首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
This article explores gender and security sector reform (SSR) in Zimbabwe from 2008 to the present. It firstly postulates that the purpose of gender-sensitive SSR is to transform security services so as to enhance human security, as opposed to having an exclusive focus on state and territorial security. A comprehensive analysis of the policy and legislative framework governing gender and SSR at the global, continental, sub-regional and national levels will be presented, followed by the argument that efforts to reform the partisan and oftentimes non-professional tendencies of the security sector – especially the Zimbabwe Defence Forces, Zimbabwe Republic Police, Central Intelligence Organisation and Zimbabwe Prison Services – to promote democracy have met with firm resistance. However, gender-sensitive SSR has made significant headway in Zimbabwe since it is considered less threatening by the government. It should be noted, nevertheless, that gender-sensitive SSR has the potential to shift levels of professionalism and accountability within the sector as well as change attitudes to enhance security at the personal and communal levels. The process can gradually increase the percentage of women serving in the security sector. In conclusion, recommendations are made to broaden and deepen gender-sensitive SSR as the only viable alternative in the current political environment in Zimbabwe.  相似文献   

2.
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   

3.
This paper argues that the crisis of electoral democracy in Zimbabwe and Cote d'Ivoire is a result of underlying structural and institutional deficiencies within national and regional multinational institutions. It assesses the extent to which they have been ‘enablers’ or ‘spoilers’ of electoral-based transitions to democracy. Yet it avoids generalisations of the security sector's involvement in political transitions. In terms of structure, the paper is divided into four sections. Section one will briefly discuss the theoretical perspectives of the election-democracy trajectory. It argues that although elections are a major variable for democracy, unless the ‘ecology of elections’ is conducive, elections may not be an instrument of transition to democracy. The second section analyses the militarisation of politics and the role of the security sector in aiding or stalling democratisation. Section three will assess the role of regional organisations such as the Southern African Development Community, Economic Community of West African States and the African Union in electoral-based political transitions in Africa. Lastly, the paper will discuss how the security sector and multinational African institutions can aid political transitions to democracy in troubled African countries.  相似文献   

4.
Much is made in the security sector reform literature of the role of civil society as an overseer and monitor of the security sector, contributing to improved accountability and governance. This paper looks at how the notion of ‘civil society capacity’ needs to be disaggregated in order to develop meaningful strategies to assist civil society organisations to impact security sector reforms in complex, post-conflict contexts like the Democratic Republic of Congo. It draws on fieldwork conducted with 200 Congolese civil society groups that are attempting to engage in current security sector reform processes, and looks at which capacities are required to improve oversight by civil society groups.  相似文献   

5.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   

6.
While the human rights impact of the deployment of state security agencies in the Chiadzwa diamond fields has been explored, it is important to continue to expose the increasing tendency within the sector to take public resources that should be protected by the state and used for the benefit of the people and channel them for personal gain. The security sector stranglehold of President Robert Mugabe and the ruling political party, the Zimbabwe African National Union Patriotic Front (ZANU-PF), has facilitated the siphoning of Chiadzwa diamond revenue into the pockets of individual security personnel. The unfolding sociopolitical crisis in Zimbabwe has also meant that these security personnel have been deployed beyond conflict zones and into traditionally civilian domains, with dire consequences for the public purse. With this in mind, it is asserted that these issues have driven state security agencies to enrich themselves through what is termed in this article as a ‘goat mentality’. The article thus explores the ways in which state security agencies have been deployed and gone on to promote personal enrichment in the Chiadzwa diamond fields.  相似文献   

7.
8.
Confronted with myriad security challenges, African states and the much-vaunted peace and security architecture of the African Union (AU) has proven not to be up to the challenge. Indeed, this is implicitly acknowledged by the AU itself if one considers the creation of such security structures as the African Mission in Somalia (AMISOM), which exists outside its peace and security architecture. This paper argues for a radical rethink of security structures on the African continent – one in which state structures of security coexist with newer forms of security actors, including private military companies (PMCs), community movements and the business sector. Whilst this shift in security actors is already happening on the ground, policymakers need to embrace this new reality.  相似文献   

9.
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.  相似文献   

10.
The Arab Spring, a pro-democracy uprising that has been sweeping through North Africa and the entire Arab world since 2010, has been described as a cataclysmic revolutionary wave that has left the overthrow of political regimes in its wake. Studies have comprehensively x-rayed the political and socio-economic circumstances that gave rise to the uprising. Apart from the impact of the uprising on political developments and democratic governance in the Arab world in particular and the world in general, the circumstances that resulted in the revolutions constitute empirical security implications for Nigeria. This is the focus of this article. Using the Ibrahim Index of African Governance (IIAG) and other selected indicators, this article draws a comparative analysis of the key factors that led to the uprisings in Egypt, Libya and Tunisia, pointing out areas of social and security tensions in Nigeria. Based on these findings, it points out the urgency of and imperative for security sector reforms in Nigeria.  相似文献   

11.
城市环境安全评价初探   总被引:6,自引:1,他引:5  
环境安全研究目前主要停留在定性描述或定量评价自然生态安全阶段。考虑 到大中城市在经济建设和社会发展中的重要功能及城市生态系统的结构特殊性,首先定义 了城市环境安全范畴,并探讨了城市环境安全评价方法,提出了评价的程序和评价指标的选 择原则,最后提出了一个城市环境安全评价指标体系。  相似文献   

12.
对警卫工作来说,新闻媒体就是一把双刃剑,既有积极影响,又有消极影响。警卫工作者要对新闻媒体的应对之策进行深入研究,力争扬其所长,避其所短,达到互利共赢。  相似文献   

13.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   

14.
From 1964 to 1975 a small group of British officers, advisors, and trainers guided the forces of the Sultanate of Oman to victory in their conflict with the Marxist insurgents of the People's Front for the Liberation of the Occupied Arabian Gulf (PFLOAG). This campaign provides a clear example of how to effectively support an ally's counterinsurgency efforts with a minimal commitment of men and material. In particular, the critical assistance provided by the British consisted of experienced leadership and skilled technical support personnel as well as a viable strategy for victory. However, more important for the ultimate success of the counterinsurgency campaign was the emergence of new progressive leadership with the accession of Sultan Qaboos. The most important lesson from this study is that while security assistance can reinforce positive political efforts, it is not enough on its own to bring about a victory in an unfavourable political environment.  相似文献   

15.
众所周知,Vo IP技术在未来语音通信中所占的比重越来越大。随着Vo IP的不断发展,基于SIP协议的Vo IP应用也不断增多。但是,由于SIP协议高度依赖于开放的IP网络,使得其安全性逐渐成为关注和探讨的焦点。主要分析了SIP协议网络面临的一些安全威胁,包括典型的外部攻击技术和协议自身存在的漏洞等。探讨了为应对SIP安全威胁提出的加密、认证等安全策略并且分析了这些安全策略的优缺点,提出了针对SIP安全策略进一步改进的方向,旨在不断提高和完善基于SIP协议的安全性能。  相似文献   

16.
社会保障制度作为“社会安全阀”,其与社会稳定之间存在正相关关系;但在实践中,由于我国社会保障制度不健全,保障调节功能弱化,又影响了社会稳定,其与社会稳定之间存在负相关关系。因此,必须尽快建立一套完整而切实可行的社会保障制度,以保证社会的稳定与发展。  相似文献   

17.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

18.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   

19.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   

20.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号