Browse Results

Showing 90,751 through 90,775 of 100,000 results

Security, Democracy, and Society in Bali: Trouble with Protection

by Andrew Vandenberg Nazrina Zuryani

This book focuses on how diverse developments are reflected in the rise of the security groups in Bali, Indonesia. Bali’s security groups pose many interesting questions. Why did they put up so many huge posters around the streets of southern Bali promoting themselves? Are their claims to represent the community plausible or are they “gangs”? How are they shaped by Indonesia’s violent past? How does Hinduism affect their gender politics? Do they promote illiberal populism or ethnic and religious tolerance? Does their central role in money politics prevent local democratization?Rather than write bottom-up history or bring the state back in, this collection as a whole draws on the ideas that circulate among leaders. These circulating ideas construct contemporary politics around both reinterpretations of old practices and responses to problems around tourism, gender, populism, religion, and democracy.

Security, Development and Nation-Building in Timor-Leste: A Cross-sectoral Assessment (Routledge Contemporary Southeast Asia Series)

by Andrew Goldsmith Vandra Harris

Despite Timor-Leste’s high expectations when it became independent from Indonesia in 2002, the country is ranked among the least developed countries in the world. It has found itself at the centre of international attention in the last decade, with one of the biggest interventions in UN history, as well as receiving amongst the highest per capita rates of bilateral assistance in the Asia-Pacific region. This book draws together the perspectives of practitioners, policy-makers and academics on the international efforts to rebuild one of the world’s newest nations. The contributors consider issues of peace-building, security and justice sector reform as well as human security in Timor-Leste, locating these in the broader context of building nation, stability and development. The book includes two demographic studies that can be used to critically examine the nation’s possible future. Engaging in deliberate consideration of both practical and theoretical complexities of international interventions, this book will be of interest to academics and students in the fields of Development, Security and Southeast Asian Studies.

Security, Development, and Violence in Afghanistan: Everyday Stories of Intervention (Routledge Explorations in Development Studies)

by Althea-Maria Rivas

Security, Development, and Violence in Afghanistan provides a unique insight into the lived realities of the international intervention in Afghanistan and highlights the diversity, relationships, and interdependence of various groups including both external actors and Afghan communities. Analysis of the international intervention in Afghanistan following the post 9/11 invasion in 2001, one of the largest and most expensive in history, tends to focus on the perspective of organisational dynamics and policies or external actors. Drawing on the author’s five years of experience living, researching and working in Afghanistan, this book uses ethnographic methodologies to explore the micro-level interactions between different actors, showing how communities, local leaders, aid workers, UN officials, military and others navigated shifting security, development, and conflict dynamics. Starting with a contextual introduction to the intervention and the key debates surrounding it, this book goes on to explore the stories of security, development, and violence as constructed through official policy discourse, and then through the lived experiences of interveners and local actors. The book weaves a compelling narrative which links local and global issues and focuses on the everyday practices, relationships and acts of resistance which take place in two provinces of Afghanistan. Finally, the author highlights what this book’s findings mean both for what we know about Afghanistan and for how we understand international interventions and the everyday dynamics between actors who live and work in spaces of conflict. Security, Development, and Violence in Afghanistan: Everyday Stories of Intervention will be of considerable interest to scholars and professionals with an interest in Afghanistan, aid work, humanitarian intervention, development studies, and peace and conflict studies.

Security, Disinformation and Harmful Narratives: RT and Sputnik News Coverage about Sweden (The Palgrave Macmillan Series in International Political Communication)

by Maria Hellman

It is a well-known fact both among scholars of propaganda and disinformation, and among political leaders that Sputnik and RT are using their news coverage for disinformation purposes to harm Western and European societies. Following the Russian invasion of Ukraine, which enhanced the security threat by disinformation, the EU decided to ban these two media. Against this backdrop, the study asks what the disinformation about Sweden in Sputnik and RT looked like prior to the ban (It should be noted that both channels still publish news for a European audience by way of VPN and other pathways.) It is done by way of a narrative approach, which means that the analyses seek to trace what stories that were told and how. The study thus analyzes the narrative logic of propaganda and disinformation narratives promulgated by Russian state-sponsored media platforms Sputnik and RT, and aim to show how these media have sought to denigrate Sweden. This is an open access book.

Security Dynamics in the Former Soviet Bloc

by Jennifer D. P. Moroney Graeme P. Herd

Security Dynamics in the Former Soviet Bloc focuses on four former Soviet sub-regions (the Baltic Sea region, the Slavic republics, the Black Sea region, and Central Asia) to explore the degree to which 'democratic security', which includes de-politicisation of, and civilian oversight of, the military, resolution of conflicts by international cooperation, and involvement in international organisations. It examines how far states in these regions have developed cooperative foreign and security policies towards their immediate neighbours and key Western states and organisations, explores the interplay between internal and external aspects of democratic security building, and uses case-study examples to show how inter-state bi-lateral and multi-lateral relations are developing.

The Security Environment in the Asia-Pacific (Studies Of The Institute For National Policy Research #Vol. 1)

by Hung-Mao Tien Ten-jen Cheng

Multilateral security forums in the Asia Pacific region have evolved, but bilateral defence alliances continue to form the principle pillars of national security for most nations in the region. This text presents a survey of issues confronting the Asia-Pacific region as it enters year 2000.

Security, Ethnography and Discourse: Transdisciplinary Encounters (Routledge Studies in Liberty and Security)

by Emma Mc Cluskey

This interdisciplinary book analyses different contexts where security concerns have an impact on institutional or everyday practices and routines in the lives of ordinary people. Creating a dialogue between the fields of International Relations, Peace and Conflict Studies, Sociolinguistics, Education and Anthropology, this book addresses core themes associated with conflict and security – peacebuilding, refugee settlement, nationalism, surveillance and sousveillance – and examines them as they manifest in everyday spaces and practices. Seven empirical studies are presented that bring ethnographic and/or close-up interactional lenses to practices of security in schools, refugee centres, care homes, city streets and roadsides. Drawing on fieldwork and data from Cyprus, Bosnia-Herzegovina, Sweden, Germany and the US, the chapters explore what notions of suspicion, peace, conflict and threat mean and how they are manifested in people’s lived experiences. This book will be of much interest to students of Critical Security Studies, Anthropology, Sociology, Sociolinguistics and International Relations in general.

The Security Field: Crime Control, Power and Symbolic Capital (Routledge Studies in Crime, Security and Justice)

by Matt Bowden

How crime and security are governed has become a critical issue in criminology over the first quarter of the twenty-first century. Today, we see a broader landscape of regulatory players who are involved in the control and management of crime, whether in crime prevention, safety in the community or in providing private security services. The Security Field: Crime Control, Power and Symbolic Capital gets to grips with these changes and argues that this forms an emerging field in which different players appear to compete and co-operate but are ultimately vying to shape and order the field. This book draws on new thinking in the social sciences on questions of crime, fear and security and contributes to the expanding interest on the sociology and criminology of security by offering a Bourdieusian approach to plural policing and the everyday political economy of security.Drawing from Bourdieu’s concept of field, this book builds a theory of the security field based upon a series of in-depth interviews with security actors such as senior police officers, NGOs, private security professionals, government officials and community safety workers in Ireland. It demonstrates how security producers compete for cultural capital in its many forms – as data, information and relationships – and ultimately as a way of cementing their positions in this emerging field. It shows the dominant power of the formal police and central government in shaping and ordering this relational space. In doing so, The Security Field: Crime Control, Power and Symbolic Capital builds an empirical case from three distinct areas of security production: urban security, community safety and the connections between regulated private security and public crime prevention. It explores the challenges of securitisation in respect of public safety, security and rights and the way in which social problems such as drug use, homelessness and urban marginality are recast as ‘security’ concerns.An accessible and compelling read, this book will appeal to students and scholars of criminology, sociology, urban studies and security studies.

Security Games: Surveillance and Control at Mega-Events

by Kevin D. Haggerty Colin J. Bennett

Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events – such as the Olympic Games and the World Cup – on wider practices of security and surveillance. "Mega-Events" pose peculiar and extensive security challenges. The overwhelming imperative is that "nothing should go wrong." There are, however, an almost infinite number of things that can "go wrong"; producing the perceived need for pre-emptive risk assessments, and an expanding range of security measures, including extensive forms and levels of surveillance. These measures are delivered by a "security/industrial complex" consisting of powerful transnational corporate, governmental and military actors, eager to showcase the latest technologies and prove that they can deliver "spectacular levels of security". Mega-events have thus become occasions for experiments in monitoring people and places. And, as such, they have become important moments in the development and dispersal of surveillance, as the infrastructure established for mega-events are often marketed as security solutions for the more routine monitoring of people and place. Mega-events, then, now serve as focal points for the proliferation of security and surveillance. They are microcosms of larger trends and processes, through which – as the contributors to this volume demonstrate – we can observe the complex ways that security and surveillance are now implicated in unique confluences of technology, institutional motivations, and public-private security arrangements. As the exceptional conditions of the mega-event become the norm, Security Games: Surveillance and Control at Mega-Events therefore provides the glimpse of a possible future that is more intensively and extensively monitored.

Security Governance, Policing, and Local Capacity (Advances in Police Theory and Practice)

by Jan Froestad Clifford Shearing

The security governance of South Africa has faced immense challenges amid post-apartheid constitutional and political transformations. In many cases, policing and governmental organizations have failed to provide security and other services to the poorest inhabitants. Security Governance, Policing, and Local Capacity explores an experiment that too

Security In The Middle East: Regional Change And Great Power Strategies

by Mark Bruzonsky Shaun Murphy Samuel F. Wells

This book examines the deep-seated problems in the Middle East and their impact on the United States and its allies. Exploring the disruptive effects of the double-edged sword of nationalism and modernization, the contributors discuss the full range of Western security interests in the region. Case studies of key countries emphasize the prospect for peaceful political, economic, and cultural change. The authors analyze the ramifications of the Arab-Israeli conflict and the threats posed by Soviet penetration. Arguing that confusion and contradiction mark U.S. policy in the Middle East, the book concludes that U.S. strategists should focus not on curing the region's internal problems but on coping with them without sacrificing long-term goals for quick fixes.

Security In Northeast Asia: Approaching The Pacific Century

by Stephen P Gibert

This book presents to the reader a comprehensive and integrated discussion of the Northeast Asian-Western Pacific region and its relationships to United States and world security concerns and international political stability.

Security in Post-Conflict Africa: The Role of Nonstate Policing (Advances in Police Theory and Practice)

by Bruce Baker

Policing is undergoing rapid change in Africa as a result of democratization, the commercialization of security, conflicts that disrupt policing services, and peace negotiations among former adversaries. These factors combined with the inability of Africa‘s state police to provide adequate protection have resulted in the continuing popularity of va

Security in Smart Cities: Models, Applications, and Challenges (Lecture Notes in Intelligent Transportation and Infrastructure)

by Syed Hassan Ahmed Aboul Ella Hassanien Amit Kumar Singh Mohamed Elhoseny

This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges.Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications.

Security in the Bubble

by Christine Hentschel

Focusing on the South African city of Durban, Security in the Bubble looks at spatialized security practices, engaging with strategies and dilemmas of urban security governance in cities around the world. While apartheid was spatial governance at its most brutal, postapartheid South African cities have tried to reinvent space, using it as a "positive" technique of governance.Christine Hentschel traces the contours of two emerging urban regimes of governing security in contemporary Durban: handsome space and instant space. Handsome space is about aesthetic and affective communication as means to making places safe. Instant space, on the other hand, addresses the crime-related personal "navigation" systems employed by urban residents whenever they circulate through the city. While handsome space embraces the powers of attraction, instant space operates through the powers of fleeing. In both regimes, security is conceived not as a public good but as a situational experience that can.No longer reducible to the after-pains of racial apartheid, this city's fragmentation is now better conceptualized, according to Hentschel, as a heterogeneous ensemble of bubbles of imagined safety.

Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing)

by Akashdeep Bhardwaj Varun Sapra

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.

Security, Insecurity and Migration in Europe (Research In Migration And Ethnic Relations Ser.)

by Gabriella Lazaridis

Having often been framed in terms of security concerns, migration issues have simultaneously given rise to issues of insecurity: on the one hand, security of borders, political, societal and economic security/insecurity in the host country; on the other, social, legal and economic concerns about human security, with regard to both EU citizens and migrants entering Europe. In terms of state security, migration is a core target of increasingly globally networked surveillance capabilities, whilst with respect to human security, it exposes the gap between the protections that migrants formally enjoy under international law and the realities they experience as they travel and work across different countries. Drawing on the latest research from across the EU, Security, Insecurity and Migration explores the concerns of states with regard to migration and the need to protect the fundamental rights of migrants. An interdisciplinary examination of the issues of security and insecurity raised by migration for states, their citizens and migrants themselves, this book will be of interest to scholars of politics, sociology and geography researching migration, race and ethnicity, human and state security and EU politics and policy.

Security Interests in Mobile Equipment (Routledge Revivals)

by Iwan Davies

This title was first published in 2002: This collection of essays marks the formal launch of the Centre for Instalment Credit Law at the University of Wales, Swansea. Divided into three sections, it examines the concept of security within domestic law; considers the choice of law rules; and ponders development of uniform law.

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

by Anthony D. Manley

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager‘s Guide to Disasters: Managing Through Emergencies,

The Security of Iceland and the Arctic 2030: A Recommendation for Increased Geopolitical Stability (Springer Polar Sciences)

by Robert P. Wheelersburg

This book outlines a recommended Icelandic security force as part of the country’s defence against sub-strategic threats such as human trafficking by criminals or border incursions by other states. It also tests the recommended security force through the development of four different hypothetical scenarios in the year 2030 designed to show the force’s successful implementation. Melting of the Arctic ice pack, and the opening of the Transpolar Sea Route around 2025 could lead to an increase in traffic into the North Atlantic from the Pacific (and vice versa). That movement is predicted to bring a massive influx of tourists, business interests, and government entities into the region. Along with legitimate uses of the new shipping lanes, the opportunity for terrorists, criminals, and rogue states to travel in and around the Arctic could lead to increased smuggling, violence, and sovereignty disputes (i.e., seizing uninhabited terrain). A review of Iceland’s current security policies indicates that the parliament provided the legal framework to create the recommended security force with the 2016 Parliamentary Resolution establishing a National Security Policy for Iceland. Many scholars and government officials believe that the Iceland public would not support a security force culturally. Yet, recent surveys reveal that many Icelanders could accept a security force to protect them from sub-strategic threats, especially if the increased security could be attained without the intervention of foreign military forces. The recommended security force utilizes Icelandic search-and-rescue volunteers and Reservists to increase the protection of the country funded by its full NATO contribution.

The Security Of Korea: U.s. And Japanese Perspectives On The 1980s

by Franklin B. Weinstein Fuji Kamiya

Any discussion of the security of Korea has implications for U.S.-Japan relations, but the Carter administration's announcement in 1977 of its intention to withdraw U.S. ground-combat forces from Korea by 1982, which brought to the surface deep-rooted Japanese and American frustrations with one another, made it clear that neither side fully understood the other's view of Korea. This book, a collaborative effort by specialists of diverse expertise and viewpoints, clarifies U.S. and Japanese perceptions of the Korean problem and explores alternative approaches to the maintenance of peace and security on the Korean peninsula. Demonstrating that much of the conventional wisdom about Korean security rests on oversimplifications, exaggerated fears, and mistaken assumptions, the authors assert that the prospects for avoiding conflict grow brighter despite existing pitfalls, and offer recommendations for the U.S. and Japanese governments.

The Security of Sea Lanes of Communication in the Indian Ocean Region (Routledge Revivals)

by Sanjay Chaturvedi Dennis Rumley Mat Taib Yasin

First published in 2007, this book focuses on the security of sea lanes of communication. It was a joint publication between the Maritime Institute of Malaysia (MIMA) and the Indian Ocean Research Group (IORG) and is an important book for three particular reasons. First, it takes a step forward in identifying key policy themes that can be applied to interstate cooperation around the Indian Ocean Region (IOR). Second, the particular theme discussed is not only central to the economic well-being of Indian Ocean countries, but also to many of the world’s most important trading states, and finally the various discussions within the book raise a host of issues to which regional as well as non-regional policy-makers should give serious consideration.

Security of the China Pakistan Economic Corridor: Counterinsurgency in Balochistan (Routledge Studies in South Asian Politics)

by Khurram Shahzad Siddiqui

This book analyses the strategic and economic significance of the China-Pakistan Economic Corridor (CPEC), with a particular focus on the region of Balochistan. Given the history of multiple insurgencies that the Pakistani Military has confronted in Balochistan, the book examines the region's intricate conflict ecosystem and security landscape, which poses potential threats to the CPEC. Structured chronologically, the book traces the evolution of the Pakistani Army's counterinsurgency practices inherited in 1947 from the British Indian Army's culture of fighting small wars through to the contemporary counterinsurgency (COIN) adaptation in the ‘war on terror’, and afterwards, to the fifth round of the Balochistan insurgency. The analysis centres on the development of counterinsurgency theory and practice by the Pakistani Army. It empirically investigates the efficacy of the COIN strategy in Balochistan. The author argues that the approach significantly changed after conceptualising the doctrine, especially from 2016 onwards, from ‘butcher and bolt’ to the inclusion of critical components like political primacy, affect-based and focused use of force, ‘winning hearts and minds’ and rules of engagement. As a result, there was reduced violence and an increased number of insurgent surrenders. The book concludes that the Pakistani Army has largely controlled the insurgency in Balochistan. However, simultaneously, there is an urgent need to reduce tangible support to the insurgents through porous borders and implement an effective strategy to sever the nexus between the Islamic State of Khorasan (ISKP) and the Baloch insurgent organisations, as well as the sectarian militant organisations in Balochistan province. This is crucial to ending the insurgency and ensuring the security of CPEC. A novel contribution to the study of counterinsurgency and the importance of CPEC to China’s foreign policy and diplomacy, as well as its effects on the conflict dynamics in Balochistan, the book will be of interest to researchers studying War and Conflict Studies, Terrorism Studies, International Relations, Security and Strategic Studies, and South Asian and Chinese Studies.

The Security of the Persian Gulf (Routledge Library Editions: Iran)

by Hossein Amirsadeghi

The Persian Gulf, important because of its vast energy resources, emerged into the limelight of geopolitics at the time of the British Labour government’s policy of withdrawal from East of Suez in 1968. Before 1968 it had been recognised that the Gulf lay in the legitimate sphere of influence of Britain, while the United States exerted its influence in the two pivotal littoral states of Iran and Saudi Arabia. The Soviets had been gaining influence in Iraq ever since the overthrow of the monarchy in 1958 and the Chinese were also fishing for influence by their support of the Popular Front for the Liberation of the Arabian Gulf. This book examines the political axes of the various super-powers with Iran and the Persian Gulf and discusses the implications of these problems for the issue of security in the region.

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

by Robert H. Deatherage, Jr.

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services, including what comprises good security practice. This second edition is fully updated to include new case scenarios, threat vectors, and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced, sophisticated schemes. Security has always been a necessity for conducting business operations in both low- and high-risk situations, regardless of the threat level in the operating environment. Overseas, those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States, people become targets because of positions held, publicity, politics, economics, or other issues that cause unwanted attention to a person, their family, or business operations. Security Operations, Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. FEATURES • Identifies what can pose a threat, how to recognize threats, and where threats are most likely to be encountered • Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments, especially in high-risk regions • Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view • Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them An equal help to those just entering the protection business or people and companies that are considering hiring a security detail, Security Operations is a thorough, detailed, and responsible approach to this serious and often high-risk field. Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations, threat assessment, risk management, client relations, surveillance detection, counter surveillance operations, foot and vehicle movements, and building security—blending solid operational theory with practical field experience.

Refine Search

Showing 90,751 through 90,775 of 100,000 results