The Direction of Security Policies in the UK and Turkey: Different Contexts, Convergent Practices

Author(s):  
Ipek Demirsu
Keyword(s):  
2016 ◽  
Vol 37 (2) ◽  
pp. 163-179 ◽  
Author(s):  
Francesco Ragazzi

While social and security policies have always overlapped in complex ways, recent developments in counter-terrorism policy suggest that Western European states, and the United Kingdom more specifically, are accelerating what can be termed the ‘securitisation of social policy’1 – namely, the increased submission of social policy actors and their practices to the logics of security and social control. With the PREVENT programme remaining highly controversial, what are the effects of these state practices? Has David Cameron’s project of ‘muscular liberalism’, aimed at integration and community cohesion, been enforced through counter-radicalisation policies? This themed issue examines preventative counter-terrorism policies in the UK and the politics of religion, ethnicity and race they enact. The relation between social policy and critical security studies is explored by an interdisciplinary group of scholars.


2011 ◽  
Vol 22 (1) ◽  
pp. 77-94 ◽  
Author(s):  
Bernd Carsten Stahl ◽  
Neil F. Doherty ◽  
Mark Shaw

Author(s):  
Neil F. Doherty

Information is a critical corporate asset that has become increasingly vulnerable to attacks from viruses, hackers, criminals, and human error. Consequently, organizations are having to prioritize the security of their computer systems in order to ensure that their information assets retain their accuracy, confidentiality, and availability. While the importance of the information security policy (InSPy) in ensuring the security of information is acknowledged widely, to date there has been little empirical analysis of its impact or effectiveness in this role. To help fill this gap, an exploratory study was initiated that sought to investigate the relationship between the uptake and application of information security policies and the accompanying levels of security breaches. To this end, a questionnaire was designed, validated, and then targeted at IT managers within large organizations in the UK. The findings presented in this chapter are somewhat surprising, as they show no statistically significant relationships between the adoption of information security policies and the incidence or severity of security breaches. The chapter concludes by exploring the possible interpretations of this unexpected finding and its implications for the practice of information security management.


Author(s):  
Neil F. Doherty ◽  
Heather Fulford

Information is a critical corporate asset that has become increasingly vulnerable to attacks from viruses, hackers, criminals, and human error. Consequently, organizations are having to prioritize the security of their computer systems in order to ensure that their information assets retain their accuracy, confidentiality, and availability. While the importance of the information security policy (InSPy) in ensuring the security of information is acknowledged widely, to date there has been little empirical analysis of its impact or effectiveness in this role. To help fill this gap, an exploratory study was initiated that sought to investigate the relationship between the uptake and application of information security policies and the accompanying levels of security breaches. To this end, a questionnaire was designed, validated, and then targeted at IT managers within large organizations in the UK. The findings presented in this paper are somewhat surprising, as they show no statistically significant relationships between the adoption of information security policies and the incidence or severity of security breaches. The paper concludes by exploring the possible interpretations of this unexpected finding and its implications for the practice of information security management.


The inviolability of diplomatic personnel and premises is a cornerstone of interstate relations and international law. As epitomized by the murder of US Ambassador Christopher Stevens in Benghazi, host countries are not always willing or capable to protect foreign diplomats and missions, which have become increasingly vulnerable to terrorism and other forms of political violence. Consequently, states with a large diplomatic presence have complemented host countries protection with a host of additional measures ranging from relocating embassies to fortified suburban locations to the deployment of military, police, and private security guards. By increasing the separateness of foreign envoys from local societies and informing local societies’ perceptions of the sending states, however, diplomatic security policies may not simply protect diplomats, but also reshape the institution and practice of diplomacy. In spite of its theoretical and policy relevance, diplomatic security has received very sporadic scholarly attention. This volume fills this gap by providing a comparative analysis of diplomatic protective policies enacted by the US, China, the UK, France, Germany, Italy, Russia, Israel and Turkey. Moreover, the book investigates the reasons underlying the evolution of diplomatic security policies over time and their variations across countries, examining the factors underlying the choosing of protective actors and arrangements. It then examines the effectiveness of these arrangements analyzing how diplomatic security policies have been reformed in response to major incidents and the extent to which they can secure diplomats without hindering their ability to interact with local society and tarnishing the image of the sending state.


2017 ◽  
Vol 16 (5) ◽  
pp. 658-682 ◽  
Author(s):  
Ipek Demirsu

Abstract This article addresses the question of how draconian counter-terrorism policies are legitimized in long-established democracies. Being the heartland of liberal rights, the UK comes to the fore as a striking case where some of the most controversial security policies have been enacted. The study undertakes a systematic frame analysis of UK parliamentary debates with the help of ATLAS.ti, which allows the analyst to trace and map out recurrent concepts, themes, and arguments as well as their overall distribution. While demonstrating the workings of securitization in the formulation of key counter-terrorism legislation, the study unearths how the security narrative in the UK context evidently relies on the language of rights in invoking legitimacy. The study suggests that far from negating the indispensable status of human rights, security narrative resorts to the latter’s moral power and mimics rights language, heralding the weight of these international norms even in hard-core security matters.


Author(s):  
Christiana Gregoriou ◽  
Ilse A. Ras ◽  
Nina Muždeka

AbstractIn the early hours of October 23rd, 2019, 39 people were found dead in a refrigerated lorry in Grays, Essex, UK. This case attracted media interest across the world; in the 48-h period after the story broke, reporting on this discovery extended to newspapers not just in the UK, but also across Europe. This study uses elements of Critical Stylistics (Jeffries 2010) to analyse and compare first response articles published by European dailies in relation to the event at Grays, to address the nature of this reporting. We found that linguistic choices tend to dramatise what happened, criminalise victims, and even presume the driver’s innocence, with the international criminal network he is presupposed to be part of remaining only speculated on. Though there are attempts to distribute some accountability to governments and policies, as well as structural systemic factors such as war and poverty, responsibility for these factors tends to be diffused, and hence unallocated, this helping ultimately justify draconic law enforcement and border security policies. By highlighting linguistic trends and underlying ideologies which we in turn question, we address the need to tend to the structural causes of such transnational people movement-related crime (i.e. trafficking and smuggling) and shift accountability to governments.


2000 ◽  
Vol 111 (1) ◽  
pp. 78-90 ◽  
Author(s):  
C. R. M. Hay ◽  
T. P. Baglin ◽  
P. W. Collins ◽  
F. G. H. Hill ◽  
D. M. Keeling

2006 ◽  
Vol 175 (4S) ◽  
pp. 476-477
Author(s):  
Freddie C. Hamdy ◽  
Joanne Howson ◽  
Athene Lane ◽  
Jenny L. Donovan ◽  
David E. Neal

Sign in / Sign up

Export Citation Format

Share Document