964 resultados para SECURITY STUDIES


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we discuss how an innovative audio-visual project was adopted to foster active, rather than declarative learning, in critical International Relations (IR). First, we explore the aesthetic turn in IR, to contrast this with forms of representation that have dominated IR scholarship. Second, we describe how students were asked to record short audio or video projects to explore their own insights through aesthetic and non-written formats. Third, we explain how these projects are understood to be deeply embedded in social science methodologies. We cite our inspiration from applying a personal sociological imagination, as a way to counterbalance a ‘marketised’ slant in higher education, in a global economy where students are often encouraged to consume, rather than produce knowledge. Finally, we draw conclusions in terms of deeper forms of student engagement leading to new ways of thinking and presenting new skills and new connections between theory and practice.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A producer of 5.4 M bbl/d, totalling almost half of the consumption of the entire European Union, the Gulf of Guinea is a fundamental lifeline and maritime link between Europe, the Americas and Africa. Geographically positioned as a staging post for transit originating in Latin America and coupled with its relatively porous borders, the region is also the perfect stepping stone for contraband heading to European shores. While blessed with an enviable wealth of marine and mineral resources, the region is also plagued by an ever-increasing spectre of maritime piracy; accounting for around 30% of incidents in African waters from 2003 to 2011. It is for these reasons that this research centres around the issues of maritime security in the Gulf of Guinea, with a particular focus on the first two decades of the 21st century. This research looks to examine the overall picture of the present state of play in the area, before going on to provide an analysis of potential regional developments in maritime security. This research begins with the analysis of concepts/phenomena that have played a notable role in the shaping of the field of maritime security, namely Globalisation and security issues in the post-Cold War era. The ensuing chapter then focuses in on the Gulf of Guinea and the issues dominating the field of maritime security in the region. The penultimate chapter presents a SWOT analysis, undertaken as part of this research with the aim of correlating opinions from a variety of sectors/professions regarding maritime security in the Gulf of Guinea. The final chapter builds upon the results obtained from the abovementioned SWOT analysis, presenting a series of potential proposals/strategies that can contribute to the field of maritime security in the region over the coming years. This research draws to a close with the presentation of conclusions taken from this particular investigation, as well as a final overview of the earlier presented proposals applicable to the field of maritime security during the second decade of the 21st century.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The ninth annual Suomenlinna seminar, organised by the Department of Strategic and Defence Studies, Finnish National Defence College, was held in May 2006. It brought together a representative group of specialists in security studies for two days of presentations and discussion about the most pressing issues of today – the challenges facing European Union’s crisis management in Africa.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Over the past two decades, the Democratic People's Republic of Korea has allegedly developed nuclear energy while suffering near collapse caused by catastrophic economic policies. This article presents an evaluation of North Korea's contemporary energy policies and suggests that despite retaining communist ideals and "Chu'che" policies, North Korea has slowly started to modernise its energy sector and recognises the necessity to start engaging with the international community. While it is argued that Pyongyang's newfound concerns for sustainable development, equity and the environment are a welcomed departure from its usual belligerent rhetoric and present a number of exciting engagement opportunities, the regime has not abandoned its nuclear energy programme.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This article evaluates the way in which copyright infringement has been gradually shifting from an area of civil liability to one of criminal penalty. Traditionally, consideration of copyright issues has been undertaken from a predominantly legal and/or economic perspectives. Whereas traditional legal analysis can explain what legal changes are occurring, and what impact these changes may have, they may not effectively explain ‘how’ these changes have come to occur. The authors propose an alternative inter-disciplinary approach, combining legal analysis with critical security studies, which may help to explain in greater detail how policies in this field have developed. In particular, through applied securitisation theory, this article intends to demonstrate the appropriation of this field by a security discourse, and its consequences for societal and legal developments. In order to explore how the securitisation framework may be a valid approach to a subject such as copyright law and to determine the extent to which copyright law may be said to have been securitised, this article will begin by explaining the origins and main features of securitisation theory, and its applicability to legal study. The authors will then attempt to apply this framework to the development of a criminal law approach to copyright infringement, by focusing on the security escalation it has undergone, developing from an economic issue into one of international security. The analysis of this evolution will be mainly characterised by the securitisation moves taking place at national, European and international levels. Finally, a general reflection will be carried out on whether the securitisation of copyright has indeed been successful and on what the consequences of such a success could be.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This article discusses the challenges of irregular migration for the security of the EU. They are analyzed starting with the European Security Strategy 2003, and the Report on its Implementation, 2008, and notes many failures: The EU Members did not follow the directives adopted in Brussels, the mismanagement of migration and asylum policies, and numerous actions that can be characterized or described as improvised, scattered or irresponsible. The 2016 Global Strategy recognizes these failures and call attention to the European leaders to reconsider how the EU functions and operates, suggesting the need for greater unity and cooperation to achieve a more effective migration policy. However, the article points out that practically all of the sections of the new Strategy dealing with migration were already embodied in previous Strategies, and stress that in parallel with the publication of the 2016 Global Strategy, actions are already undertaken, such as the EU readmission agreements signed with several important third countries of origin.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The present article reviews the relations between the EU and Russia in the past decade and shows the deterioration of the bilateral relations. The Putin´s Russia has become a very active geostrategic player, with a worrying behaviour, breaking balances in the international scene established since the end of the Cold War. Russia is a priority in the Foreign and Security Policy of the European Global Security Strategy, but has become also a clear competitor. This last aspect is not sufficiently underlined in the Strategy and thus the strategic framework is not clear. In parallel, it is not clear in the Strategy which are the tools the EU has to defend its neighbourhood when their independence, sovereignty or territorial defence may be put in question. This question goes beyond the support to the resilience of those neighbours.

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ever since Siad Barre’s regime was toppled in the beginning of the 1990’s Somalia has been without an effective central government. As a result Somalia has remained in an anarchic condition of state collapse for nearly two decades. This anarchy has often been put forward as a potential breeding ground for terrorism. As a response to this threat the United States has undertaken several policies, initiatives, and operations in the Horn of Africa generally and in Somalia specifically. In this descriptive study a twofold analysis has been undertaken. First, conditions in present day Somalia as well as Somali history have been analyzed to evaluate the potential Somalia holds as a terrorist base of operations or a recruiting- or staging area. Second, US strategies and actions have been analyzed to evaluate the adequacy of the US response to the threat Somalia poses in terms of terrorism. Material for the analyses have been derived from anthropological, political, and security studies dealing with Somalia. This material has been augmented by a wide range of news coverage, western and non-western. Certain different US policy documents from different levels have been chosen to represent US strategies for the Global War on Terrorism. Because Somali social institutions, such as the clan system, hold great weight in Somali society, Somalia is a difficult area of operations for terrorist networks. In addition the changing nature of Somali alliances and the tangled webs of conflict that characterize present day Somalia aggravate the difficulties that foreign terrorist networks would encounter in Somalia, would they choose to try to utilize it in any great extent. The US has taken potential terrorism threats in Africa and specifically Somalia very seriously. US actions in Somalia have mainly focused on apprehending or neutralizing terror suspects. Such policies, coupled with backing the Ethiopian invasion of Somalia may have actually turned out increasing Somalia’s terror potential.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper develops a model of short-range ballistic missile defense and uses it to study the performance of Israel’s Iron Dome system. The deterministic base model allows for inaccurate missiles, unsuccessful interceptions, and civil defense. Model enhancements consider the trade-offs in attacking the interception system, the difficulties faced by militants in assembling large salvos, and the effects of imperfect missile classification by the defender. A stochastic model is also developed. Analysis shows that system performance can be highly sensitive to the missile salvo size, and that systems with higher interception rates are more “fragile” when overloaded. The model is calibrated using publically available data about Iron Dome’s use during Operation Pillar of Defense in November 2012. If the systems performed as claimed, they saved Israel an estimated 1778 casualties and $80 million in property damage, and thereby made preemptive strikes on Gaza about 8 times less valuable to Israel. Gaza militants could have inflicted far more damage by grouping their rockets into large salvos, but this may have been difficult given Israel’s suppression efforts. Counter-battery fire by the militants is unlikely to be worthwhile unless they can obtain much more accurate missiles.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El continente africano ha sido por excelencia analizado por los estudios de seguridad, con el fin de comprender la naturaleza de los conflictos que han tenido lugar en el territorio y poder ofrecer a través de diversas estrategias, posibles soluciones para el no retorno al conflicto por parte de los grupos armados. Por esta razón, a partir de la década de los noventa surge la puesta en marcha de programas y reformas como la Desmovilización, el Desarme y la Reintegración (DDR) dentro de una Reforma al Sector de la Seguridad (RSS). En el caso de la República Democrática del Congo, luego de numerosos conflictos e intervenciones por parte de diferentes actores, se plantea llevar a cabo un programa de DDR en el marco de una RSS especialmente dirigido a las Fuerzas Armadas. En este sentido, esta monografía analiza la incidencia de la RSS sobre el programa de DDR, con el fin de vislumbrar los retos que se presentan dentro de un contexto de conflicto complejo como el de la RDC.