首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
Confronted with myriad security challenges, African states and the much-vaunted peace and security architecture of the African Union (AU) has proven not to be up to the challenge. Indeed, this is implicitly acknowledged by the AU itself if one considers the creation of such security structures as the African Mission in Somalia (AMISOM), which exists outside its peace and security architecture. This paper argues for a radical rethink of security structures on the African continent – one in which state structures of security coexist with newer forms of security actors, including private military companies (PMCs), community movements and the business sector. Whilst this shift in security actors is already happening on the ground, policymakers need to embrace this new reality.  相似文献   

2.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

3.
After 15 years of war in Afghanistan and Iraq, many now see ‘small-footprint’ security force assistance (SFA) – training, advising and equipping allied militaries – as an alternative to large US ground-force commitments. Yet, its actual military efficacy has been little studied. This paper seeks to fill this gap. We find important limitations on SFA’s military utility, stemming from agency problems arising from systematic interest misalignment between the US and its typical partners. SFA’s achievable upper bound is modest and attainable only if US policy is intrusive and conditional, which it rarely is. For SFA, small footprints will usually mean small payoffs.  相似文献   

4.
‘The Middle East talks the talk, but it doesn't walk the walk’, argues Heller when relating to attempts by parties in the region to create some kind of a cooperative security relationship. Concepts of regional security have simply been grafted onto traditional political-military doctrine, with the result that multilateralism has become just another vehicle for pursuing long-standing policy. He shows this with regard to the Middle East peace process as well as the Barcelona Process and attempts to forge a Euro-Mediterranean Partnership. What should be done in order to promote the process? Heller's conclusion is that moving along the track of cognitive convergence while bypassing the sequencing problem by simultaneously pursuing both peace and security building will help mitigate some of the major problems in regional security.  相似文献   

5.
Scholars and policymakers argue that violent actors – termed ‘spoilers’ – pose a significant threat to civil war peace agreements. Yet existing research, which is overly reliant on single-case studies, has not effectively determined how prevalent spoiling is, or thoroughly examined what its ultimate effects are on peace agreements. This article draws on a newly constructed cross-national dataset of spoiling following 241 civil war peace agreements in the post-Cold War era to analyze spoiling. It finds that spoiling intended to terminate an agreement is not as common as typically assumed, but still plagues a sizeable number of peace agreements. Moreover, most actors who resort to this strategy typically fail in their goals and the agreement is not at risk, despite the high publicity and attention given to these threats. Yet particular types of actors, most notably paramilitaries and state security forces excluded from the agreement, can pose a significant threat to peace.  相似文献   

6.
Since the 2003 war in Iraq, private military and security companies (PMSCs) have become increasingly legitimate actors in modern conflicts. Despite this normative shift, rumours in March 2015 regarding the use of South African mercenaries in Nigeria to combat Boko Haram insurgents caused an international outrage, while the Nigerian government remained nonchalantly silent on the matter. This article investigates the impact of mercenaries on the conflict in the last six months of the Jonathan government. Using primary and secondary qualitative research, it assesses the role that PMSCs played in Nigeria’s counterinsurgency strategy, along with the ensuing reaction of international and local media to the outsourcing of violence to foreign companies. The article concludes that – notwithstanding the improved image of PMSCs in the world, and the actual impact of the contractors on the Nigerian counterinsurgency effort – the stigma of mercenaries continues to plague the industry, particularly on the African continent.  相似文献   

7.
Abstract

Post-interventionist security assistance is premised on non-normative security understandings and flexible arrangements between external and local actors. In hybrid political regimes or areas of limited statehood, these forms of assistance, while strengthening specific aspects of a country’s security context, reinforce some domestic actors vis-à-vis others thanks to processes of selective borrowing by local political elites. This paper demonstrates how such processes contribute to the proliferation of hybrid elements in the country’s security sector. In two contrasting case studies, we illustrate how security assistance packages in Lebanon and Tunisia have diluted emerging democratic reforms, producing more coercive manifestation of state power.  相似文献   

8.
石亮 《国防科技》2021,42(4):26-31
当前,无人作战系统在大规模、高烈度、高科技体系对抗中的安全防护能力尚显不足,需从多方面加以提升。本文首先从自然环境、协同运用、综合对抗以及自主权限给无人系统带来的安全风险为出发点,深入分析了无人系统的安全防护需求;其次,根据需求,总结了无人系统安全防护的目标,并分别从提升无人系统环境适应性能、降低无人系统可探测概率、强化无人系统抗毁伤能力、夯实无人系统自主作战安全性设计等四方面详述了无人系统可采取的安全防范措施;再次,利用体系防护资源,结合无人平台和载荷的防护基础,提出了内外一体的、控制与防护分离的协同安全架构;最后,对无人系统安全防护的未来发展趋势进行了展望。  相似文献   

9.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   

10.
This article investigates how key actors within the US defence policy community realigned their interests to forge a new consensus on the redirection of US defence strategy following the ‘peace shock’ they faced with the collapse of bipolarity. This consensus centred on the idea that achieving US security in the ‘age of uncertainty’ demanded overwhelming US military power, which was widely interpreted as necessitating military capabilities to fight multiple major theatre wars simultaneously against regional ‘Third World’ adversaries. This helped to preserve many of the principal pillars of US Cold War defence policy through deflecting calls for more radical organisational changes and deeper cuts to defence budgets.  相似文献   

11.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   

12.
Why did the Palestinian Authority established in 1994 create 12 security forces when Eritrea, which achieved independence in 1994, made do with one conventional army? This article attempts to explain the variation in the structure of national security systems in Third World states as a function of two basic factors: the state's political and social heterogeneity and the state's relative importance to US foreign policy and security concerns. Authoritarian one-party and centralizing states tend to fragment their security forces more than states that cultivate social or political pluralism. Fragmentation is a classic exercise of divide and rule. But a tradeoff exists between fragmentation and assuring internal security on the one hand, and ensuring offensive capabilities to ward off external enemies, on the other. Hence the importance of a strong foreign ally – preferably the United States. According to this model, centralized homogenous states enjoying US protection will tend to fragment or bifurcate their security systems most.  相似文献   

13.
What explains the variation in states’ nonstate partners in civil warfare? States often use nonstate actors to do what their regular military forces cannot do well – navigate the local population. Some of their nonstate partners are ordinary civilians, while others are battle-hardened fighters with a rebellious or criminal past. The choice of proxy carries serious implications for the patterns and effects of violence during civil war, human rights, and international security. This article is the first to disaggregate the nonstate counterinsurgents and offer an explanation for why and how states use each type. It brings together the politics of collaboration with the politics of exploitation. The article shows that the state’s use of nonstate proxies is shaped by the supply of willing collaborators, the state’s ability to exercise control over them, and the trade-offs underlying the use of the different types of nonstate actors. The empirical evidence used to support this argument comes from a novel, comparative study of Turkey’s counterinsurgency campaign against Kurdish separatists and India’s counterinsurgency against Kashmiri separatists. The original data were collected through fieldwork in the disputed territories of each country.  相似文献   

14.
This paper is a review piece examining the main factors responsible for the civil war, lasting from 1988 to 1998, on Bougainville island, an autonomous region in Papua New Guinea. History, economy, and social aspects of the island – especially traditional society features, mining activities, the effects of colonization and industrialization – are highlighted. The aim of the article is to identify which factors best explain the outbreak of the conflict. The main assumption is that no single factor can explain the civil war, as these elements require a comprehensive analysis. The ‘resource curse’ theory, i.e. the presence of natural resources leading to economic failure, and the existence of ethnic cleavages, are proposed as explanations, although further factors must also taken into account. Finally, the analysis helps to contextualize the unfolding events in Bougainville and its path to democratization.  相似文献   

15.
翟东航  张娜  段慧娇 《国防科技》2017,38(2):105-110
提出互联网+时代军队院校面临与军队新型作战能力培养有关的国家安全时代课题,从整合新媒体网络资源、依托校园文化平台、构建国家安全教育体系三方面进行了对策分析,重点探索与新军事变革密切相关的"文化安全、军事话语传播、地缘政治"等议题,以学术活动的顶层设计将国家安全教育融入军事院校学员具有中国特色的军事理论创新。  相似文献   

16.
This article examines the debates in Israel between 2009 and 2013 over Iran’s nuclear programme as a reflection of a particular type of civil–military or civil–security relationship. It analyses how key actors within that relationship – particularly those with an intelligence background – engaged with media outlets in Israel and further afield to influence domestic and international opinion over how best to contain Iran’s nuclear ambitions. In so doing, it seeks to address one fundamental question: are governments in Jerusalem any longer the final arbiters over deciding what is in the national security interests of the State of Israel?  相似文献   

17.
Trafficking in persons in Nigeria has largely targeted adults and children, particularly women and girls. Of growing concern, however, is the recent emergence and growth of sophisticated and syndicated groups involved in baby ‘factories’ and trafficking in Nigeria. This article examines the nature, actors, modus operandi and motives behind this emergent dimension of human trafficking in Nigeria. It concludes that if concerted efforts are not made to deal with the actors and dismantle the market, its profitability will embolden current actors and even encourage new entrants into the booming trade – now and in the future.  相似文献   

18.
The EU Global Strategy (EUGS) is a broad and ambitious document in terms of its geographic scope and thematic priorities. However, the EU cannot devote equal attention to all aspects of the EUGS; so there is still scope for more clarity regarding the EU’s core strategic aims. This article argues that in addition to fostering internal cohesion, the EU’s strategic priority must involve stabilizing its own neighbourhood. This task has challenged the EU for decades because of an inherent credibility deficit regarding the EU’s own capabilities, yet the EUGS does not diagnose and remedy this problem as effectively as it could have. Therefore much more work will need to be done in terms of reforming EU institutions and developing common capabilities if the EU hopes to achieve its central internal and external security goals as outlined in the EUGS and related policy statements.  相似文献   

19.
Abstract

The creation of the Africa Command (AFRICOM) has reflected the growth in the strategic importance of Africa in US foreign policy since the end of the 1990s. One of the objectives of this new geographical military command is to forge closer links between foreign, security and development policies. However, this approach met with a number of difficulties associated with the challenge of ‘inter-agency cooperation’ among rather disparate actors from foreign affairs, defence and development. In addition, the establishment of AFRICOM has met with fierce criticism in the US and elsewhere – especially in Africa – culminating in the charge that the US foreign and development policies in Africa are being militarised. Although AFRICOM has a number of interesting features, this paper shows that it has reacted to these criticisms by realigning itself more closely with the traditional model of a military command, at the expense of the innovative interagency elements.  相似文献   

20.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号