首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Whether or not Colombia has improved is a controversial topic. If improvement has occurred, what, if any, lessons from the Colombian model can be learned? The first lesson is that Colombia's problems were caused more by a weak state than by drugs. The second lesson is that improving state capacity requires more than just increased security. The state must also provide the basic social services that citizens require to gain and maintain their support. Additionally, government institutions need to improve their professionalism, protect human rights, and root out impunity and corruption. The alternative is to suffer from new cycles of violence as old foes are vanquished, but new ones emerge.  相似文献   

2.
NATO officials have cited various reasons for conducting their air campaign in Kosovo. Though not emphasised as much, the concern that NATO's credibility was at stake stood out as the most paramount on the basis of logical comparison. In fact, NATO intervened in Kosovo primarily to maintain its credibility as the Trans- Atlantic's only multilateral security mechanism because its continued existence depended on it. While NATO's search for its new role in the post-Cold War strategic environment has been fraught with several problems, the inclination towards collective security and crisis management has placed it in a position of proactive military obligation. Predictably, NATO's venture in the Balkans this time around has had various implications on its future prospects as an organisation.  相似文献   

3.
The Building Security Overseas Strategy is at its core an ‘Intervention to end all Interventions’ – from a Western as well as an African perspective. Two of its main pillars are security sector reform in specific countries and systematic support to the development of the African Peace and Security Architecture. This article addresses the question why such efforts have met little success in francophone Africa. It argues that the failure of Western advisers to understand the sociological dynamics of African armed forces, shaped by a political culture based on personal loyalty to the leader, is at the root of the problem. In that context, the Huntingtonian-type distinction between the civilians and the military does not apply as military and civilians act in concert within common clientelism systems. As a result of the curtailing of the state-formation experience in most African countries, the military never had to demonstrate its performance as a state builder, nor did it have to bargain its legitimacy against the support of the citizens. Partnership in that context will remain a misnomer, at least until African military can credibly demonstrate commitment to state-building grounded in a broad-based social contract.  相似文献   

4.
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies.  相似文献   

5.
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes.  相似文献   

6.
This paper tests the relationship between military expenditure and economic growth by including the impact of the share of military and civilian components of government expenditure in an economic growth model with endogenous technology. In this framework, we empirically consider the hypothesis of a non‐linear effect of military expenditure on economic growth. Differences between the costs and benefits of the defence sector has traditionally explained the non‐linear relationship suggesting that shocks to insecurity may also be a source of non‐linearity as they determine a re‐allocative effect within government expenditure. While parametric partial correlations are in line with empirical findings, the robustness of estimations is tested by using a non‐parametric approach. The negative relationship between military expenditure and growth in countries with high levels of military burden predicted by theory becomes significant only after including a proxy for re‐allocative effects in the growth equation.  相似文献   

7.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   

8.
随着恐怖主义愈演愈烈,"反恐"成为当今世界各国军事安全部门的中心任务.使用分类型可视化工具Parallel Sets分析国际恐怖主义数据库中多属性分类值间的关系,揭示数据库中的隐性信息,并针对Parallel Sets任意排列分类值产生较多交叉的不足,提出带降势的启发式分类值布局算法,自动优化分类值布局顺序,减轻视图中...  相似文献   

9.
Boko Haram terrorism has been recognized by Nigerian President Jonathan as the most threatening and complex security issue in Nigeria since independence. In response, the Federal Government of Nigeria has committed itself to different counterterrorism measures, which are largely dominated by “hard politics” and military mobilization. Spending heavily on defense to upgrade military hardware and train personnel in a counterterrorism role, Nigeria has also boosted its strategic importance in the “Global War on Terror”. However, this attempt has become unpopular as it has failed to contain Boko Haram within a short time frame and has made insufficient headway against unabated terror, with human rights costs among the host communities and amidst a surge of stakeholders' discordance. As a matter of concern, this article seeks to assess Boko Haram as an opponent in Nigeria's war on terror (WOT) and to ascertain the challenges the country faces, the alternative measures open to it, and possible ways forward.  相似文献   

10.
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.  相似文献   

11.
This article provides a detailed look at the history of the Gambia Armed Forces (GAF), a military that has received very little academic attention within the study of African state security forces. It identifies key turning points in the GAF’s history, and highlights the vastly different roles the military played in the state under President Jawara (1965–94) and President Jammeh (1994–2017). Yet, it also highlights important similarities regarding internal patterns within the armed forces and shows the ways in which these continuities may challenge attempts to restructure the security sector. The article draws on archival research and interviews conducted with retired and active duty Gambian military personnel, government officials, and Gambian scholars.  相似文献   

12.
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy.  相似文献   

13.
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland.  相似文献   

14.
This paper is a survey of Angola’s defence sector and policy from 1992, the year the civil war ended, to 2012. Angola achieved its independence upon the Popular Movement for the Liberation of Angola (MPLA) defeating National Union for the Total Independence of Angola. Since then, fuelled by its rich natural resources, the country has grown steadily. The MPLA military forces were a central factor behind independence and maintain their central role to this day. Moreover, Angola’s support for African peace with monitoring military missions is a clear indication that the country aims to intervene in African security and military issues, with its military capabilities funded by oil revenues.  相似文献   

15.
Extant literature documents a relationship between military deployment and the risk of an international terrorist attack against citizens of the deploying country. It appears that deployment significantly increases the possibility of terrorist actions in the home country. In particular, if country A decides to send troops to nation B, then citizens of the former country are more likely to fall victim of an attack carried out by a terrorist organisation originating from the latter country. Contributing to this line of literature, we further refine this relationship by distinguishing between regions where the troops are sent as well as by introducing differences between types of deployment. Our results indicate that missions to Asia and the Middle East are more dangerous than missions to other regions as reflected by the terrorist threat in the home country. Robustness tests do however show that the significance of the location variable Asia is predominantly attributed to the mission to Afghanistan. As for types of deployment, only ad hoc missions seem to increase the risk of an attack, whereas no significant results are found for other missions such as operations under UN and NATO flag. Leaving out the missions to Iraq and Afghanistan however also increases the danger resulting from missions by fixed coalitions. Our results find however no evidence that ‘wearing a blue helmet’ increases the probability of a terrorist attack at home.  相似文献   

16.
The privatization of activities previously performed by government has been a major characteristic of economic policies over the past two decades. This article examines the potential for privatization of military activities in the African context. Four categories in which this has or might occur are mercenaries employed by a government to provide for defence or to supplement its own military; private security company personnel employed to protect economic assets or to advise and train the local military; the contracting out of the provision of goods and services ranging from heavy weapons through to accounting services; and the transfer of non-core activities currently undertaken by the military to other government departments or civilian bodies. Of these, the last is of potential importance in Africa, given the wide range of activities which its militaries have come to perform. Three examples where private sector organisations or other government departments could play a much larger and probably more cost-effective role are peacekeeping, internal security and surveillance, resource protection and rescue activities.  相似文献   

17.
In the aftermath of 9/11, the USA embarked on a massive global hunt for terrorists and launched its “Operation Enduring Freedom” in Afghanistan. Its failure to control insurgency in Afghanistan spilled over into Pakistan, with disastrous consequences. The resurgence of the Taliban with more formidable tactics and maneuvering skills has become more troublesome for both Afghanistan and Pakistan and for the USA and its allied forces. The fierce comeback of the insurgents has challenged the political and territorial integrity of Pakistan, one that it cannot tolerate. This article analyzes the current situation and its implications for Pakistan's security. Moreover, it looks into the internal and external security complexities that Pakistan faces and the possible implications of the US exit strategy for Pakistan's security. It concludes that the security situation in Pakistan is continuously deteriorating and no part of her territory is immune from terrorists' attacks. To be successful, Pakistan must pursue a broad-based strategy that encompasses military, political, social, economic and informational domains aimed at accomplishing four major objectives: (1) elimination of foreign terrorists and their facilitators; (2) strengthening of the political and administrative institutions in the Federally Administered Tribal Areas (FATA); (3) establishing a safe and secure environment conducive for sustained development and the realization of real socio-economic progress and (4) integrating the FATA into the national mainstream. In the long term, a strategy based on the concept of “Enlightened Moderation” is the right solution, not only to the internal problems of Pakistan but also for the Muslim world and the international community.  相似文献   

18.
Despite problems of violence domestically, Brazil has played a key leadership role as part of MINUSTAH peacekeeping operations in Haiti since 2004. This article addresses how Brazil's international military engagement is shaping domestic approaches to urban security, and what may be the implications of the use of military strategies, operations, and norms to address issues of public security in Brazilian cities. It is argued that current approaches toward urban security employing military-trained peacekeepers actually represent a continuation of old paradigms, yet these recent militarised approaches are likely evolving into newer and potentially more accountable forms by constraining indiscriminate use of force and establishing a positive state presence in marginal urban areas. As such, the article connects long-established issues of dealing with urban violence in Latin America with ongoing debates in the United States and beyond about post-counterinsurgency approaches to increasingly urban conflict settings. It reflects on potential lessons to be learned from the Latin American perspective, while showing also how these have changed over the last decade. The article concludes that despite the potential utility of force in some urban conflict settings, this approach could entail a normative shift towards legitimising forceful containment of violence, and hinder democratic consolidation in Brazil.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The increasing use of private military and security companies (PMSCs) has attracted considerable scholarly attention due to its corrosive effects on US democracy. Drawing on neoclassical realism, this article provides a comparative dimension to the study of the political drivers of military privatisation by analysing contractor support to US and UK operations in Iraq and Afghanistan. Domestic political constraints have shaped both US and UK response to the need for more boots on the ground, increasing the propensity to use contractors as a force multiplier in spite of their problematic impact on military effectiveness.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号