首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
This article highlights and critiques the underlying conceptualisations and assumptions of the women, peace and security (WPS) agenda that emerged with the adoption of United Nations Security Council Resolution 1325 in 2000. The main argument is that we need to rethink the WPS agenda to produce more holistic and groundbreaking responses for the types of challenges encountered, i.e., that gender inequality and insecurity are deep rooted and multi-layered, and thus negate mechanistic responses that do not deal with cultural and structural issues. It specifically focuses on gender and peace-making and gender and peacekeeping to point to the pitfalls in the current conceptions and practices in this arena.  相似文献   

2.
This article explores gender and security sector reform (SSR) in Zimbabwe from 2008 to the present. It firstly postulates that the purpose of gender-sensitive SSR is to transform security services so as to enhance human security, as opposed to having an exclusive focus on state and territorial security. A comprehensive analysis of the policy and legislative framework governing gender and SSR at the global, continental, sub-regional and national levels will be presented, followed by the argument that efforts to reform the partisan and oftentimes non-professional tendencies of the security sector – especially the Zimbabwe Defence Forces, Zimbabwe Republic Police, Central Intelligence Organisation and Zimbabwe Prison Services – to promote democracy have met with firm resistance. However, gender-sensitive SSR has made significant headway in Zimbabwe since it is considered less threatening by the government. It should be noted, nevertheless, that gender-sensitive SSR has the potential to shift levels of professionalism and accountability within the sector as well as change attitudes to enhance security at the personal and communal levels. The process can gradually increase the percentage of women serving in the security sector. In conclusion, recommendations are made to broaden and deepen gender-sensitive SSR as the only viable alternative in the current political environment in Zimbabwe.  相似文献   

3.
The Building Security Overseas Strategy is at its core an ‘Intervention to end all Interventions’ – from a Western as well as an African perspective. Two of its main pillars are security sector reform in specific countries and systematic support to the development of the African Peace and Security Architecture. This article addresses the question why such efforts have met little success in francophone Africa. It argues that the failure of Western advisers to understand the sociological dynamics of African armed forces, shaped by a political culture based on personal loyalty to the leader, is at the root of the problem. In that context, the Huntingtonian-type distinction between the civilians and the military does not apply as military and civilians act in concert within common clientelism systems. As a result of the curtailing of the state-formation experience in most African countries, the military never had to demonstrate its performance as a state builder, nor did it have to bargain its legitimacy against the support of the citizens. Partnership in that context will remain a misnomer, at least until African military can credibly demonstrate commitment to state-building grounded in a broad-based social contract.  相似文献   

4.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   

5.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   

6.
After inconclusive elections in 2012, Lesotho had a coalition government for the first time, made up of three political parties that had a narrow majority in parliament. The new government, however, faced several challenges, some of which were of its own making. The agreement among the three parties was to literally divide the government into three parts, leading to a continuous stalemate in its operation; the most serious consequence was the prorogation of parliament and the resultant attempted coup. The flight of the prime minister to South Africa and his return under a Southern African Development Community (SADC) security detail provided a short-term solution to Lesotho's security crisis. Under Cyril Ramaphosa's mediation, the prorogued parliament was conditionally opened and the election date set for 28 February 2015. However, the security dilemma – whereby the prime minister, who is also minister of defence, has no control over the military – remains. When elections are held, there does not seem to be a guarantee that they will be held in peace; moreover, there are now fears that the losers will not accept the results of the elections because of the security vacuum in Lesotho. This article argues that peace can only be salvaged by enhanced SADC security before, during and after the elections. It argues that the SADC mission should remain beyond the elections to oversee the constitutional changes that are necessary for ensuring long-term stability. On their own, Lesotho politicians are unlikely to be able to work together in order to move the country forward.  相似文献   

7.
It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon involving a variety of issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest and youth unemployment) as well as a multiplicity of external responders. To make sense of the impact that external actors have when they address this complex problem through various maritime capacity building endeavours, this article argues that there is a need to understand the attractiveness of capacity building vis-à-vis the widely acknowledged need for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as important aspects of the problem remain largely unaddressed). Further, it is argued that it is important to appreciate that even if these gaps – i.e. the aspects that maritime capacity building currently leaves unaddressed – represent a ‘failure’ to deliver a comprehensive response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance, by influencing how certain aspects of this multifaceted problem are prioritised, whilst others are only marginally addressed, if at all.  相似文献   

8.
Few would disagree that European militaries have experienced dramatic changes since the end of the Cold War. Much of the discussion on these changes to date has referred to the concept of professionalism. However, this approach became outdated as professions in post-industrialist societies entered a state of crisis as a result of growing competition from a variety of competitors. The present study adapts a new framework from the sociology of knowledge literature – sociology of expertise – into one, sociology of security expertise, which is suitable for study of contemporary armed forces. Its utility is demonstrated through analysis of five European professional military education institutions. The analysis shows that European military organisations are transiting, albeit in various degrees, from one form of social organisation of military knowledge production – associated with the military education model common to traditional military colleges – toward another, which is related to the military education model of national defence universities. Hence it is highly probable that European military organisations lose, either voluntary or unintentionally, their professional character and can no longer be unquestionably assumed to be military professions. Hence, they should be analysed hereafter using the sociology of security expertise framework.  相似文献   

9.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   

10.
The insurgency in southern Thailand has proven to be intractable over the last few years. The insurgents, who comprise several different groups, have largely retained the initiative in a series of relatively unsophisticated operations. Although involving ethnic Malay Muslims – and marked by an increasingly strong Islamist ideology – the insurgency has been predominantly ethnic rather than religious. External jihadist involvement has been minimal at best. The recent coup in Thailand may improve the odds of reaching some form of accommodation with the southern insurgents; but it is likely that the south will remain a continuing security problem for Bangkok.  相似文献   

11.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   

12.
Contemporary international mediation is often multiparty and involves a number of states and multilateral organisations. What are the conditions that account for successful multiparty mediation in conflict resolution? To address this question, I use qualitative comparative analysis (fsQCA) and focus on individual dimensions of mediation, namely internal cohesion of the mediating coalition, the use of reward and coercive power, and the presence of a ‘mutually hurting stalemate’ (MHS). I posit that the presence of a cohesive mediating coalition is a necessary condition for conflict resolution, whereas the provision of security guarantees, the imposition of sanctions and the presence of an MHS play a causal role in conflict resolution only in conjunction with other conditions. I test these conditions using a fuzzy-set approach and data from 20 mediated agreements over separatist conflicts in the post-cold war era. Empirical findings provide support for some of these propositions and challenge relevant theories of international mediation. More specifically, this research shows that a high convergence of interests among mediators is the only necessary – albeit not sufficient condition – for conflict resolution. Second, the analysis highlights the presence of two main sufficient paths for mediation success.  相似文献   

13.
Although previous studies have examined killing as an outcome-oriented measure, few have explored non-killing as a socially organized process. Using letters written by soldiers, police officers, and security professionals found in the magazine Soldier of Fortune, this study examines cases in which they refrain from killing their opponents. Our results indicate that refrained killings by these actors are socially organized in ways that are shaped by situational, environmental, technological, administrative, and moral factors. In addition, it was found that when police officers and soldiers realized the humanity of their opponents, they employed alternative methods to subdue or control without using lethal force, despite situational and legal justifications for doing so. Implications for the sociology, psychology, and ethics of killing – or not killing – are discussed.  相似文献   

14.
Countries with a federalist system of government have different arrangements for providing national security. US national security is provided by national and State defense forces. The quintessential national function – national defense – experienced some changes that enhanced the role of the States. Policy changes in the National Defense Authorization Act of 2008 (2008 NDAA) introduced new roles for the Governors and the State defense forces, or the National Guard. This article explores how the interests of Congress and States aligned in the 2008 NDAA such that the national defense function changed. This article finds that the national government continues to have the central coordinating role, but that the politics and provisions of the 2008 NDAA changed the national–State relationship in mission, decision-making, and command and control so that US federalism in the national defense function is evolving in unexpected ways.  相似文献   

15.
We examine the validity of the guns-versus-butter hypothesis in the pre-Arab Spring era. Using panel data from 1995 to 2011 – the eve of the Arab uprisings – we find no evidence that increased security needs as measured by the number of domestic terrorist attacks are complemented by increased military spending or more importantly ‘crowd out’ government expenditure on key public goods such as health care. This suggests that both expenditure decisions were determined by other considerations at the government level.  相似文献   

16.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   

17.
Abstract

The signing of a new treaty on the equitable sharing of the Nile waters – signed last May in Kampala by Rwanda, Ethiopia, Uganda and Tanzania – has the potential of derailing relations with Sudan and Egypt. According to the latter countries, this new agreement replaces the 1959 Nile agreement – that awarded them with 90 per cent control over the Nile water – giving other Nile Basin countries the possibility to implement water-related projects in agriculture and energy. This new development, according to Egypt and Sudan, places their water level security in jeopardy. Furthermore, the use of land grabs and water consumption for food security by wealthy foreign countries contributes to the sensitive situation the nine Nile Basin countries are now facing. Water is a red line when it comes to Egypt and Sudan and the future of the whole region depends on whether this line will be crossed.  相似文献   

18.
This article examines the debates in Israel between 2009 and 2013 over Iran’s nuclear programme as a reflection of a particular type of civil–military or civil–security relationship. It analyses how key actors within that relationship – particularly those with an intelligence background – engaged with media outlets in Israel and further afield to influence domestic and international opinion over how best to contain Iran’s nuclear ambitions. In so doing, it seeks to address one fundamental question: are governments in Jerusalem any longer the final arbiters over deciding what is in the national security interests of the State of Israel?  相似文献   

19.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   

20.
This article begins with a discussion of sovereignty and goes on to discuss the idea of national security threats with reference to two different levels of analysis. First, the traditional-legal versus a more realistic contemporary level of analysis. Second, the operational, strategic, and political levels of analysis. The traditional concept tends to focus attention on the tactical-operational levels of activity, and the more contemporary notion broadens analysis to more strategic-political concerns. The article concludes with the argument that a broadened concept of threat to national security and sovereignty is meaningful and important. This is particularly important for those governments in the Western Hemisphere – and elsewhere – that do not discern any serious security issues, or proverbial clouds, on their peaceful horizons. Ample evidence indicates that non-traditional security problems can lead nation-states to failing or failed state status. That is to say, as examples, dysfunctional states, criminal states, narco-states, rogue states, and new ‘people's democracies'.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号