56 resultados para Security Studies - Military

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter raises the following main points:<br />&bull; The study of security has experienced a series of debates around the nature of the threats to security.<br />&bull; The early security scholars, as distinct from those who studied strategy and warfare, took a broad approach and argued that military and non-military means could achieve security.<br />&bull; During the Cold War the study of security focused on the most pressing security issue of the day &ndash; the nuclear standoff between the two superpowers.<br />&bull; In the post-Cold War era the broader approach to the study of security returned to the fore and included non-state actors and non-traditional sources of insecurity.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Brings together a range of specially-commissioned chapters to provide an accessible introduction to security studies in the 21st century. The second edition has been expanded to cover developments in global and regional security; nuclear proliferation; terrorism; intervention and peacekeeping. C. Snyder, Deaking Uni. <br />

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis is a case study of educational process in the leadership development program of the Australian Defence Force Academy. The intention is to determine the relative emphasis in educational process on the conventional command and managerial compliance (Type A) style and the emergent contingent and creative (Type B) style of leadership. The Type A style is theorised as emphasizing hierarchy and control, whereas the emphasis in a Type B style is on adaptive and entrepreneurial behaviour. This study looks at the learning process in a cultural and structural context rather than focus on curriculum and instructional design. Research in this wider context is intended to enable development processes to successfully bridge a gap between theory and practice, implicit in studies that identify theories 'in-operation' as different from the theories 'espoused' (Argyris 1992, Savage 1996). In terms of espoused and in-use theory, the study seeks to produce a valid and reliable result to the question: what is the relative emphasis on the two leadership styles in the operation of the three educational mechanisms of curriculum, pedagogy (teaching practice) and assessment? The quantitative analysis of results (n = 114) draws attention to both leadership styles in terms of two and three-way relationships of style, cadet or work group and service type. The data shows that both Type A and Type B leadership styles are evident in the general conversation of the organisation. This trend is present as espoused theory in the curriculum of the Defence Academy. However, the data also confirm a clear and strong emphasis towards command and managerial compliance as theory-in-use, particularly by cadets. This emphasis is noticeably evident in the teaching and assessment practice of the Defence Academy. Other research outcomes include the observation that: Contextually, while studies show it is difficult to isolate skills from their cultural and biographical context (Watkins, 1991:15), this study suggests that it is equally difficult to isolate skills development from this context. There is a strong task or instrumental link identified by cadet responses in terms of content and development process at the Defence Academy, in contrast to the wider developmental emphasis in general literature and senior officer interviews. There is a lack of awareness of teaching strategies and development activity consistent with espoused Type B leadership theory and curriculum content. This gap is compounded by the use in the Defence Academy of personnel without teaching expertise or suitable developmental experience. The socialisation of cadets into the military workplace is the primary purpose of training. This purpose appears taken for granted by all concerned - staff, cadets and senior officers. Defence Academy development processes appear to be faced with a dilemma. Arguably, training and learning from experience are limited approaches to development. Training, which involves learning by replication, and learning from experience, which is largely imitative, are both of little use when people are faced with novel and ambiguous situations. This study suggests that in order to support the development of capabilities that go beyond training based competence a learning and development approach is needed. This more expansive approach requires educational planners to consider the cultural and social context that can inadvertently promote the status quo in practice over espoused outcomes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This book provides a study of the war by Liberation Tigers of Tamil Eelam (LTTE) to create a separate state in Sri Lanka. It examines the ways in which this war should, in principle, have invoked &lsquo;Responsibility to Protect&rsquo; principles, as well as the political, legal and practical problems involved and, ultimately, why the international community failed to act. <br /><br />Over the years there have been several events, including those in Rwanda, Sierra Leone, Timor-Leste, Darfur, and Kosovo, that have led the international community to accept a responsibility to protect. However, despite its overwhelming preliminary endorsement, the principles of this concept are still not universally sanctioned and there are some strong international opponents, including some countries that were initial signatories of the convention.<br /><br />By considering the example of Sri Lanka, the text focuses on what conditions could satisfy or demand the application of responsibility to protect. It further presents a case as to why this conflict was, and may still be, the normative responsibility of the international community.<br /><br />Sri Lanka and the Responsibility to Protect will be of great interest to students of South-East Asian politics, human rights, international law, ethnic conflict, security studies and IR in general.<br />

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This book reveals that &lsquo;fixers&rsquo;&mdash;local experts on whom foreign correspondents rely&mdash;play a much more significant role in international television newsgathering than has been documented or understood. Murrell explores the frames though which international reporting has traditionally been analysed and then shows that fixers, who have largely been dismissed by scholars as &quot;logistical aides&quot;, are in fact central to the day-to-day decision-making that takes place on-the-road. Murrell looks at why and how fixers are selected and what their significance is to foreign correspondence. She asks if fixers help introduce a local perspective into the international news agenda, or if fixers are simply &lsquo;People Like Us&rsquo; (PLU). Also included are excerpts from interviews with TV correspondents and fixers and in-depth case studies of correspondents in Iraq and Indonesia.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We investigate the effectiveness of several well-known parametric and non-parametric event study test statistics with security price data from the major Asia-Pacific security markets. Extensive Monte Carlo simulation experiments with actual daily security returns data reveal that the parametric test statistics are prone to misspecification with Asia-Pacific returns data. Two non-parametric tests, a rank test [Corrado and Zivney (Corrado, C.J., Zivney, T.L., 1992, The specification and power of the sign test in event study hypothesis tests using daily stock returns, Journal of Financial and Quantitative Analysis 27(3), 465-478)] and a sign test [Cowan (Cowan, A.R., 1992, Non-parametric event study tests, Review of Quantitative Finance and Accounting 1(4), 343&ndash;358)] were the best performers overall with market model excess returns computed using an equal weight index.<br />

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Armed separatist movements in Papua, East Timor and Aceh have been a serious problem for Indonesia's central government. This book examines the policies of successive Indonesian governments to contain secessionist forces, focusing in particular on Jakarta's response towards the armed separatist movement in Aceh. Unlike other studies of separatism in Indonesia, this book concentrates on the responses of the central government rather than looking only at the separatist forces. It shows how successive governments have tried a wide range of approaches, including military repression, offers of autonomy, peace talks and a combination of these. It discusses the lessons that have been learned from these different approaches and analyzes the impact of the tsunami, including the successful accommodation of former rebels within an Indonesian devolved state structure and the expanding implementation of Islamic law.<br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book is a collection of papers originally presented at a workshop entitled 'After Nine Eleven: Ethics in the Time of Terror' hosted by Monash University on 24 June 2005. The workshop participants included members of the Ethics of War and Peace (EWAP) working group which was inaugurated at the first Oceanic Conference on International Studies in July 2004. EWAP provides a cross-disciplinary forum for scholars and non-academic professionals to exchange and debate ideas on topics including the ethics of armed intervention, the Just War, pacifist ethics, international humanitarian law, ethics in the military profession, and the relationship between law, ethics and politics.<br /><br />The chapters within this book examine themes including 'lesser evils' and 'dirty hands' in the fight against terrorism, the ethics of intelligence gathering, humanitarian intervention, terrorism and the North-South divide, cultural equality as a response to terrorism, human rights and counterterrorism legislation, and the ethics of defending against 'bioterrorism'.&nbsp;<br /><br />Contributors include Alex Bellamy and Richard Devetak (University of Queensland), Baogang He (Deakin University), Christopher Michaelsen (Office for Democratic Institutions and Human Rights, Organization for Security and Co-operation in Europe), Jeremy Moses (University of Canterbury), Christian Enemark and Hugh Smith (University of New South Wales, Australian Defence Force Academy).<br />

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the wake of the Bali bombing the Australian government has proposed a number of national security measures that pose a real danger to human security in Australia and the region. These measures include renewed and increased military and intelligence exchanges with Indonesia, and laws that allow the Australian Security Intelligence Organization (ASIO) to detain people without charge or even suspicion in order to gather intelligence. In less emotional times these initiatives would be rejected as contrary to human rights concerns and Australia&rsquo;s democratic traditions, which include the rule of law and due process protections. In the current climate, however, human rights and civil liberties are apt to be portrayed as unaffordable luxuries.<br /><br />

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches. <br />