首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 609 毫秒
1.
The security sector reform (SSR) programme in the Democratic Republic of the Congo (DRC) has failed, according to a former high-level member of the United Nations (UN) mission in the DRC, as a large section of the country remains outside government control, and the security institutions of the state continue to constitute one of the predominant sources of insecurity for the local population in a number of ways. Based on several field studies, this article critically scrutinises the SSR of the Congolese National Police (Police nationale congolaise; PNC) and the efforts to reform it between 2004 and 2016. It further attempts to explain why so little progress was made in the SSR of the PNC, despite extensive involvement from donors. The article shows that the instrumental and traditional approach to SSR is partly to blame, because in this case it failed to address the root problems and initiate the needed fundamental reform and reconstruction of the police force. It also shows that reforming local security institutions becomes even more difficult when the local authorities do not support the effort.  相似文献   

2.
This article presents a synopsis of Community of insecurity: SADC's struggle for peace and security in southern Africa, published by Ashgate in 2012. It focuses on SADC's efforts to establish a common security regime; conflict and peacemaking in southern Africa between 1992 and 2011; and the prospects of SADC becoming a security community. It summarises the reasons for SADC's difficulties in the sphere of regional security and politics, namely the weakness of member states, their unwillingness to surrender sovereignty to communal mechanisms, and the absence of common values among them. The main conclusion is that these problems lie primarily at the national level and cannot be solved at the regional level. SADC is a forum of states and it cannot do anything that these states will not permit it to do.  相似文献   

3.
Countries with a federalist system of government have different arrangements for providing national security. US national security is provided by national and State defense forces. The quintessential national function – national defense – experienced some changes that enhanced the role of the States. Policy changes in the National Defense Authorization Act of 2008 (2008 NDAA) introduced new roles for the Governors and the State defense forces, or the National Guard. This article explores how the interests of Congress and States aligned in the 2008 NDAA such that the national defense function changed. This article finds that the national government continues to have the central coordinating role, but that the politics and provisions of the 2008 NDAA changed the national–State relationship in mission, decision-making, and command and control so that US federalism in the national defense function is evolving in unexpected ways.  相似文献   

4.
US Army Major Paul Marks discusses the history of American advisory efforts during the Cold War and recommends that the concept and the use of advisors be revived as a tool of contemporary American foreign policy. The failure of American advisors to turn the South Vietnamese armed force into a viable entity and the lack of public knowledge about the success of advisors in El Salvador in the 1980s contribute to a bias against advisors in the public, the government, and the military. The article argues that in today's evolving security environment where the large scale commitment of US troops is neither feasible nor necessary, US national interests can still be advanced through the judicious use of advisors. The article proposes a Joint publication as the doctrinal basis for the employment of advisors.  相似文献   

5.
This article explores the relationship between ethnic representation in security sector institutions and perceptions of safety. While most studies on post-conflict institutional reform focus on national institutions and outcomes, this article argues that a more nuanced view on ethnic representation is fruitful in order to account for the everyday perceptions of local people. Drawing on post-conflict Kosovo, the article analyzes how the representation of ethnic minorities in security institutions affects perceptions of safety among individuals across Kosovo’s municipalities. It also analyzes original interview data collected in the Pristina and Mitrovica municipalities that are typical cases of our sample. Both approaches validate that those municipalities that have ethnically representative security institutions also have higher levels of perceived safety.  相似文献   

6.
This article provides a detailed look at the history of the Gambia Armed Forces (GAF), a military that has received very little academic attention within the study of African state security forces. It identifies key turning points in the GAF’s history, and highlights the vastly different roles the military played in the state under President Jawara (1965–94) and President Jammeh (1994–2017). Yet, it also highlights important similarities regarding internal patterns within the armed forces and shows the ways in which these continuities may challenge attempts to restructure the security sector. The article draws on archival research and interviews conducted with retired and active duty Gambian military personnel, government officials, and Gambian scholars.  相似文献   

7.
American policy-makers are predisposed towards the idea of a necessary war of survival, fought with little room for choice. This reflects a dominant memory of World War II that teaches Americans that they live in a dangerously small world that imposes conflict. Critics argue that the ‘choice versus necessity’ schema is ahistorical and mischievous. This article offers supporting fire to those critiques. America's war against the Axis (1941–45) is a crucial case through which to test the ‘small world’ view. Arguments for war in 1941 pose overblown scenarios of the rise of a Eurasian super-threat. In 1941 conflict was discretionary and not strictly necessary in the interests of national security. The argument for intervention is a closer call that often assumed. This has implications for America's choices today.  相似文献   

8.

In October 1959 the Eisenhower administration dispatched a CIA Special Team to survey the violence problem in Colombia. This article, part one of a two‐part series, examines this first significant attempt by a US administration to influence that nation's internal security situation. It investigates the Special Team's actions and analyses its recommendations for transforming Colombia's conventionally‐orientated security forces. The Team's survey, which focuses on counter‐insurgency tactics, civil action, intelligence operations, psychological warfare, and covert action, is the foundation from which Colombia's modern internal security structures are derived.  相似文献   

9.
It is almost universally accepted that security is achieved by having a strong mititary. South African defence policy and practice is based squarely on such thinking. Yet this thinking can be challenged at a number of levels. In particular, it is not consistent with new thinking about security, in which territorial security is far less important, for example, than poverty and inequality; it is not consistent with present or conceivable future threats faced by the nation; and military expenditure hinders economic growth and thereby development. The article presents a number of alternative ways of achieving security that are, arguably, less costly and more effective than a conventional military. It concludes by sketching some or the broad features of a demilitarised society and some of the major tasks of demilitarisation. Chief among these will be to change the way people think about the military and security.  相似文献   

10.
This article examines Poland's national potential and its international position within the European Union (EU) with respect to security issues. It presents research results based on a comparison of Poland's national potential as it relates to other EU countries, which is useful when evaluating Poland's power within the EU. The article also evaluates Poland's crisis potential, i.e. it identifies those factors that may potentially be treated as threats to national and regional security. Finally, it enables the identification of challenges to Poland's security in the second decade of the twenty-first century. The research is conducted according to a multidimensional comparative analysis, which is perceived by the author as the best available to measure a country's power despite its weaknesses.  相似文献   

11.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox.  相似文献   

12.
With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy – strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties.  相似文献   

13.
Warlord is a label that currently besets us on all fronts. The 2001–2002 military action in Afghanistan is illustrative of the West's ambivalent view of armed factions in the developing world in general. The demonisation of the Taliban and the elevation of the former ‘warlords’ of the opposition to the rather more grandiose sounding ‘Northern Alliance’, at once formalising the hitherto informal nature of the warlord system, implies that the term ‘warlord’ is synonymous with anarchy, violence and a breakdown in civilised values. ‘Warlord’ has become an ugly, detrimental expression, evoking brutality, racketeering and terrorism. Analysts referring to violence across developing countries routinely refer to ‘new wars’ and ‘post-modern’ conflict, and yet the language used to describe these phenomena is usually pre-modern (medievalism, baronial rule, new feudalism). This article outlines some examples of historical warlords and draws out the common issues. In particular it emphasises the fact that warlords have been present for centuries and have periodically emerged whenever centralised political-military control has broken down. All that has changed through history is the technology available to each generation and the relative economic base. The article concludes with a series of implications for policy-makers currently considering intervention in warlord-based economies.  相似文献   

14.
新疆地处祖国的西北边陲,占有重要的地理位置,是我国一个重要的历史民族区,有着悠久的历史,民族关系十分复杂。新疆民族关系处理的好坏,直接影响着社会稳定和经济发展及祖国的边防安全。本文从民族关系的一般情况入手,分析了影响新疆民族关系的各种因素,进而分析了新疆民族关系的发展趋势。  相似文献   

15.
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   

16.
This article presents a regional overview of US‐Latin American security relations, focusing on those countries where US national security interests are most likely to be endangered over the next two decades. The author examines the current US strategy of ‘shaping’ the Latin security environment, with a view to assessing the strength and weaknesses of this approach. The article presents some policy recommendations, including the recommendation that the US do more to redress the historical imbalance in Latin American civil‐military relations by strengthening civilian institutions. It also argues that at the regional level a major effort be made to recapture momentum toward the creation of a Free Trade Association of the Americas.  相似文献   

17.
This article begins with a discussion of sovereignty and goes on to discuss the idea of national security threats with reference to two different levels of analysis. First, the traditional-legal versus a more realistic contemporary level of analysis. Second, the operational, strategic, and political levels of analysis. The traditional concept tends to focus attention on the tactical-operational levels of activity, and the more contemporary notion broadens analysis to more strategic-political concerns. The article concludes with the argument that a broadened concept of threat to national security and sovereignty is meaningful and important. This is particularly important for those governments in the Western Hemisphere – and elsewhere – that do not discern any serious security issues, or proverbial clouds, on their peaceful horizons. Ample evidence indicates that non-traditional security problems can lead nation-states to failing or failed state status. That is to say, as examples, dysfunctional states, criminal states, narco-states, rogue states, and new ‘people's democracies'.  相似文献   

18.
This article explores how transnational borderlands matter for conflict prevention and, in particular, so-called upstream engagement, which aims to reduce threats to global stability and security that arise from the world’s increasing interconnectedness. Accounting for transnational borderlands in vulnerable regions is crucial for conflict prevention as pursued by the defence and security sector because borderlands are catalysts of the negative side of global interconnectedness: they are business hubs for transnational organised crime, sites of retreat for conflict actors, and safe havens for terrorists. The border areas’ proneness to impunity and the ability of violent non-state actors to govern these spaces illicitly contribute to the emergence of these characteristics. I therefore argue that upstream conflict prevention needs to do two things to address these risks: first, to overcome a national security approach centred on the borderline and instead acknowledge transnational security dynamics in borderlands on both sides of the border; second, to overcome the state-centred governance lens to also consider governance exerted by non-state actors. The article draws on empirical data from a six-year study including over a year of fieldwork in and on Colombia’s borderlands.  相似文献   

19.
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China.  相似文献   

20.
This critical comment examines the incentives, major priorities, difficulties and first results of the Russian military reform that is being implemented since 2008. The authors conclude that despite numerous drawbacks and barriers to the reformist efforts certain successes can be identified. Particularly, there is a clear shift from the old-fashioned, Soviet-type army to a more compact, mobile, better equipped and combat-ready armed forces that are capable to cope with today's challenges to Russian national security.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号