首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
The study shows how ‘strategic military refusal’ in Israel developed as a rational and institutional means to influence security policies. As opposed to the perspective that sees military refusal as a spontaneous individual act, the study illustrates how organizations operate to distribute military refusal in order to pressure decision-makers to change their military policies. This strategy has proven to be effective when the military is involved with groups that threaten it with refusal – which threatens the military's operational ability and its official and apolitical image. These include soldiers whose civilian authorities, rather than their military commanders, are perceived as an epistemic authority regarding security issues. The case study refers to the impact of strategic military refusal in Israel on security policies and the military doctrine. This was influenced by leftist groups, which, although they belonged to the parliamentary opposition, had dominant presence in the military ranks. Furthermore, the study examines the effect of the use of strategic military refusal on the model of military recruitment.  相似文献   

2.
随着互联网对现实世界的影响越来越大,战略地位越来越突出,获得网络主导权、占据网络制高点成为各国竞相努力的目标。美国在全球网络管理、网络技术、网络文化、网络军事等方面处于霸主地位。美国网络霸权对中国的政治安全、信息安全、文化安全、军事安全造成了极大的威胁。中国应综合采取各种措施,应对美国网络霸权的冲击和挑战,维护国家安全和利益。  相似文献   

3.
ABSTRACT

Traditionally the African concept of security concept has been dominated by land-based conflicts with little attention being paid to maritime threats and the protection of the maritime environment. With the rapid escalation of piracy on the East Coast, the African Union (AU) was compelled to develop a joint strategy to address its changing African Maritime Domain (AMD). This was achieved by the AU’s Africa’s Integrated Maritime Strategy (AIMS 2050) in 2014, culminating in the adoption of a binding maritime security and safety charter in Lomé in 2016. The Lomé Charter should ideally focus the general provisions of AIMS 2050 so that Africa, as a continent, can take responsibility for security and economic empowerment of the AMD. This article considers various maritime security documents against the backdrop of an African context for understanding maritime security, in order to evaluate whether the Lomé Charter, as a manifestation of AIMS 2050, will realise its aspirations. Focussing on security is not sufficient and too much emphasis is placed in the Lomé Charter on restriction rather than development. Strong political will and leadership is required to facilitate implementation, identifying common security concerns to ensure better cooperative and collective strategies in a diverse implementation environment.  相似文献   

4.
This essay locates the West African region in the context of the post-9/11 discourses on terrorism and counter-terrorism, particularly as it relates to the global war on terror. It identifies and analyses the issues and challenges that flow from the integration of West Africa into hegemonic transnational/globalised security arrangements, and the ways in which the emerging state (militaristic) and globalised security framework could reinforce or, paradoxically, undermine regional, intranational human and environmental security in one of Africa's most troubled regions. It critically examines the possibility of a terrorist threat in the region and analyses the global stakes involved in integrating West Africa into the global war on terror. On this basis, it concludes that zero-sum, militarist, globally driven solutions may fail to address the historical, political, and socio-economic roots of a possible terrorist threat in West Africa.  相似文献   

5.
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.  相似文献   

6.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   

7.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   

8.
While the human rights impact of the deployment of state security agencies in the Chiadzwa diamond fields has been explored, it is important to continue to expose the increasing tendency within the sector to take public resources that should be protected by the state and used for the benefit of the people and channel them for personal gain. The security sector stranglehold of President Robert Mugabe and the ruling political party, the Zimbabwe African National Union Patriotic Front (ZANU-PF), has facilitated the siphoning of Chiadzwa diamond revenue into the pockets of individual security personnel. The unfolding sociopolitical crisis in Zimbabwe has also meant that these security personnel have been deployed beyond conflict zones and into traditionally civilian domains, with dire consequences for the public purse. With this in mind, it is asserted that these issues have driven state security agencies to enrich themselves through what is termed in this article as a ‘goat mentality’. The article thus explores the ways in which state security agencies have been deployed and gone on to promote personal enrichment in the Chiadzwa diamond fields.  相似文献   

9.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   

10.
This paper explores the contribution of the African Union (AU) to human security promotion in Africa. It contends that human security concerns informed the formation of the AU. Through the efforts of the AU Commission, the African ruling elite and policy-makers have become aware of human security doctrines. Human security ideas have been integrated into AU binding agreements, declarations, decisions and policies. The commission is now in the difficult, yet most important, phase of trying to persuade significant numbers of the African ruling elite and civil society to accept human security as a guiding principle and the desirable norm. Through the African Citizens' Directorate (CIDO), the commission is using indigenous African civil society groups to institutionalise human security doctrines in Africa. The commission faces serious challenges in its efforts to make human security the only security norm. While member states of the AU that have never been comfortable with the introduction of human security doctrines into the continental integration project are tacitly undermining the CIDO's ability to work with civil society groups to institutionalise the doctrines in Africa, the leaders who enthusiastically supported the integration of human security doctrines into the documents and work of the AU have seemed in recent times to be less resolute in their support of AU Commission's human security work.  相似文献   

11.
In the past, national security for the majority of countries was almost exclusively associated with an external military threat emanating from a rival state(s). This was reflected in the standard models for the demand for military expenditure. The emergence of new security challenges such as terrorism, transnational crime networks, failed and rogue states, has profoundly affected the international security environment and the concept of national security. This note develops a model for the demand for national security expenditure adopting a broader, more inclusive definition of national security and includes concomitant budgetary outlets to meet the new security challenges.  相似文献   

12.
This commentary analyses the international response to the crisis that struck the Central African Republic (CAR) in early December 2013. It examines three intertwined dimensions defining the courses of action available to policymakers dealing with pre-genocidal crises: the politics and institutional manoeuvring shaping the United Nations (UN) Security Council's decision to authorise an enforcement mission without deploying ‘blue helmets’ on the ground; the operational complexities involved in launching rapid reaction forces; and the interdependent logics between peacebuilding and atrocity prevention. The author argues that there are three ways for the UN Secretariat to ensure a more effective response to CAR-type situations: generating political will to respond swiftly to deteriorating crises leading to widespread abuses of human rights by advancing the concept of Responsibility to Protect as a core component of states' national interests; developing strategic frameworks for the deployment of multi-plural missions equipped to avert the actual or potential threat of atrocities; and developing joint early warning and scenario planning between peacebuilding and atrocity prevention agencies.  相似文献   

13.
That West African criminal networks have contributed to the growth of organised crime in Southern Africa is clear. Though often remarked upon, these networks are seldom understood. This essay assesses the information available on how these groups, mainly Nigerian, have penetrated and operated in the region. Technology, mobile phone and the internet, for instance, as well as a reliance on close-knit ethnic groups enable networks to expand their illicit activities very rapidly and at the expense of national law enforcement agencies. Affected by economic decline in Nigeria and blaming that decline on the West, some Nigerian networks view their crimes as justifiable and legitimate business. South Africa, since the end of apartheid is the main focus but Mozambique, Zimbabwe, Angola and Namibia are important points in the chain. Drug trafficking, advance fee fraud, kidnapping, cheque and credit card fraud, stolen goods and trafficking in humans are all part of the repertoire.  相似文献   

14.
受国际毒潮的影响,我国的毒品犯罪形势日趋严峻和复杂,而在毒品犯罪中,走私、运输毒品犯罪占有相当大的比例。由于毒品的走私和运输,带来了毒品的消费,引发了吸毒的蔓延,我国的毒品问题呈现出“多头入境、多线渗透、多点中转、多地集散、多地消费”的状况。研究走私、运输毒品案件的特点,有助于了解走私、运输毒品案件的规律,指导禁毒部门采取有针对性的侦查对策,有力地打击走私、运输毒品犯罪。  相似文献   

15.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   

16.
Using the Boko Haram terrorist group in Nigeria as a point of departure, this paper examines the implications of the operations of terrorist groups on the security and stability of states in West Africa. It predominantly utilises secondary sources of data. Findings indicate that the membership and operations of this terrorist group are spreading across the sub-region. This spread is consequent upon Boko Haram's collaboration with other terrorist groups within West Africa and beyond. This constitutes threats to the security and stability of states in the sub-region. Thus, the paper recommends, among other things: a thorough understanding of the operational strategies of terrorist groups by states and those involved in security policymaking in the sub-region; and for agreements to be reached among Economic Community of West African States (ECOWAS) member states and their governments for collaboration in various areas in order to curtail transnational crime and terrorism, and reduce socio-economic inequality that generates aggressive behaviours among the less privileged.  相似文献   

17.
Heads of State and Government passed the first amendments to the Constitutive Act of the African Union within seven months of the launch of the organization. This article provides a legal analysis of the broadening of Article 4(h) of the Act, the right of intervention, to prevent a “serious threat to legitimate order”. It argues that this clause is inconsistent with the other grounds for intervention, which aim to protect African peoples from grave violations of human rights when their governments are unable or unwilling to do so. The amendment, by contrast, aims to uphold state security, rather than human security. The context in which this and other amendments were adapted from proposals by Libya in Durban 2002 is considered in terms of political implications for the African Union.  相似文献   

18.
Defense budgets in Japan have been complicated compromises from numerous inputs ‐ including threat perceptions, domestic industrial/technological base development, support for the bilateral security treaty with the United States and internal bureaucratic politics ‐ but with the fall of the former Soviet Union, the clearest justification for higher spending disappeared. Double‐digit defense spending increases that were common in the 1980s have been replaced by annual increases lower than present inflation rates, resulting in negative real growth in the country's defense budget. Domestic economic problems and consistent government pressures for smaller budgets have further slowed annual growth in total spending and have contributed to lower procurement budgets. As a result, the domestic Japanese defense industry is facing far more constrained conditions from the growth years of a decade before.

Government policymakers are examining Japan's regional security environment as well as its alliance with the United States to determine the appropriate course for the country to take in the coming years. The formal security treaty with the United States is likely to remain a major element of government positions, but other aspects of the country's overall security posture are open to debate. Perceptions of a reduced threat environment are fueling additional pressures for defense budget cuts.

The domestic defense industry seeks means to assure its survival in domestic defense markets in this constrained environment. Expansion into overseas markets to offset declining domestic markets is an option that currently is constrained by policy restrictions on arms exports. Industry is advocating re‐examination of those policies and unlike earlier years, government appears willing to respond positively but cautiously to this lobbying.  相似文献   

19.
This paper argues that the crisis of electoral democracy in Zimbabwe and Cote d'Ivoire is a result of underlying structural and institutional deficiencies within national and regional multinational institutions. It assesses the extent to which they have been ‘enablers’ or ‘spoilers’ of electoral-based transitions to democracy. Yet it avoids generalisations of the security sector's involvement in political transitions. In terms of structure, the paper is divided into four sections. Section one will briefly discuss the theoretical perspectives of the election-democracy trajectory. It argues that although elections are a major variable for democracy, unless the ‘ecology of elections’ is conducive, elections may not be an instrument of transition to democracy. The second section analyses the militarisation of politics and the role of the security sector in aiding or stalling democratisation. Section three will assess the role of regional organisations such as the Southern African Development Community, Economic Community of West African States and the African Union in electoral-based political transitions in Africa. Lastly, the paper will discuss how the security sector and multinational African institutions can aid political transitions to democracy in troubled African countries.  相似文献   

20.
ABSTRACT

Turkey has maintained its strategic relations with Africa at the highest level under recent AK Party governments in the field not only of low politics but also of high politics. For example, it opened its largest overseas military base in Somalia in 2017 and signed military, defense and security pacts with more than 25 African countries. This article traces the deep historical and cultural relations with Africa behind its newly evolving foreign policy identity, arguing that its booming economic power has been a significant driving force in shaping a new security strategy. It examines what the growing security involvement means for both Turkey and Africa in order to contribute to the relevant literature through a holistic approach from both theoretical and conceptual perspectives.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号