scholarly journals Human security as biosecurity

2021 ◽  
pp. 1-23
Author(s):  
Craig Albert ◽  
Amado Baez ◽  
Joshua Rutland

Abstract Research within security studies has struggled to determine whether infectious disease (ID) represents an existential threat to national and international security. With the emergence of SARS-CoV-2 (COVID-19), it is imperative to reexamine the relationship between ID and global security. This article addresses the specific threat to security from COVID-19, asking, “Is COVID-19 a threat to national and international security?” To investigate this question, this article uses two theoretical approaches: human security and biosecurity. It argues that COVID-19 is a threat to global security by the ontological crisis posed to individuals through human security theory and through high politics, as evidenced by biosecurity. By viewing security threats through the lens of the individual and the state, it becomes clear that ID should be considered an international security threat. This article examines the relevant literature and applies the theoretical framework to a case study analysis focused on the United States.

2019 ◽  
Vol 5 (3) ◽  
pp. 77
Author(s):  
Miftah Farid ◽  
Ajeng Ayu Adhisty

<p>In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects.  This study examines the emergence of cyber issues as a new threat to state security. Cyber actions in the virtual world are developing along with the rapid technology development. Moreover, the state policy on cyber issues is considered as a new threat to individual security. The development of that state security issue is being debated among the theoreticians of international security studies. The concept of securitization explains the phenomenon of cyber issues and receives the attention of many states. Securitization carried out by the United States on Cybercrime issues becomes the initial trigger in viewing cyber actions as a new threat to state security. The object of this paper is more focused on State policy in dealing with cyber threats. Afterward, state policy in facing the cyber threat is seen from the perspective of human security from UNDP. Therefore, there is a debate about the desired security object. State actions to reach state security are then considered as individual privacy security. So, international security now does not only focus on state objects but also on individual, environment, economy, and identity. Thus, every action taken in securing an object does not pose a threat to other security objects.</p><div><p class="Els-keywords">Keywords: Cybercrime, State Security, Human Security, Securitization</p></div>


2015 ◽  
Vol 36-37 (1) ◽  
pp. 163-183
Author(s):  
Paul Taylor

John Rae, a Scottish antiquarian collector and spirit merchant, played a highly prominent role in the local natural history societies and exhibitions of nineteenth-century Aberdeen. While he modestly described his collection of archaeological lithics and other artefacts, principally drawn from Aberdeenshire but including some items from as far afield as the United States, as a mere ‘routh o’ auld nick-nackets' (abundance of old knick-knacks), a contemporary singled it out as ‘the best known in private hands' (Daily Free Press 4/5/91). After Rae's death, Glasgow Museums, National Museums Scotland, the University of Aberdeen Museum and the Pitt Rivers Museum in Oxford, as well as numerous individual private collectors, purchased items from the collection. Making use of historical and archive materials to explore the individual biography of Rae and his collection, this article examines how Rae's collecting and other antiquarian activities represent and mirror wider developments in both the ‘amateur’ antiquarianism carried out by Rae and his fellow collectors for reasons of self-improvement and moral education, and the ‘professional’ antiquarianism of the museums which purchased his artefacts. Considered in its wider nineteenth-century context, this is a representative case study of the early development of archaeology in the wider intellectual, scientific and social context of the era.


2021 ◽  
Vol 23 (1) ◽  
pp. 1
Author(s):  
Sigit S. Nugroho

Assessing the output of past foreign policy is instrumental for any country to learn policy-relevant insights, to appreciate its experience, and to improve its future conduct. To glean such insights, this article borrows Baldwin’s framework in assessing the success and failure in foreign policy. Using a case study analysis, it assesses the United States’ (U.S.) influence attempt towards Indonesia to resolve the 1999 East Timor humanitarian crisis. President Clinton’s decision to undergo an influence attempt primarily aimed to change Indonesia’s policy while gaining support from U.S. allies in the process. The article finds that Clinton’s decision was a highly successful attempt. This finding is based on several factors: (1) the attempt effectively attained the intended primary and secondary goals at a considerably high degree; (2) it was conducted at a considerably low cost for the U.S.; (3) it inflicted a high cost towards Indonesia; (4) the increase in Clinton’s stake strengthened the U.S. resolve to pursue the influence attempt; and (5) Clinton had successfully overcome the difficult undertaking as Indonesia possessed higher stake over East Timor. These findings provide some lessons for both U.S. and Indonesian foreign policymakers to chart future relations for the two nations.


The chapter focuses on the IDEA disability category of Emotional Disturbance (ED), which ranks fifth among school-aged students in the United States that have been diagnosed with an exceptionality. ED is a disability that, due to severe behavioral and mental health issues, affects a student's ability to succeed academically in school, which many times leads to the student not finishing high school. The chapter explains that most service delivery models for students who are classified as ED occur in a resource room or self-contained classroom model. Two case studies demonstrate services within such models that have been found to be successful. The chapter also includes a discussion on specific intervention strategies that can assist teachers working with ED students.


2020 ◽  
pp. 152-179
Author(s):  
Rupal N. Mehta

This chapter presents an in-depth case study analysis of the Iranian nuclear program from its inception to the country’s ultimate decision to renounce its nuclear ambitions in 2015. The chapter begins by examining the trajectory of the Iranian nuclear program and some of the initial attempts by the international community to persuade Iran to end it. Using archival and interview-based data, this analysis demonstrates the powerful role of inducements offered by the United States and other members of the international community, in conjunction with the election of President Rouhani, that provided a window of opportunity that ultimately led to the Joint Comprehensive Plan of Action (JCPOA). The chapter concludes with an update about the long-term viability of the Iran deal.


1986 ◽  
Vol 18 (2) ◽  
pp. 197-206 ◽  
Author(s):  
Lewell F. Gunter

AbstractRegular hired farm workers, performing 150 days or more of farm work annually, became increasingly important in the 1970's. The number of regular hired workers in the United States increased by almost 50 percent during the decade, while the number of seasonal workers, operators, and unpaid family workers declined. Pricing of regular hired labor is investigated through estimation of three nested wage determination models in a case study analysis for Georgia. Micro-level data on individual workers were used to analyze the effects of general human capital, farm worker duties, local labor market conditions, and farm characteristics on wage rates.


2013 ◽  
Vol 12 (1) ◽  
pp. 35-55 ◽  
Author(s):  
Kyle E. Walker

Recent electoral research has claimed that individuals in the United States are self–segregating along political lines. In this paper, I use the Twin Cities, Minnesota, metropolitan area as a case study to test for the presence of political segregation through statistical and spatial analyses of electoral data from 1992 to 2012. I find that while segregation by partisan voting at the individual level is comparatively low, it has increased during the study period, and there exists substantial spatial clustering in voting patterns at aggregate levels. These distinct electoral divides between central city and exurb suggest spatial sorting of the electorate in the metropolitan area.


2005 ◽  
Vol 4 (3) ◽  
pp. 517-541
Author(s):  
W. Andy Knight

AbstractThe end of the Cold War opened a window of opportunity for the United Nations to play a greater role in international security than it was allowed to play in the midst of the ideological conflict between the United States and the former Soviet Union. However, the expected "peace dividend" never materialized in the post-Cold War period. Instead, a number of civil conflicts erupted and new threats to security, particularly to human security, emerged. This chapter critically examines the evolution of the UN's role in addressing international security problems since 1945, including global terrorism. It also outlines recent attempts by the world body, through extension of its reach beyond the territorial constraints of sovereignty, to build sustained peace through preventive measures and protect human security globally.


2010 ◽  
Vol 36 (1) ◽  
pp. 77-94 ◽  
Author(s):  
EDWARD NEWMAN

AbstractFrom a critical security studies perspective – and non-traditional security studies more broadly – is the concept of human security something which should be taken seriously? Does human security have anything significant to offer security studies? Both human security and critical security studies challenge the state-centric orthodoxy of conventional international security, based upon military defence of territory against ‘external’ threats. Both also challenge neorealist scholarship, and involve broadening and deepening the security agenda. Yet critical security studies have not engaged substantively with human security as a distinct approach to non-traditional security. This article explores the relationship between human security and critical security studies and considers why human security arguments – which privilege the individual as the referent of security analysis and seek to directly influence policy in this regard – have not made a significant impact in critical security studies. The article suggests a number of ways in which critical and human security studies might engage. In particular, it suggests that human security scholarship must go beyond its (mostly) uncritical conceptual underpinnings if it is to make a lasting impact upon security studies, and this might be envisioned as Critical Human Security Studies (CHSS).


Sign in / Sign up

Export Citation Format

Share Document