the case of the Liberian civil war. The most crucial part of the research presented is an analysis of publications issued by Adekye Adebajo and Ismail Rashid, two leading West African specialists in the field of regional security. Their appraisal of collective security mechanisms’ perspectives in the most poverty-stricken and unstable regions of the world is elaborated upon. The aim of the article is to determine the extent of uniqueness present in Adebajo and Rashid’s approaches compared to their Western and African colleagues but also to figure how West African 1990-2000’s conflicts’ analysis did have an impact on the scholars’ theoretical views and more broadly what was its contribution to the regional understanding of international relations. The research is based upon comparative and historical-genetic methods as well as case studies. The major elements composing the scholars’ analysis of successes and failures in the path of West African integration are presented along with their appraisal of the ECOWAS security component. A comparison is made between their views and those of their regional colleagues belonging to other schools of thought as well as Western theories that had the greatest impact on these authors.
APA, Harvard, Vancouver, ISO, and other styles
4

S Ghosh, Partha. "Refugees and National Security: Two South Asian Case Studies." Artha - Journal of Social Sciences 18, no. 4 (October 1, 2019): 43–55. http://dx.doi.org/10.12724/ajss.51.3.

Full text
Abstract:
Among non-traditional threats to security, the problem of refugees is an important one. Because of political turmoil in several parts of the world, refugee flows are going beyond the capacity of the international system of handle. In South Asia, because of the ongoing conflict between two major nations, India and Pakistan, the issue assumes a serious dimension. We can understand this by studying the following two case studies: the Bangladesh war and the Afghan war. In both cases, the number of refugees was massive and in both cases, America was the principal external actor. But while in the case of Bengali refugees, the host state tried to take advantage of the situation for promoting its foreign policy goals, in the case of Afghan refugees, the host nation tried to use the situation to promote its foreign policy as well as domestic political goals. Although every host state had to face unforeseen consequences, in the long run, it underlines the relevance of the discourse of the refugee-security interface.
APA, Harvard, Vancouver, ISO, and other styles
5

Baldwin, David A. "Security Studies and the end of the Cold War." World Politics 48, no. 1 (October 1995): 117–41. http://dx.doi.org/10.1353/wp.1995.0001.

Full text
Abstract:
The end of the cold war has generated numerous reflections on the nature of the world in its aftermath. The reduced military threat to American security has triggered proposals for expanding the concept of national security to include nonmilitary threats to national well-being. Some go further and call for a fundamental reexamination of the concepts, theories, and assumptions used to analyze security problems. In order to lay the groundwork for such a reexamination, the emergence and evolution of security studies as a subfield of international relations is surveyed, the adequacy of the field for coping with the post—cold war world is assessed, and proposals for the future of security studies are discussed. It is argued that a strong case can be made for reintegration of security studies with the study of international politics and foreign policy.
APA, Harvard, Vancouver, ISO, and other styles
6

Farid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.

Full text
Abstract:
<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.</p><div><p class="Els-keywords">Keywords: Cybercrime, State Security, Human Security, Securitization</p></div>
APA, Harvard, Vancouver, ISO, and other styles
7

Farah, Paolo Davide. "Strategies to balance energy security, business, trade and sustainable development: selected case studies†." Journal of World Energy Law & Business 13, no. 2 (April 1, 2020): 95–99. http://dx.doi.org/10.1093/jwelb/jwaa011.

Full text
Abstract:
Abstract Energy is pivotal for socio-economic and cultural development. Last century witnessed a drastic increase, on one hand on the consumption of energy and, on the other on greenhouse gases emissions. Traditionally, energy security has been linked with the need to guarantee supply and, in turn, enables economic growth. Against this background, countries focused on diversifying both energy sources and trade partners while at the same time increasing investment in energy infrastructure and technology. Investment in low-carbon energy sources for enhancing national energy policies prompts for a new understanding of energy security. The aim is, in fact, not anymore limited to securing provision but also to strengthen diversification and counteract the negative effects of energy consumption on the environment. The need to include a sustainability component to energy in trade, business and in the society at large, is adding a further layer of complexity in shaping national and international energy policy. Strategies to balance energy security, business, trade, and sustainable development are urgently needed in the Anthropocene. Creative and innovative approaches to energy policy could be found in countries where energy consumption is on a steady rise and environmental degradation is crystal clear.
APA, Harvard, Vancouver, ISO, and other styles
8

Dilawar, Shahid, Asghar Khan, and Muhammad Nawaz Khan Jadoon. "A Gender Approach to Militancy (Extremism) in Pakistan –A Case Study of North-Western Region." Pakistan Journal of Gender Studies 18, no. 1 (March 8, 2019): 165–78. http://dx.doi.org/10.46568/pjgs.v18i1.31.

Full text
Abstract:
The agenda of gender and security in the debate of international relations has much to achieve yet. The notion is based on normative differences of feminism and realism. The former is a flag bearer of feminist agenda of political studies and the latter is a leading International Relations paradigm. There have been many case studies and accounts in which women as victims of conflicts are studied and their plights are analyzed, however, the role of women as ‘security agent’ had hardly been previously touched. The gender inequality worsens the situation in Pakistani society as it promotes radical/extremist tendency which subsequently poses immense security challenges to the social fabric. Due to lack of research on this particular issue, the study has been opted for further exploration. Pakistan being at the forefront in the war against terror since its onset in 2001, has predominantly a military based security agenda. However, the country with 52% of female population, makes it an appropriate case study to understand security and gender. This paper pertains to some conflict hit areas of Pakistan where women role has been analyzed as security agent. This paper is an attempt to explore and analyses the theoretical and academic debate of gender and security with particular reference to North-Western Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
9

Madeira, João Paulo. "Security Challenges for Small Island Developing States: The Case of Cape Verde." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 2 (February 28, 2020): 155–77. http://dx.doi.org/10.18359/ries.3756.

Full text
Abstract:
This article is an exploratory, descriptive study, with a qualitative and interdisciplinary approach. It integrates concepts and perspectives of contemporary history, international relations, and security studies. Its main aim is to analyse security issues in Africa, taking as a reference the Cape Verde archipelago, which is part of the group of Small Island Developing States. This matter suggests a wider multidimensional approach that prioritizes the intersection of data obtained from a critical analysis in order to deepen regional cooperation and integration mechanisms. This can provide the Cape Verdean state with strategic options to prevent and mitigate potential security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Misiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (December 16, 2022): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.1.

Full text
Abstract:
Energy security is the basic analytical category for this conducted study and its findings that are included in the article. This category defines the scope and the specific character of research and its relation to security studies. It is an important element of the epistemic layer of the conducted research. On the other hand, in terms of social reality and ontology, energy security is a foreign policy objective, an international value, and a dynamic process. It concerns various types of actors: from individuals to large social groups, institutions, states, nations, and international systems. Therefore, energy security policy aims to protect the state and society against numerous threats, the multitude, unpredictability, and complexity of which result from the polyarchic international system. The research objective of the study is to analyse the essence and specificity of energy security in the light of research on international security. Thus, various theoretical approaches, useful in the analysis of energy security issues, were taken into account. Their usefulness was also determined in the case of the analysis of the specificity of the contemporary energy market. The analysis allows us to conclude that energy security issues take into account long-term development trends as well as unpredictable events related to the functioning of energy market and energy technology. Thus, unexpected, sudden phenomena resulting from the dynamics of the international environment gain in importance. The dilemma related to non-linear thinking often ignores a variety of solutions that, taken together, can cause a radical turn in the energy security concept and its evolution.
APA, Harvard, Vancouver, ISO, and other styles
11

Hussain, Nazir. "THE ROLE OF INTERNATIONAL RELATIONS AND STRATEGIC STUDIES IN CONTEMPORARY SOCIAL SCIENCES: A CASE STUDY OF PAKISTAN." Journal of Social Sciences and Humanities 54, no. 1 (June 30, 2015): 41–51. http://dx.doi.org/10.46568/jssh.v54i1.161.

Full text
Abstract:
Since the establishment of International Relations as an academic discipline in 1918, it has undergone great transformations. The end of World War-II with devastated nuclear technology brought forth national security perspectives impacting the study of IR and giving birth to strategic and security studies as specialized sub-disciplines. Presently the discipline of IR has very distinct and specialized sub-disciplines such as Strategic Studies, Security Studies, Peace and Conflict Resolution and Area Studies. In Pakistan, the first institute dealing with international affairs was established in 1947 and the first teaching department at Karachi University was formed in 1958. However, it suffered due to general apathy by the governments and public alike. In 1970s, Pakistan’s security matrix compelled to create Area Study Centers and Strategic Studies departments. Later, in early 2000s, electronic media played an important role in popularizing these disciplines. Lately, the HEC has established a Consortium of Social Sciences Universities in Pakistan to elevate the status of Social Sciences and launched various scholarship schemes to meet the challenge of qualified human resource. However, there is a need to establish an Academy of Social Sciences and a National Society of International Relations to promote these disciplines on strong financial and institutional footings.
APA, Harvard, Vancouver, ISO, and other styles
12

Marhold, Anna-Alexandra. "Unpacking the Concept of ‘Energy Security’: Lessons from Recent WTO Case Law." Legal Issues of Economic Integration 48, Issue 2 (May 1, 2021): 147–70. http://dx.doi.org/10.54648/leie2021009.

Full text
Abstract:
‘Energy security’ is a crucial concept in international relations, as well as in international (economic) law. Although no international legal definition of this multi-layered notion exists, and the concept has been recognized as ‘vague’ in international relations literature, it remains a term that is used time and again by states when referring to measures taken in connection with safeguarding their national energy supply. This contribution identifies the various dimensions of the concept of energy security, after which it studies its role in international (economic) law and zooms in on the World Trade Organization (WTO). It critically assesses how the panel and Appellate Body (AB) have dealt with WTO Members’ arguments connected to energy security in two recent WTO disputes, India – Solar Cells and EU – Energy Package. The article demonstrates that while energy security concerns may be a valid basis for defending a Member’s measure, they will not hold if that measure is applied in a discriminatory manner. This may be problematic, as energy security concerns are frequently geo-political in nature and may be inherently discriminatory. The contribution also explains why ‘long-term energy security’ defenses are more likely to meet the threshold of the Article XIV(a) General Agreement on Trade in Services (GATS) public policy exception, rather than the ‘products in local short supply’ exception of Article XX(j) GATT. Energy Security, ECT, IEA, OPEC, PTAs, WTO, dispute settlement, public policy exception, local short supply
APA, Harvard, Vancouver, ISO, and other styles
13

Albert, Craig, Amado Baez, and Joshua Rutland. "Human security as biosecurity." Politics and the Life Sciences 40, no. 1 (2021): 83–105. http://dx.doi.org/10.1017/pls.2021.1.

Full text
Abstract:
AbstractResearch within security studies has struggled to determine whether infectious disease (ID) represents an existential threat to national and international security. With the emergence of SARS-CoV-2 (COVID-19), it is imperative to reexamine the relationship between ID and global security. This article addresses the specific threat to security from COVID-19, asking, “Is COVID-19 a threat to national and international security?” To investigate this question, this article uses two theoretical approaches: human security and biosecurity. It argues that COVID-19 is a threat to global security by the ontological crisis posed to individuals through human security theory and through high politics, as evidenced by biosecurity. By viewing security threats through the lens of the individual and the state, it becomes clear that ID should be considered an international security threat. This article examines the relevant literature and applies the theoretical framework to a case study analysis focused on the United States.
APA, Harvard, Vancouver, ISO, and other styles
14

CASIS. "The Security Implications of Brexit." Journal of Intelligence, Conflict, and Warfare 3, no. 1 (May 30, 2020): 5. http://dx.doi.org/10.21810/jicw.v3i1.2358.

Full text
Abstract:
On February 20th, 2020, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its second roundtable in 2020 in partnership with the Vancouver Branch of the Canadian International Council (CIC), titled: The Security Implications of Brexit. This presentation featured British Consul General Nicole Davison as speaker, and a case study focusing on the potential implications of the “Wexit” separatist movement on the West Coast of Canada.
APA, Harvard, Vancouver, ISO, and other styles
15

van Munster, Rens. "On whiteness in critical security studies: The case of nuclear weapons." Security Dialogue 52, no. 1_suppl (October 26, 2021): 88–97. http://dx.doi.org/10.1177/09670106211015029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Vashakmadze, Mindia. "Legality of Foreign Military Intervention in International Law: Four Case Studies." Max Planck Yearbook of United Nations Law Online 18, no. 1 (2014): 462–506. http://dx.doi.org/10.1163/18757413-00180016.

Full text
Abstract:
Foreign military intervention in internal conflicts remains an important feature of today’s international relations. At the same time, the paradigms of interventions in international law are changing. In today’s world, questions related to legality and legitimacy of foreign military interventions are more often raised than ever. However, in many cases, there is a gap between legality and legitimacy of such interventions. Concepts such as humanitarian intervention and the responsibility to protect attempted to bridge this gap; however, both concepts remain contested. Complex questions of substantive law and the institutional framework of collective security are discussed in this context. Meanwhile, classic exceptions to the general prohibition on the use of force, such as self-defence, are broadly interpreted. Certain States aspire to revive their ambitions by using military means to protect nationals abroad. The paper examines four cases (Georgia, Libya, Syria and Ukraine) in which different arguments have been held to justify military interventions. It attempts to answer the question as to whether there are new paradigms of military intervention in international law and to what extent the arguments made by the States to justify military interventions have influenced relevant norms and the structure of international law.
APA, Harvard, Vancouver, ISO, and other styles
17

Pratama, Aditya, Naifa Rizani Lardo, and Togu Alexander. "The Rising Role of Individual and Society in the Development of International Security and the Advancement of Technology; a Southern Case Study." Global South Review 1, no. 2 (September 4, 2020): 78. http://dx.doi.org/10.22146/globalsouth.54302.

Full text
Abstract:
The emergence of Industrial Revolution 4.0 brings uncertainty in the development of InternationalRelations. In the context of international security, the south region is the epicentre of the development, especially with the concern of continual security issues that can be started or settled through the advancement of technology. However, the concept of International Security itself does not facilitate the change that currently occurs in the international world through industry 4.0. The role of the state is recognized as an upper hand over the role of individuals and society in international relations. Industrial Revolution 4.0 stresses the significance of autonomous and interconnectivity through advanced technology. On top of that, technology has been spread to the people globally. The existence of the internet helps people to expand their capacity as an individual. The aforementioned concept extends the role of individuals and society in international relations. This influence brings uncertainty to the traditional approach of International securitythus giving way for other viable approaches. This research utilizes the postmodernism approach as outlined by Jim George with a focus on the concept of Critical Social Movement by R.B.J. Walker to provide new insights for International Relations and security studies. This will be complimented several findings of security issues in the global south that illustrate the empowerment of individuals and society through the advancement of technology and their role in international security. With its emphasis on the role of individuals and society and its statement on the unpredictability of International Relations, this approach is, therefore, essential in comprehending the discourse of International Security in the era of industry 4.0.
APA, Harvard, Vancouver, ISO, and other styles
18

Klose, Stephan. "Interactionist role theory meets ontological security studies: an exploration of synergies between socio-psychological approaches to the study of international relations." European Journal of International Relations 26, no. 3 (December 6, 2019): 851–74. http://dx.doi.org/10.1177/1354066119889401.

Full text
Abstract:
This article argues that interactionist role theory holds much potential for complementing the ontological security literature in the field of International Relations. Concretely, the article argues that an interactionist role theory perspective promises to supplement the ontological security literature in at least two significant respects. First, it allows for a better understanding of how an international actor’s (capacity to provide) ontological security is tied to its ability to realize its ‘self’ in society through the making and playing of roles (and the subsequent casting of others). Second, it emphasizes how reflective intelligence enables an international actor to address destabilizing disconnects between its ‘self’-image and societal role-play, and to develop a measure of ontological resilience (a capacity to constructively engage with – and to recover from – ontological security challenges). To illustrate this argument, the article provides a case study, which explores, from an interactionist role theory perspective, how the European Union’s ontological security has been strengthened, challenged and restored in its interaction with its Southern and Eastern Neighbourhood.
APA, Harvard, Vancouver, ISO, and other styles
19

Zecca, Francesco, and Marco D'Errico. "Food security and land use: The Ethiopian case." Economia agro-alimentare, no. 2 (July 2021): 1–22. http://dx.doi.org/10.3280/ecag2-2021oa12211.

Full text
Abstract:
From the financial crisis of 2008, international investors have addressed their attention to new investment and expansion opportunities and have acquired millions of hectares of land in various parts of the world. Developing Countries are the main target for such Large-Scale Land Acquisition (LSLA). While the adverse effects of these land grab are well known, their implications on food security have been less studied. In the context of an increasing disequilibrium between local food needs and international investors goals, the examining the potential adverse effects of LSLA on food security become an increasingly pressing matter. The paper illustrates an in-depth analysis on the impacts of LSLA on food security in Ethiopia. The results indicate that if the entire area of the acquired land is assumed to be used for domestic food production, it could feed around 7.1 million people.
APA, Harvard, Vancouver, ISO, and other styles
20

Istomin, I. "Management of Security Commitments in Asymmetric Alliances: The Case of Russia." International Trends / Mezhdunarodnye protsessy 19, no. 1 (2021): 26–55. http://dx.doi.org/10.17994/it.2021.19.1.64.1.

Full text
Abstract:
Since the second half of the 20th century, military alliance ceased to play an essential role in ensuring the security of major powers. Meanwhile, asymmetric alliances, in which a major power remained an incontestable leader surrounded by weak parties, proliferated across international system. The literature explains these relationships in terms of an exchange in dissimilar benefits between states, following the formula “security for autonomy”. This explanation seems generally plausible, but it does not reveal exact benefits for a major power from establishing control over the weak states. This article intends to deepen our theoretical understanding of why states resort to asymmetric alliances and to test the significance of suggested propositions through an in-depth analysis of the Russian record of alliances. Russia built allied relations with several neighbors but does not extend similar mechanisms to partners in other geographic areas. This policy is puzzling, since it comes into dissonance with the foreign policy stance that international security and global order should be built on the principle of the indivisibility of security and inclusive international institutions. In its foreign policy discourse Russia strongly condemns closed formats with limited participation. The study solves two interrelated problems. First, it helps to deepen understanding of Russian foreign policy strategy and the role of various instruments of military-political cooperation in ensuring national interests. Secondly, it allows to test the provisions of the theory of asymmetric alliances, assessing its applicability to a hard case. The article reveals Russia’s sensitivity to direct and opportunity costs as well as to potential risks of binding security commitments. However, it relies on asymmetric alliances with neighboring countries to reap the benefits of increasing power projection opportunities, legitimizing its foreign policy initiatives, limiting freedom of maneuver for its competitors, and stabilizing its strategic surrounding. The Russian experience of building relations with allies differs significantly from the American one, which, due to the scale of the US alliance network, is often presented as a model one. Nevertheless, it is quite consistent with the provisions of the theory of asymmetric alliances.
APA, Harvard, Vancouver, ISO, and other styles
21

Boilley, A., and J. F. Mahfouf. "Wind shear over the Nice Côte d'Azur airport: case studies." Natural Hazards and Earth System Sciences 13, no. 9 (September 11, 2013): 2223–38. http://dx.doi.org/10.5194/nhess-13-2223-2013.

Full text
Abstract:
Abstract. The Nice Côte d'Azur international airport is subject to horizontal low-level wind shears. Detecting and predicting these hazards is a major concern for aircraft security. A measurement campaign took place over the Nice airport in 2009 including 4 anemometers, 1 wind lidar and 1 wind profiler. Two wind shear events were observed during this measurement campaign. Numerical simulations were carried out with Meso-NH in a configuration compatible with near-real time applications to determine the ability of the numerical model to predict these events and to study the meteorological situations generating an horizontal wind shear. A comparison between numerical simulation and the observation dataset is conducted in this paper.
APA, Harvard, Vancouver, ISO, and other styles
22

Boilley, A., and J. F. Mahfouf. "Wind shear over the Nice Côte d'Azur airport: case studies." Natural Hazards and Earth System Sciences Discussions 1, no. 2 (April 2, 2013): 855–94. http://dx.doi.org/10.5194/nhessd-1-855-2013.

Full text
Abstract:
Abstract. The Nice Côte d'Azur international airport is subject to horizontal low-level wind shears. Detecting and predicting these hazards is a major concern for aircraft security. A measurement campaign took place over the Nice airport in 2009 including 4 anemometers, 1 wind lidar and 1 wind profiler. Two wind shear events were observed during this measurement campaign. Numerical simulations were carried out with Meso-NH in a configuration compatible with near-real time applications to determine the ability of the numerical model to predict these events and to study the meteorological situations generating a horizontal wind shear. A comparison between numerical simulation and the observation dataset is conducted in this paper.
APA, Harvard, Vancouver, ISO, and other styles
23

Chigarev, B. N. "Analysis of the use of energy security assessment indicators in scientific publications." Actual Problems of Oil and Gas, no. 29 (November 19, 2020): 96–110. http://dx.doi.org/10.29222/ipng.2078-5712.2020-29.art8.

Full text
Abstract:
The article analyzes the general picture of the use of five indicators for assessing energy security: World Energy Trilemma Index, International Index of Energy Security Risk, SES. Sustainable Energy Security Index, Global Energy Architecture Performance, The IEA Model of Short-term Energy Security, proposed by international energy agencies in research studies on energy security. Their rare use in scientific publications and even in the texts of reports of a number of agencies is noted. As an example, the case of China shows that the use of indicators in conjunction with the regular International Energy Agency reports can only give a general picture of the country’s energy security, but does not allow a deeper analysis due to the lack of access to the source data. A brief bibliometric analysis of publications on energy security indicators is provided. It is shown that bibliometric indicators can be verstatile markers of expert attitude to the topic under study and identify promising areas of research on energy security issues.
APA, Harvard, Vancouver, ISO, and other styles
24

Singh, Anne-Marie, and Matthew Light. "Constraints on the growth of private policing: A comparative international analysis." Theoretical Criminology 23, no. 3 (October 10, 2017): 295–314. http://dx.doi.org/10.1177/1362480617733727.

Full text
Abstract:
While much has been written on private security expansion in a few English-speaking industrialized democracies, less is known about why the industry does not develop uniformly around the world. We propose some hypotheses about constraints on private security growth in other settings, based on three comparative case studies in authoritarian states (Russia and Georgia), developing countries (Guyana and Trinidad) and non-‘Anglosphere’ industrialized democracies (continental Europe). In authoritarian states, private policing is more politically sensitive than in democratic states, sometimes resulting in more draconian restrictions on it. In developing societies, despite widespread fear of crime, potential consumers sometimes favour in-house measures over private security firms and electronic devices. In developed democracies, variation in private security growth reflects regulatory, institutional and ideological differences between the Anglosphere and continental Europe. We conclude that constraints on the private security industry’s growth potential are more significant than many scholars have acknowledged.
APA, Harvard, Vancouver, ISO, and other styles
25

Reynolds, Matthew, Martin Kropff, Jose Crossa, Jawoo Koo, Gideon Kruseman, Anabel Molero Milan, Jessica Rutkoski, et al. "Role of Modelling in International Crop Research: Overview and Some Case Studies." Agronomy 8, no. 12 (December 4, 2018): 291. http://dx.doi.org/10.3390/agronomy8120291.

Full text
Abstract:
Crop modelling has the potential to contribute to global food and nutrition security. This paper briefly examines the history of crop modelling by international crop research centres of the CGIAR (formerly Consultative Group on International Agricultural Research but now known simply as CGIAR), whose primary focus is on less developed countries. Basic principles of crop modelling building up to a Genotype × Environment × Management × Socioeconomic (G × E × M × S) paradigm, are explained. Modelling has contributed to better understanding of crop performance and yield gaps, better prediction of pest and insect outbreaks, and improving the efficiency of crop management including irrigation systems and optimization of planting dates. New developments include, for example, use of remote sensed data and mobile phone technology linked to crop management decision support models, data sharing in the new era of big data, and the use of genomic selection and crop simulation models linked to environmental data to help make crop breeding decisions. Socio-economic applications include foresight analysis of agricultural systems under global change scenarios, and the consequences of potential food system shocks are also described. These approaches are discussed in this paper which also calls for closer collaboration among disciplines in order to better serve the crop research and development communities by providing model based recommendations ranging from policy development at the level of governmental agencies to direct crop management support for resource poor farmers.
APA, Harvard, Vancouver, ISO, and other styles
26

Enoma, Aghahowa, Stephen Allen, and Anthony Enoma. "AIRPORT REDESIGN FOR SAFETY AND SECURITY: CASE STUDIES OF THREE SCOTTISH AIRPORTS." International Journal of Strategic Property Management 13, no. 2 (June 30, 2009): 103–16. http://dx.doi.org/10.3846/1648-715x.2009.13.103-116.

Full text
Abstract:
This research study set to develop KPIs for airport safety and security using a case study and ethnographic approach to research, the focus was on the role of Facilities Management (FM) in improving safety and security at the airport. The study centred on the management and staff of the case study airport and experts in the field of facilities management and aviation. The methodology for this study is a case study of three Scottish airports, owned and operated by the BAA Scotland (Glasgow, Edinburgh and Aberdeen international airports). Data was collected from Civil Aviation Agency, analysed and presented in the study. The study developed a three ‘AAA’ model (Airport – Aircraft – Airport) and a 3 stage approach to the research process. Evidence in this paper supports the conclusion that planning for airport safety and security are airport specific because no two airports are exactly the same, they differ in their; sizes, mode of operations, passenger type and flight destinations. Santruka Šiuo tyrimu siekta sukurti oro uosto sauguma ir apsauga užtikrinančius pagrindinius veiklos rodiklius (KPI), pasitelkus atvejo tyrima ir etnografini požiūri i tyrima. Daugiausia demesio skirta pastatu ūkio valdymo reikšmei, didinant oro uosto sauguma ir apsauga. Tyrimo centre ‐ atvejui tirti pasirinktu oro uostu vadovai ir darbuotojai bei pastatu ūkio valdymo ir aviacijos sričiu ekspertai. Šiam tyrimui pasirinkta metodika ‐ tai triju Škotijos oro uostu, priklausančiu ir valdomu BAA Scotland (Glazgo, Edinburgo ir Aberdyno tarptautiniai oro uostai), atvejo tyrimas. Iš Civilines aviacijos agentūros surinkti duomenys buvo išanalizuoti ir yra pateikiami tyrime. Tyrimo metu sukurtas triju O modelis (oro uostas – orlaivis – oro uostas; angl. Airport‐Aircraft‐Airport, t. y. triju A modelis) ir trižingsnis požiūris i tyrimo procesa. Iš šiame darbe pateiktu irodymu kyla išvada, kad kiekvienas oro uostas sauguma ir apsauga planuos kitaip, nes nera dvieju visiškai vienodu oro uostu: skiriasi ju dydis, valdymo būdas, keleiviai ir skrydžiu paskirties punktai.
APA, Harvard, Vancouver, ISO, and other styles
27

Setiyono, Joko, and Kholis Roisah. "The Role of International Adjudicative Bodies in Prosecuting Genocide Crime: A Case Study of International Criminal Tribunal for the Former Yugoslavia (ICTY)." International Journal of Criminology and Sociology 10 (April 30, 2021): 759–65. http://dx.doi.org/10.6000/1929-4409.2021.10.90.

Full text
Abstract:
This paper is intended to explain the urgency of the formation of the International Criminal Tribunal for the former Yugoslavia (ICTY), as an ad hoc international court based on United Nations Security Council (UNSC) Resolution No. 827 of 1993, to try perpetrators of genocidal crimes against ethnic Bosnian Muslims. The crime of genocide originated from the ethnic conflict that occurred in the federation of Yugoslavia. The research was conducted by using a qualitative method, based on analysis of data sourced from international journals, books, and other electronic sources. The results conclude that the genocide that occurred against Bosnian Muslim ethnicity is one form of international crime while threatening international peace and security in the Balkan region, also intended to break the practice of impunity against international criminals who are a common enemy of humanity (hostis humans generis). These two considerations form the legal basis for the issuance of the UNSC Resolution on the Establishment of ICTY. The establishment of ICTY as an international court is intended as a court used to try perpetrators of genocidal crimes against Bosnian Muslim ethnicities, so that similar crimes will not be repeated in the future, both in Yugoslavia and in various other countries.
APA, Harvard, Vancouver, ISO, and other styles
28

Krzymowski, Adam. "Water Diplomacy and Its Strategic Significance for Sustainable Development Goals and Global Security Architecture." Sustainability 13, no. 24 (December 16, 2021): 13898. http://dx.doi.org/10.3390/su132413898.

Full text
Abstract:
This article presents new approaches to water diplomacy connected with the United Nations 2030 Agenda. The research question is what is the role and significance of water diplomacy for Sustainable Development Goals (SDGs) and global security architecture? The paper is based on the theory of interdependence. To illustrate this concept, the author used several case studies to identify the international security role of water diplomacy in the context of SDGs. The case studies point to the greater likelihood that wars in the twenty-first century will be due to freshwater disputes; water diplomacy should be a crucial instrument for the SDGs implementation. Water diplomacy has the potential to become an effective platform for international cooperation in the face of many current and future global water challenges. Water diplomacy combines preventive and reactive measures, as well as the mediation and implementation of solutions. It is crucial for regional and world security. The results of this paper show future research directions on water diplomacy.
APA, Harvard, Vancouver, ISO, and other styles
29

Hill, R. "IDP LIVELIHOODS: Idp Livelihoods and Personal Security: Case Studies from Colombia and Sudan." Refugee Survey Quarterly 25, no. 2 (January 1, 2006): 40–59. http://dx.doi.org/10.1093/rsq/hdi0124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dewitt, David B., and Mohammed Ayoob. "Regional Security in the Third World Case Studies from Southeast Asia and the Middle East." International Journal 42, no. 3 (1987): 610. http://dx.doi.org/10.2307/40202478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

MAISAIA, Vakhtang. "BLACK SEA SECURITY AND ASYMMETRIC MILITARY THREATS IN THE 21ST CENTURY: NEW TRENDS AND NEW CHALLENGES." STRATEGIES XXI - National Defence College 1, no. 72 (July 15, 2021): 223–35. http://dx.doi.org/10.53477/2668-5094-21-16.

Full text
Abstract:
The Black Sea region is increasingly becoming a priority on the international agenda. In fact, a regional approach is emerging as actors understand that common problems need tobe addressed jointly. Nevertheless, cooperation efforts are hampered by a number of factors, such as uneven economic and political development within and among countries, nationalist forces, and longstanding animosities between regional players. In this context, it is imperative to foster sound policies aimed at strengthening dialogue and cooperation so as to contain and ultimately resolve conflicts with peaceful means. However, there is little policy-oriented research on the challenges and opportunities for cooperation in the Black Sea region. The purpose of this paper is to assess the impact of terrorism and its dangers towards the Black Sea region. The work also describes the significance of international terrorism and its general definitions. Besides, the result and findings are based on theoretical studies and assumptions and the result of the analysis of the "Case Study" of the Black Sea region. Case study examines how the Black Sea region influences the spread of terrorism and what threats it poses for this region. Furthermore, the aspects of what makes the region important on international arena are analyzed and the existent and potential security issues are examined, as well as strategicimportance of the region for the EU and NATO is analyzed even from academic framework –“Securitization” theory322. The theory is based on security studies conceptual background and the background spectrum includes: the Copenhagen School and Critical security studies as the type323.Keywords: Black Sea region, Copenhagen School, Critical security studies, Securitization,NATO, EU, Georgia’s national security
APA, Harvard, Vancouver, ISO, and other styles
32

Eschle, Catherine. "Nuclear (in)security in the everyday: Peace campers as everyday security practitioners." Security Dialogue 49, no. 4 (May 2, 2018): 289–305. http://dx.doi.org/10.1177/0967010618762595.

Full text
Abstract:
This article extends the emergent focus on ‘the everyday’ in critical security studies to the topic of nuclear (in)security, through an empirical study of anti-nuclear peace activists understood as ‘everyday security practitioners’. In the first part of the article, I elaborate on the notion of everyday security practitioners, drawing particularly on feminist scholarship, while in the second I apply this framework to a case study of Faslane Peace Camp in Scotland. I show that campers emphasize the everyday insecurities of people living close to the state’s nuclear weapons, the blurred boundaries between ‘us’ and ‘them’, and the inevitability of insecurity in daily life. Moreover, campers’ security practices confront the everyday reproduction of nuclear weapons and prefigure alternative modes of everyday life. In so doing, I argue, they offer a distinctive challenge to dominant deterrence discourse, one that is not only politically significant, but also expands understanding of the everyday in critical security studies.
APA, Harvard, Vancouver, ISO, and other styles
33

Varani, Nicoletta, and Enrico Bernardini. "Africa: Risk, Security and Mapping of Human Rights Violations." Geopolitical, Social Security and Freedom Journal 1, no. 1 (November 1, 2018): 104–27. http://dx.doi.org/10.2478/gssfj-2018-0006.

Full text
Abstract:
Abstract Planetary interdependence makes the task of states and international organizations to guarantee security inside and outside national borders ever more urgent. The tendency is to widen the space from national to international and to conceive of security as multidimensional for the satisfaction of human needs, assumed as priority needs with respect to those of the States. The old concept of national security must today confront the new concept of human security cultivated within the United Nations, which places the fundamental rights of the individual and of people at the centre of attention and lays the foundations for overcoming the traditional politics of power. The concept of human security emphasises the security of the individual and his protection from political violence, war and arbitrariness. It takes account of the strong correlation between peace policy, human rights policy, migration policy and humanitarian policy. The contribution provides, through a series of social indicators such as the Global Peace Index (GPI), Corruption Perceptions Index (CPI) and the World International Security and Policy Index (WISPI), a framework on risk, security, human rights violations in the African continent and examines some significant case studies related to sub-Saharan Africa.
APA, Harvard, Vancouver, ISO, and other styles
34

Ali, Tariq, Abdul M. Nadeem, Muhammad F. Riaz, and Wei Xie. "Sustainable Water Use for International Agricultural Trade: The Case of Pakistan." Water 11, no. 11 (October 28, 2019): 2259. http://dx.doi.org/10.3390/w11112259.

Full text
Abstract:
Sustainable use of resources is critical, not only for people but for the whole planet. This is especially so for freshwater, which in many ways determines the food security and long-term development of nations. Here, we use virtual water trade to analyze the sustainability of water used by Pakistan in the international trade of 15 major agricultural commodities between 1990 and 2016 and in 2030. Most of the existing country-level studies on virtual water trade focused on net virtual water importers, which are usually water-scarce countries as well. This is the first study to concentrate on a water-stressed net virtual water-exporting country. Our results show that Pakistan has been trading large and ever-increasing volumes of virtual water through agricultural commodities. Despite the overall small net export of total virtual water per year, Pakistan has been a net-exporter of large quantities of blue (fresh) virtual water through its trade, even by fetching a lower value for each unit of blue water exported. Given Pakistan’s looming water scarcity, exporting large volumes of blue virtual water may constrain the country’s food security and long-term economic development. Improving water use efficiency for the current export commodities, for example, rice and exploring less water-intensive commodities, for example, fruits and vegetables, for export purposes can help Pakistan achieve sustainable water use in the future.
APA, Harvard, Vancouver, ISO, and other styles
35

Ross, Robert S. "On the fungibility of economic power: China’s economic rise and the East Asian security order." European Journal of International Relations 25, no. 1 (March 16, 2018): 302–27. http://dx.doi.org/10.1177/1354066118757854.

Full text
Abstract:
China is now second only to the US as a world economic power. Its economic rise has challenged US ability to fundamentally shape the world trade order. However, the importance of the rise of the Chinese economy for international security affairs is less clear. The key analytical issue for international politics and for an understanding of the sources of power is whether economic power is fungible in international security affairs, whether it can independently determine the strategic alignments of small states. This is also the key question in assessing the implications of China’s economic rise for the East Asian security order. The political-economy literature argues that trade dependence can lead small states to realign within great power politics, regardless of the military balance. However, poor case selection challenges this prior literature. By using contemporary East Asia as a source of multiple bilateral case studies, I argue that the economic dependence of a small state on a great economic power is insufficient to influence independently small state strategic alignment preferences and that China’s rising economic power is not fungible in East Asian security affairs.
APA, Harvard, Vancouver, ISO, and other styles
36

TURNER, OLIVER. "‘Threatening’ China and US security: the international politics of identity." Review of International Studies 39, no. 4 (February 8, 2013): 903–24. http://dx.doi.org/10.1017/s0260210512000599.

Full text
Abstract:
AbstractChina's increasing capabilities are a central focus of modern day US security concerns. The International Relations literature is a key forum for analyses of the so-called ‘China threat’ and yet it remains relatively quiet on the role of ideas in the construction and perpetuation of the dangers that country is understood to present. This article reveals that throughout history ‘threats’ from China towards the United States, rather than objectively verifiable phenomena, have always been social constructions of American design and thus more than calculations of material forces. Specifically, it argues that powerful and pervasive American representations of China have been repeatedly and purposefully responsible for creating a threatening identity. It also demonstrates that these representations have enabled and justified US China policies which themselves have reaffirmed the identities of both China and the United States, protecting the latter when seemingly threatened by the former. Three case studies from across the full duration of Sino-American relations expose the centrality of ideas to historical and contemporary understandings of China ‘threats’, and to the American foreign policies formulated in response.
APA, Harvard, Vancouver, ISO, and other styles
37

Matveev, Vladimir, A. Zaitcev, and A. R. Gaysina. "Ensuring economic security in case of leakage of confidential information." National Security and Strategic Planning 2022, no. 3 (October 31, 2022): 52–75. http://dx.doi.org/10.37468/2307-1400-2022-3-52-75.

Full text
Abstract:
The relevance of countering the leakage of confidential information in connection with the active digitalization of management processes, the digital economy, and the expansion of remote work has been identified. The emergence and expansion of a new type of rent - confidential information is indicated. Tendencies in the field of leakage of confidential information have been established. The concept of information leakage is given and leakage schemes are modeled. The change in the structure of the impact on information resources is analyzed. The factors of intentional leaks of confidential information are systematized. The classification of losses from leaks of confidential information is carried out. The Dark web forum for selling confidential information is described. The branches and divisions of confidential information leakage are analyzed. A chronological analysis of state structures exposed to the leakage of confidential information was carried out. The international experience in countering the leakage of confidential information is presented. A comparative analysis of the leakage of confidential information in Russia and in the countries of the world by industry, size of organizations, and the nature of information has been carried out.
APA, Harvard, Vancouver, ISO, and other styles
38

Becklake, Sarah. "The Role of NGOs in Touristic Securitization: The Case of La Antigua Guatemala." Space and Culture 23, no. 1 (September 6, 2019): 34–47. http://dx.doi.org/10.1177/1206331219871888.

Full text
Abstract:
This article focuses on the role of nonprofit, nongovernmental, international development organizations (NGOs) in touristic securitization, the practice of securing tourists to sustain tourism. Especially in the Global South, NGOs are incorporating tourism into their operations/funding strategies and, thus, becoming touristic securitization stakeholders and actors. Through focusing on Western NGOs in and around Guatemala’s main tourism destination, La Antigua Guatemala, this article investigates how NGOs rely on, contribute to, and/or engage in touristic securitization. While the article demonstrates that NGOs help make Western tourists feel safe enough to travel to Guatemala, as well as help to keep them from harm while visiting, it also shows how touristic securitization is informed by and informing of intersecting inequalities and (re)producing human insecurities, especially for poor, often indigenous, Guatemalans, the very people NGOs aim to help. The article argues that touristic securitization is securing different worlds of (in)security.
APA, Harvard, Vancouver, ISO, and other styles
39

Jones, David Martin, and Michael L. R. Smith. "Making Process, Not Progress: ASEAN and the Evolving East Asian Regional Order." International Security 32, no. 1 (July 2007): 148–84. http://dx.doi.org/10.1162/isec.2007.32.1.148.

Full text
Abstract:
Since the Asian financial crisis of 1998, regional scholars and diplomats have maintained that the Association of Southeast Asian Nations (ASEAN) represents an evolving economic and security community. In addition, many contend that what is known as the ASEAN process not only has transformed Southeast Asia's international relations, but has started to build a shared East Asian regional identity. ASEAN's deeper integration into a security, economic, and political community, as well as its extension into the ASEAN Plus Three processes that were begun after the 1997 financial crisis, offers a test case of the dominant assumptions in both ASEAN scholarship and liberal and idealist accounts of international relations theory. Three case studies of ASEAN operating as an economic and security community demonstrate, however, that the norms and practices that ASEAN promotes, rather than creating an integrated community, can only sustain a pattern of limited intergovernmental and bureaucratically rigid interaction.
APA, Harvard, Vancouver, ISO, and other styles
40

Ayat, Nasir, and Mahmood Khalid. "Consumer Satisfaction in Social Security Hospital: A Case Study of Punjab Employees Social Security Institution Hospital, Rawalpindi." Pakistan Development Review 48, no. 4II (December 1, 2009): 675–99. http://dx.doi.org/10.30541/v48i4iipp.675-699.

Full text
Abstract:
In health care, consumer satisfaction is an important evaluation instrument to determine the quality of services. In recent years, the concept has assumed much greater significance particularly in market based health systems. Also, in World Health Organisation’s framework for health care assessment, the customer satisfaction is given due consideration. On the contrary, in developing countries particularly, the concept is one of the most ignored elements in evaluation of health care systems. Pakistan is also a case in point. Review of literature and general health management systems in the country suggests scarcity of information on consumer satisfaction as well as its neglect as a crucial element in health systems. This present study—which is cross-sectional—is designed on the ground that there is a need to incorporate consumer satisfaction in health care evaluation. This study, presents a scientific analysis of Punjab Employees Social Security Institution Hospital, Rawalpindi (PESSI) using the Patient Survey Questionnaire technique, the most universal approach used by international studies to evaluate consumer satisfaction with health services. Based on study results, generally, we conclude that consumers have expressed high level of satisfaction for various quality assessment scales. Despite these findings, it has also been noted that significant proportion of patients have also expressed medium as well as low satisfaction for certain scales. It tends to suggest that quality of services needs to be improved for specific items as well as certain scales including communication, general satisfaction, and interpersonal aspects for improvements in provision of certain services at the hospital. JEL classification: I11, I18, I38 Keywords: Customer Satisfaction, Quality, Healthcare, Evaluation
APA, Harvard, Vancouver, ISO, and other styles
41

TRIFUNOVIĆ, DARKO. "SECURITY STUDIES – SYNTHESIS BETWEEN ACADEMY AND PRACTICE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/2 (June 30, 2014): 27–39. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.2.2.

Full text
Abstract:
Modern security studies, facing new challenges, should have a curriculum that provides graduates with the knowledge and skills on the basis of which they can excel in their professional activities. Anyone who influences and/or prepares the security education curriculum should be aware of the true needs of students, so they can apply the acquired knowledge in practice. First of all, the curriculum creators should put themselves in the position of professionals and, in the content of the curriculum, provide answers as to which courses and knowledge would be most useful in the case of major security crises such as wars, various intensity conflicts and massive rebellions, particularly those that have an inner or extra ethnic component or an inner national dimension in a pan-national joint political movement, such as the so-called Arab Spring. The latter encompasses the area of security, discourse in the international humanitarian law, particularly the Law of Armed Conflict and Rules of Engagement, but also the extremely delicate matters of religion, belief, faith, language (separately and all together in a wider sociological context), and above all, the Arab Spring as a social and security phenomenon presenting a unique sample for security studies both at the global and regional level due to the geopolitical trends in past two decades. Sodoben varnostni študij, ki se sooča z vedno novimi izzivi, potrebuje učne načrte, ki diplomantom zagotavljajo znanje in veščine, na podlagi katerih se lahko odlikujejo pri opravljanju svojega poklica. Vsi, ki pripravljajo učne načrte za varnostni študij ali imajo vpliv na njihovo pripravo, se morajo zavedati resničnih potreb študentov, ki morajo pridobljeno znanje uporabiti v praksi. Ustvarjalci učnih načrtov bi se najprej morali postaviti v položaj strokovnjakov in znotraj učnega načrta odgovoriti na vprašanje, kateri predmeti in znanje so najbolj koristni ob večjih varnostnih krizah, kot so vojne, konflikti različnih intenzivnosti in množični upori, zlasti tisti, ki vključujejo notranjo in zunanjo narodnostno komponento ali notranjo nacionalno razsežnost v okviru vsenacionalnega skupnega političnega gibanja, kot je tako imenovana arabska pomlad. Njeno razumevanje zahteva poznavanje področja varnosti, diskurz o mednarodnem humanitarnem pravu, zlasti o pravu oboroženih spopadov in pravilih delovanja, ter o izredno občutljivih vprašanjih vere, prepričanja in jezika (posamično in skupaj v širšem sociološkem kontekstu), predvsem pa je treba arabsko pomlad obravnavati kot družbeni in varnostni pojav, ki zaradi geopolitičnih trendov v zadnjih dveh desetletjih predstavlja enkraten primer za varnostne študije tako na globalni kot na regionalni ravni.
APA, Harvard, Vancouver, ISO, and other styles
42

Dastafkan, Reihaneh, Hadi Salehi, and Mohammad Mehdi Hooshmand. "Provision of Peace and Right to Health through Sanctions: Threats and Opportunities." Archives of Iranian Medicine 23, no. 4Suppl1 (April 1, 2020): S43—S48. http://dx.doi.org/10.34172/aim.2020.s9.

Full text
Abstract:
According to the purposes for the formation of the United Nations, sophistication of institutions like the Security Council must be evaluated based on the provision of peace and how they guarantee human rights. Therefore, in case Security Council does not follow these two mentioned factors, its function would be itself a threat to the international peace and security. This analytical research is based on collecting library theoretical data related to different field studies which investigated the effects of sanctions issued by the Security Council, the United States and the European Union on citizens’ health and tried to assess both their efficiency and legitimacy. The right to health is connected with the right of living. In case enough drugs, appropriate treatment and medical equipment are not provided at the proper time, both physical and mental health might be threatened and this can cause death of a large number of people. Considering the Security Council as an institution which is expected to take into account the citizens’ basic rights and not to ignore its own initial objective, the present paper was an attempt to provide explanations for the above concepts and their relationships and to analyze the findings of previous field studies. The paper concluded that sanctions issued by the Security Council and the United States are potentially functioning as threats to the international peace and so these sanctions are violating the citizens’ right to health.
APA, Harvard, Vancouver, ISO, and other styles
43

DE OLIVEIRA SCHUCK, Elena, and Lívia BRITO. "Women, peace and international security: the Havana Agreement for peace in Colombia." Relaciones Internacionales, no. 41 (June 10, 2019): 73–90. http://dx.doi.org/10.15366/relacionesinternacionales2019.41.004.

Full text
Abstract:
Armed conflicts have different impacts on women. In this regard, women’s civil society organizations are inserted in the international political arenas in order to guarantee their rights in warfare contexts. In the case of conflicts in Colombia, women are identified not only as combatants and victims, but also as members of women civil organizations for peacebuilding. These organizations played a prominent role in the elaboration of the peace agreement between the Government of Colombia and the Revolutionary Armed Forces of Colombia (FARC) in Havana, Cuba, between 2012 and 2016. This article proposes an analysis of the theoretical production on peace, international security, feminism and subalternity, to present the specific case of the conflict in Colombia and its gender perspectives. The results indicate that peace agreements can be instruments of political inclusion and reparation for women affected by armed conflicts. In highlighting the role of political minorities in the international peace negotiations in Colombia, this research contributes to the development and expansion of critical perspectives —feminist and subaltern— on international security and studies for peace. Moreover, building upon the specific analysis of the Havana Agreement, this paper aims to contribute to the inclusion of a gender perspective in future peace agreements.
APA, Harvard, Vancouver, ISO, and other styles
44

Mustafa, Tahani. "Securitization Dysfunction." Contemporary Arab Affairs 12, no. 1 (March 1, 2019): 19–38. http://dx.doi.org/10.1525/caa.2019.121002.

Full text
Abstract:
This article contributes to the critical discourse on security sector reform (SSR) by explicitly acknowledging its political dimensions and implications. Through a consideration of the role of SSR in international processes of securitization and state-building, it highlights the paradoxes implicit in this model, and the subsequent consequences of its implementation on the ground using the case of occupied Palestinian territories where SSR has significantly altered the local security landscape.
APA, Harvard, Vancouver, ISO, and other styles
45

Montgomery, David W., John Heathershaw, Adeeb Khalid, Edward Lemon, and Tim Epkenhans. "Researching Islam, Security, and the State in Central Asia: A Round Table Discussion." Review of Middle East Studies 50, no. 1 (February 2016): 3–17. http://dx.doi.org/10.1017/rms.2016.69.

Full text
Abstract:
AbstractAs researchers in Central Asian Studies, we discuss the different perspectives our methodological approaches provide to understanding the content and context of Islam, security, and the state in the region. We acknowledge the role of bias in creating narratives that dominate regional and international discourse and question mono-causal explanations of Islamic practice and the roots of radicalism. As such, we offer insights into the challenges and best practices of doing research on Islam and security and posit Central Asian Studies as a case for the value of multi-disciplinary research.
APA, Harvard, Vancouver, ISO, and other styles
46

Essex, Jamey. "The Neoliberal Geopolitics of Food Security: The Case of Indonesia." Human Geography 1, no. 2 (July 2008): 1–13. http://dx.doi.org/10.1177/194277860800100204.

Full text
Abstract:
The centering of development in post-9/11 US national security strategies, combined with the restructuring of the US state's foreign development apparatus, promise deep changes in understandings and practices of food security and its relationship to development and processes of neoliberalization, securitization, and militarization. Long a stated objective within US foreign aid programs, especially those based around food aid, recent strategic shifts have rescripted food security as a basic need that should be met through the market, and as a proxy measurement for good governance. By the same token, food insecurity becomes a measure of poor governance and a contributor to political instability and persistent underdevelopment, laying the groundwork for international terrorism and criminal activity. This paper examines the altered contexts and practicalities of US food aid in Indonesia, as the relationship between such assistance and broader projects of sub-imperialism and neoliberalization, in Indonesia and in Southeast Asia more generally, must be interrogated. US development and geopolitical strategies identify Indonesia as both a strategically important ally in the global war on terror and a vulnerable state, prone to deteriorating security and governance. Under post-9/11 security and development strategies, development and humanitarian assistance centered on food aid and improved food security have become primary components of US policy in and toward Indonesia. I ground my discussion in two case studies: security-oriented food-for -work programs in Jakarta and the militarization of food aid in post-tsunami Aceh province.
APA, Harvard, Vancouver, ISO, and other styles
47

Smith, Frank L. "Quantum technology hype and national security." Security Dialogue 51, no. 5 (April 27, 2020): 499–516. http://dx.doi.org/10.1177/0967010620904922.

Full text
Abstract:
Technology hype is an important concept in business, marketing, and science and technology studies, but it is rarely related to security studies. What is technology hype? How does it relate to national security? And to what effect? This article examines rational and performative perspectives on technology hype as either a kind of exaggeration or expectant discourse. Adopting the latter view, I compare and contrast hype cycles with threat inflation and securitization theory. I then sketch my own theoretical propositions about technology hype as being common in national security, with variable degrees of acceptance, familiar content, and significant consequences. A case study on quantum technologies provides proof of concept. I find ample evidence of hype over quantum computers, communications, and sensors; audience acceptance in the national security community varies with familiarity; and consequential decisions appear to follow. While cyclical expectations suggest the need for caution when citing quantum technologies in support of quantum approaches to international relations, a middle-range theory about technology hype provides useful insight into security practice.
APA, Harvard, Vancouver, ISO, and other styles
48

Reeves, Jeffrey. "Structural Power, the Copenhagen School and Threats to Chinese Security." China Quarterly 217 (January 2, 2014): 140–61. http://dx.doi.org/10.1017/s0305741013001458.

Full text
Abstract:
AbstractThis article engages with current debates surrounding China's security by employing the concept of structural power and the Copenhagen School approach to security studies to measure threats to China's security. Building on existing Chinese and English language research on China's security drivers, the article develops a mechanism for determining how China's economic relations with small states in Asia negatively affect their domestic stability and how this instability then loops back to undermine China's strategic position. The article uses China's relations with Cambodia, Nepal and Mongolia as case studies.
APA, Harvard, Vancouver, ISO, and other styles
49

Chu, Ta-Wei (David). "The State Actor in Human-Security Issues: A Study of Cambodia and Indonesia." International Studies Review 16, no. 2 (October 19, 2015): 71–92. http://dx.doi.org/10.1163/2667078x-01602004.

Full text
Abstract:
Human security has become a popular issue in the realm of international relations, particularly since The Human Development Report 1994 was published by the United Nations Development Programme (UNDP). Some research on the subject has acknowledged that individual states are essential actors in achieving human security. This article considers the context of Southeast Asia and explores the case studies of the Cambodian and Indonesian governments, to address their respective domestic human-security issues. To this end, this article considers the modern political histories of Cambodia and Indonesia from a comparative perspective. The article concludes that as a state becomes more democratic its people are likely to have more human security.
APA, Harvard, Vancouver, ISO, and other styles
50

Brooks, Stephen G., G. John Ikenberry, and William C. Wohlforth. "Don't Come Home, America: The Case against Retrenchment." International Security 37, no. 3 (January 2013): 7–51. http://dx.doi.org/10.1162/isec_a_00107.

Full text
Abstract:
After sixty-five years of pursuing a grand strategy of global leadership—nearly a third of which transpired without a peer great power rival—has the time come for the United States to switch to a strategy of retrenchment? According to most security studies scholars who write on the future of U.S. grand strategy, the answer is an unambiguous yes: they argue that the United States should curtail or eliminate its overseas military presence, abolish or dramatically reduce its global security commitments, and minimize or eschew efforts to foster and lead the liberal institutional order. Thus far, the arguments for retrenchment have gone largely unanswered by international relations scholars. An evaluation of these arguments requires a systematic analysis that directly assesses the core claim of retrenchment advocates that the current “deep engagement” grand strategy is not in the national interests of the United States. This analysis shows that advocates of retrenchment radically overestimate the costs of deep engagement and underestimate its benefits. We conclude that the fundamental choice to retain a grand strategy of deep engagement after the Cold War is just what the preponderance of international relations scholarship would expect a rational, self-interested leading power in America's position to do.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography