Browse Results

Showing 81,751 through 81,775 of 100,000 results

Securing the Indian Frontier in Central Asia: Confrontation and Negotiation, 1865-1895 (Central Asian Studies)

by Martin Ewans

The three decades between 1865 and 1895 marked a particularly contentious period in the relationship between Britain and Russia in Central Asia, which more than once brought them to the verge of war. Moderates tried to settle the problem by the negotiation of ‘neutral zones’, or firm boundaries, but the issue was complicated by misreading of intentions, much internal confusion and dispute, and considerable ignorance of the geographical and geopolitical factors involved. This careful and detailed analysis examines the strategic thinking and diplomatic discourse which underlay the whole period, and in particular of the succession of efforts to establish a frontier, which eventually brought the period to a close without a major confrontation being provoked. Based on relevant records in the PRO and the British Library, as well as private papers, press comment, parliamentary debates and other contemporary accounts, Sir Martin Ewans provides a ‘history of thought' of this crucial period in Central Asia. He provides an insight into the manner in which issues of war and peace were handled in the 19th Century and a fascinating case study of a great power relationship prior to the First World War. An important contribution to the study of Asian history, Tsarist Russia, imperial history and the history of British India, this book will also be of interest in India and Pakistan as a study of the events that led to the definition and consolidation of their northern frontiers.

Securitisation as Hegemonic Discourse Formation: An Integrative Model (Contributions to International Relations)

by Hannah Broecker

This book offers a model for understanding securitization in terms of hegemonic discourse formations. It re-thinks the very meaning of security as well as the relationship between the understanding of security in traditional and critical approaches in security studies to find a common denominator between them. Deduced firmly from realist political philosophy and its analytic categories, such as state-based sovereignty, security is presented as a function of discursive formations. Providing a sound discourse-theoretical foundation which includes both linguistic and non-linguistic practices as well as a focus on relationships of power, the book offers a basis for the integration of insights generated by the different approaches to securitisation, and enhances the analytical and explanatory depth of the concept. As part of its theoretical foundation, the book further presents a fundamentally new image of long-standing theoretical and conceptual challenges within speech-act inspired approaches, including the re-formulation of central analytical categories such as the speaker-audience-context nexus. By explaining securitisation as signifying the boundaries of the construction of meaning, it presents an original understanding of securitisation, which is deeply integrated into the structures of the social construction of meaning. On this basis, the book offers a new understanding of successful securitisation factors and insights into aspects that render specific objects more or less likely for securitisation. The book proceeds to discuss two central aspects of the securitisation debate: The constitution of power, as well as an exploration of the nature of the political and politicisation. An empirical case study on the development-security-nexus offers further insights into the applicability of the theoretical model. This book will appeal to students, researchers, and scholars of political science and international relations (IR) interested in a better understanding of IR theory, realism, critical security studies, and discourse analysis.

Securitization and Democracy in Eurasia: Transformation and Development in the OSCE Region

by Anja Mihr Brigitte Weiffen Paolo Sorbello

This open-access book presents cutting-edge research on securitization and democratic development in the OSCE Region. Gathering contributions by practitioners and researchers from various disciplines, it presents case studies and highlights recent activities of proactive engagement in democratic institution-building and responding to security threats from the Balkans to Central Asia. The volume is divided into three parts, the first of which focuses on security-related matters, armed conflicts, minorities, and women’s safety, as well as the roles that civil society, foreign governments, social media, and external donors play in this area. These contributions illustrate how the OSCE’s informal approach to peace, security, and securitization as norm entrepreneur is closely linked to the level of democracy among its member states. The second part presents a special section on the political implications of China’s Belt and Road Initiative (BRI), assessing the impact of this infrastructural program on the levels of democracy and/or autocracy in Eurasia. The third part consists of short chapters outlining future research and debates. The book will appeal to students and scholars of international relations, security studies, and the human rights-politics nexus. This is the 2022 instalment in a series of books released by the OSCE Academy in Bishkek. The OSCE works to promote Minority Protection, Security, Democratic Development and Human Rights, guided by the Office for Democratic Institutions and Human Rights (ODIHR), and to enhance securitization and development policies in Eurasia, Europe, Central Asia and North America. Since being founded in 1993, the OSCE and its agencies and departments have attracted a wealth of academic research in various fields and disciplines, ranging from economic development and election monitoring to enhancing global principles of human rights and securitization.

Securitization of the Umbrella Movement in Hong Kong: The Rise of a Patriotocratic System (Routledge Contemporary China Series)

by Cora Y.T. Hui

In recent years, the city many hoped would help democratize China has instead become a research setting in which to study China’s increasing intolerance of dissent. Since Hong Kong’s return to Chinese sovereignty in 1997, China’s treatment of Hong Kong could be divided into three stages: non-intervention, intervention, and securitization. If the July 1 march in 2003 is a watershed that marked Beijing’s change from non-intervention to intervention, this book suggests that the Umbrella Movement in 2014 is another watershed that marked Beijing’s change from intervention to securitization. This book is a theoretically driven case study of the Umbrella Movement, a massive sit-in that paralyzed key business and retail districts for 79 days in Hong Kong in 2014. Many Hongkongers believe that they have the right to a fair election of the chief executive, and Beijing’s insistence on vetting candidates prompted the outbreak of the Umbrella Movement. Drawing insights from the securitization theory and fear appeal literature, the book proposes the framework of “security appeal.” It argues that the outbreak of the Umbrella Movement resulted from a premature use of hard repression, that is, before the government convinced the general public that the Umbrella Movement was a threat. The eventual successful securitization entails a general acceptance of the threatening nature of the Umbrella Movement and agreement with its crackdown. This book concludes that one of the consequences of the securitization of the Umbrella Movement is Beijing’s eventual switch to the policy of “patriotocracy” – a system that allocates power and resources based on one’s professed patriotism – in lieu of One Country, Two Systems. The policy implications and theoretical and methodological contributions of this book will be of interest to scholars and students of security studies; Chinese politics; and various social science disciplines, including political science, psychology, criminology, and sociology.

Securitized Citizens: Canadian Muslims’ Experiences of Race Relations and Identity Formation Post–9/11

by Baljit Nagra

Uninformed and reactionary responses in the years following the events of 9/11 and the ongoing ‘War on Terror’ have greatly affected ideas of citizenship and national belonging. In Securitized Citizens, Baljit Nagra, develops a new critical analysis of the ideas dominant groups and institutions try to impose on young Canadian Muslims and how in turn they contest and reconceptualize these ideas. Nagra conducted fifty in-depth interviews with young Muslim adults in Vancouver and Toronto and her analysis reveals how this group experienced national belonging and exclusion in light of the Muslim ‘other’, how they reconsidered their cultural and religious identity, and what their experiences tell us about contemporary Canadian citizenship. The rich and lively interviews in Securitized Citizens successfully capture the experiences and feelings of well-educated, second-generation, and young Canadian Muslims. Nagra acutely explores how racial discourses in a post–9/11 world have affected questions of race relations, religious identity, nationalism, white privilege, and multiculturalism.

Securitizing Youth: Young People’s Roles in the Global Peace and Security Agenda

by Jeni Klugman Victoria Bishop Nasrat Khalid Valeria Izzi Carole MacNeil Ali Altiok Willice Onyango Grace Atuhaire Matthew Moore Diana Budur

Securitizing Youth offers new insights on young people’s engagement in a wide range of contexts related to the peace and security field. It presents empirical findings on the challenges and opportunities faced by young women and men in their efforts to build more peaceful, inclusive, and environmentally secure societies. The chapters included in this edited volume examine the diversity and complexity of young people’s engagement for peace and security in different countries across the globe and in different types and phases of conflict and violence, including both conflict-affected and relatively peaceful societies. Chapter contributors, young peacebuilders, and seasoned scholars and practitioners alike propose ways to support youth’s agency and facilitate their meaningful participation in decision-making. The chapters are organized around five broad thematic issues that correspond to the 5 Pillars of Action identified by UN Security Council Resolution 2250. Lessons learned are intended to inform the global youth, peace, and security agenda so that it better responds to on-the-ground realities, hence promoting more sustainable and inclusive approaches to long-lasting peace.

Security

by Lucia Zedner

Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the forefront of the criminological agenda. Distinctions between public safety and private protection, policing and security services, national and international security are being eroded. Post-9/11 the pursuit of security has been hotly debated not least because countering terrorism raises the stakes and licenses extraordinary measures. Security has become a central plank of public policy, a topical political issue, and lucrative focus of private venture but it is not without costs, problems, and paradoxes. As security governs our lives, governing security become a priority. This book provides a brief, authoritative introduction to the history of security from Hobbes to the present day and a timely guide to contemporary security politics and dilemmas. It argues that the pursuit of security poses a significant challenge for criminal justice practices and values. It defends security as public good and suggests a framework of principles by which it might better be governed. Engaging with major academic debates in criminology, law, international relations, politics, and sociology, this book stands at the vanguard of interdisciplinary writing on security.

Security Aid: Canada and the Development Regime of Security

by Jeffrey Monaghan

Canada is actively involved through various agencies in the domestic affairs of countries in the Global South. Over time, these practices – rationalized as a form of humanitarian assistance − have become increasingly focused on enhancing regimes of surveillance, policing, prisons, border control, and security governance. Drawing on an array of previously classified materials and interviews with security experts, Security Aid presents a critical analysis of the securitization of humanitarian aid. Jeffrey Monaghan demonstrates that, while Canadian humanitarian assistance may be framed around altruistic ideals, these ideals are subordinate to two overlapping objectives: the advancement of Canada’s strategic interests and the development of security states in the “underdeveloped” world. Through case studies of the major aid programs in Haiti, Libya, and Southeast Asia, Security Aid provides a comprehensive analysis and reinterpretation of Canada’s foreign policy agenda and its role in global affairs.

Security Blurs: The Politics of Plural Security Provision (Routledge Studies in Anthropology)

by Erella Grassiani Tessa Diphoorn

Security Blurs makes an important contribution to anthropological work on security. It introduces the notion of “security blurs” to analyse manifestations of security that are visible and identifi able, yet constructed and made up of a myriad and overlapping set of actors, roles, motivations, values, practices, ideas, materialities and power dynamics in their inception and performance. The chapters address the entanglements and overlaps between a variety of state and non-state security providers, from the police and the military to vigilantes, community organisations and private security companies. The contributors offer rich ethnographic studies of everyday security practices across a range of cultural contexts and reveal the impact on the lives of ordinary citizens. This book presents a new anthropological approach to security by explicitly addressing the overlap and entanglement of the practices and discourses of state and non-state security providers, and the associated forms of cooperation and confl ict that permit an analysis of these actors’ activities as increasingly “blurred”.

Security Community in South Asia: India - Pakistan (Routledge Studies in South Asian Politics)

by Muhammad Shoaib Pervez

The security relationship between India and Pakistan is generally viewed through a neo-realist approach of International Relations.. Treading on a different path, this book explains the rivalry of these countries by looking at the socio-cultural norms found at two levels, elites versus popular. Furthermore, it also conceptualizes a hypothetical India-Pakistan security community that could result in peace in the region. The book describes how the rivalry between India and Pakistan is mostly centred on the elites of the two countries. It highlights the presence of a unique normative structure through social practices found at the popular level, and looks at how the common people of both India and Pakistan share many socio-cultural norms. Employing the theoretical framework of social constructivist approach of International Relations as well as the methodology of critical discourse analysis, the book discusses how an effort can be made to develop the concept of a bottom-up security community, from the popular to the elite level, and the impact this would potentially have for India and Pakistan. An interesting and valuable approach for analysing these issues of security through the socio-cultural lens, this book is of interest to academics and scholars of South Asian Politics, Security Studies and International Relations.

Security Cooperation in Northeast Asia: Architecture and Beyond (Politics in Asia)

by T. J. Pempel Chung-Min Lee

Defining and conceptualizing Northeast Asia’s security complex poses unique quandaries. The security architecture in Northeast Asia to date has been predominately U.S.-dominated bilateral alliances, weak institutional structures and the current Six Party Talks dealing with the North Korean nuclear issue. There has been a distinct lack of desire among regional countries as well as the U.S. to follow in the footsteps of Europe with its robust set of multilateral institutions. However, since the late 1990s, there has been burgeoning interest among regional states towards forming new multilateral institutions as well as reforming and revitalizing existing mechanisms. Much of this effort has been in the economic and political arenas, with the creation of bodies such as the East Asian Summit, but there have also been important initiatives in the security sphere. This book offers detailed examinations about how this potentially tense region of the world is redefining certain longstanding national interests, and shows how this shift is the result of changing power relations, the desire to protect hard-won economic gains, as well as growing trust in new processes designed to foster regional cooperation over regional conflict. Presenting new and timely research on topics that are vital to the security future of one of the world’s most important geographical regions, this book will be of great value to students and scholars of Asian politics, regionalism, international politics and security studies.

Security Dynamics in the Former Soviet Bloc

by Jennifer D. P. Moroney Graeme P. Herd

Security Dynamics in the Former Soviet Bloc focuses on four former Soviet sub-regions (the Baltic Sea region, the Slavic republics, the Black Sea region, and Central Asia) to explore the degree to which 'democratic security', which includes de-politicisation of, and civilian oversight of, the military, resolution of conflicts by international cooperation, and involvement in international organisations. It examines how far states in these regions have developed cooperative foreign and security policies towards their immediate neighbours and key Western states and organisations, explores the interplay between internal and external aspects of democratic security building, and uses case-study examples to show how inter-state bi-lateral and multi-lateral relations are developing.

Security Ethics: Commerce and Crime in a Polycentric World (New Security Challenges)

by Graham James McAleer

This book explores criminal threat to commercial security and the problem of the ethical control of political and criminal risk alongside and in the absence of government. Theoretically, it links ethics to geopolitics and political economy. Security Ethics: Commerce and Crime in a Polycentric World builds from well-known thinkers, but not theorists typically found in books of applied ethics and security studies. Chapters include Francisco de Vitoria&’s account of just war applied to pirates; John Locke on dignity and the illegal trade in body parts; David Hume on community justice combatting cartels; Adam Smith on luxury and knockoffs; Bakunin and anarchist gunrunning; Johan Huizinga on play and crime; David Ross on corporate obligation in the face of partizan risk to hotel security; Carl Schmitt on geography and smuggling; Aurel Kolnai on privilege and corporate secrets; and David Petraeus, author of The US Army/Marine Corps Counterinsurgency Field Manual, respecting ecotage and commercial legitimacy.

Security Games: Surveillance and Control at Mega-Events

by Kevin D. Haggerty Colin J. Bennett

Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events – such as the Olympic Games and the World Cup – on wider practices of security and surveillance. "Mega-Events" pose peculiar and extensive security challenges. The overwhelming imperative is that "nothing should go wrong." There are, however, an almost infinite number of things that can "go wrong"; producing the perceived need for pre-emptive risk assessments, and an expanding range of security measures, including extensive forms and levels of surveillance. These measures are delivered by a "security/industrial complex" consisting of powerful transnational corporate, governmental and military actors, eager to showcase the latest technologies and prove that they can deliver "spectacular levels of security". Mega-events have thus become occasions for experiments in monitoring people and places. And, as such, they have become important moments in the development and dispersal of surveillance, as the infrastructure established for mega-events are often marketed as security solutions for the more routine monitoring of people and place. Mega-events, then, now serve as focal points for the proliferation of security and surveillance. They are microcosms of larger trends and processes, through which – as the contributors to this volume demonstrate – we can observe the complex ways that security and surveillance are now implicated in unique confluences of technology, institutional motivations, and public-private security arrangements. As the exceptional conditions of the mega-event become the norm, Security Games: Surveillance and Control at Mega-Events therefore provides the glimpse of a possible future that is more intensively and extensively monitored.

Security Governance, Policing, and Local Capacity (Advances in Police Theory and Practice)

by Clifford Shearing Jan Froestad

The security governance of South Africa has faced immense challenges amid post-apartheid constitutional and political transformations. In many cases, policing and governmental organizations have failed to provide security and other services to the poorest inhabitants. Security Governance, Policing, and Local Capacity explores an experiment that too

Security In Northeast Asia: Approaching The Pacific Century

by Stephen P Gibert

This book presents to the reader a comprehensive and integrated discussion of the Northeast Asian-Western Pacific region and its relationships to United States and world security concerns and international political stability.

Security In The Middle East: Regional Change And Great Power Strategies

by Shaun Murphy Mark Bruzonsky Samuel F. Wells

This book examines the deep-seated problems in the Middle East and their impact on the United States and its allies. Exploring the disruptive effects of the double-edged sword of nationalism and modernization, the contributors discuss the full range of Western security interests in the region. Case studies of key countries emphasize the prospect for peaceful political, economic, and cultural change. The authors analyze the ramifications of the Arab-Israeli conflict and the threats posed by Soviet penetration. Arguing that confusion and contradiction mark U.S. policy in the Middle East, the book concludes that U.S. strategists should focus not on curing the region's internal problems but on coping with them without sacrificing long-term goals for quick fixes.

Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing)

by Akashdeep Bhardwaj Varun Sapra

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.

Security Interests in Mobile Equipment (Routledge Revivals)

by Iwan Davies

This title was first published in 2002: This collection of essays marks the formal launch of the Centre for Instalment Credit Law at the University of Wales, Swansea. Divided into three sections, it examines the concept of security within domestic law; considers the choice of law rules; and ponders development of uniform law.

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

by Anthony D. Manley

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager‘s Guide to Disasters: Managing Through Emergencies,

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

by Robert H. Deatherage, Jr.

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This second edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes. Security has always been a necessity for conducting business operations in both low- and high-risk situations, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that cause unwanted attention to a person, their family, or business operations. Security Operations, Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. FEATURES • Identifies what can pose a threat, how to recognize threats, and where threats are most likely to be encountered • Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments, especially in high-risk regions • Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view • Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed, and responsible approach to this serious and often high-risk field. Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations, threat assessment, risk management, client relations, surveillance detection, counter surveillance operations, foot and vehicle movements, and building security—blending solid operational theory with practical field experience.

Security and Crime: Converging Perspectives on a Complex World (Key Approaches to Criminology)

by Alison Wakefield

Security and Crime is an authoritative and multidisciplinary analysis of the relationship between security and crime, addressing much of the confusion about its nature and meaning, clarifying its relevance to criminological analysis, and giving due attention to the interdisciplinary nature of the topic. Providing an historical and prospective look at issues within security the book will: trace the development of ′security′ across disciplines situate this contested concept within criminological discourse and concerns explore the rising attention in politics and academic scholarship to ′security′ issues as they relate to crime examine the nature and organisation of interventions to deliver security establish clearly the relationship between security, crime and criminology. International in scope, and broad in coverage, Security and Crime sets out the need to broaden the study of security in a clear, concise style that is easy for students to digest. With comprehensive pedagogical feature including chapter overviews, key terms, study questions, further reading and a glossary, this book is essential for students studying security in criminology, criminal justice, international relations, and related disciplines.

Security and Crime: Converging Perspectives on a Complex World (Key Approaches to Criminology)

by Alison Wakefield

Security and Crime is an authoritative and multidisciplinary analysis of the relationship between security and crime, addressing much of the confusion about its nature and meaning, clarifying its relevance to criminological analysis, and giving due attention to the interdisciplinary nature of the topic. Providing an historical and prospective look at issues within security the book will: trace the development of ′security′ across disciplines situate this contested concept within criminological discourse and concerns explore the rising attention in politics and academic scholarship to ′security′ issues as they relate to crime examine the nature and organisation of interventions to deliver security establish clearly the relationship between security, crime and criminology. International in scope, and broad in coverage, Security and Crime sets out the need to broaden the study of security in a clear, concise style that is easy for students to digest. With comprehensive pedagogical feature including chapter overviews, key terms, study questions, further reading and a glossary, this book is essential for students studying security in criminology, criminal justice, international relations, and related disciplines.

Security and Everyday Life (Routledge Advances in Criminology)

by Vida Bajc

When everyday social situations and cultural phenomena come to be associated with a threat to security, security becomes a value which competes with other values – particularly the right to privacy and human rights. In this comparison, security appears as an obvious choice over the loss of some aspects of other values and is seen as a reasonable and worthwhile sacrifice because of what security promises to deliver. When the value of security is elevated to the top of the collective priorities, it becomes a meta-frame, a reference point in relation to which other aspects of social life are articulated and organized. With the tendency to treat a variety of social issues as security threats and the public’s growing acceptance of surveillance as an inevitable form of social control, the security meta-frame rises to the level of a dominant organizing principle in such a way that it shapes the parameters and the conditions of daily living. This volume offers case studies from multiple countries that show how our private and public life is shaped by the security meta-frame and surveillance. It is essential reading for everyone who is interested in the changes to be faced in social life, privacy, and human freedoms during this age of security and surveillance.

Security and International Politics in the South China Sea: Towards a co-operative management regime (Routledge Security in Asia Pacific Series #Vol. 9)

by Ralf Emmers Sam Bateman

The South China Sea has long been regarded as a major source of tension and instability in East Asia. Managing the risk of possible conflict over disputed claims in the South China Sea has been a significant challenge for regional relations. This book explores international politics and security in the South China Sea. It outlines the history of the South China Sea disputes, and the efforts that have been made to resolve these, assessing the broader strategic significance of the region for major geopolitical powers. In addition, new challenges have emerged of resource management, environmental protection, and most recently, of the security and safety of shipping against the threats of piracy and maritime terrorism. The book discusses the convergence of traditional and non-traditional security issues now appearing to provide a basis for co-operation in the South China Sea. It shows how the challenge of establishing co-operative relations is now being met, largely through agreement between the Association of Southeast Asian Nations (ASEAN) and China in 2002 on the Declaration on the Conduct of Parties in the South China Sea, and a range of recent measures for functional co-operation.

Refine Search

Showing 81,751 through 81,775 of 100,000 results