scholarly journals Securitisation, terror, and control: towards a theory of the breaking point

2012 ◽  
Vol 38 (4) ◽  
pp. 861-879 ◽  
Author(s):  
JONATHAN BRIGHT

AbstractSecuritisations permit the breaking of rules: but which rules? This article argues that any given security situation could be handled by a variety of different ‘rule breaking’ procedures, and that securitisations themselves, whilst permitting rule breaking in general, do not necessarily specify in advance which rules in particular have to be broken. This begs the question: how do specific threats result in specific rule breaking measures? This article explores this question through reference to ‘control orders’, an unusual legal procedure developed in the UK during the course of the war on terrorism. Once applied to an individual, a control order gives the government a meticulous control over every aspect of their life, up to and including deciding on which educational qualifications they can take. Despite this control, individuals under the regime remain technically ‘free’: and have frequently used this freedom to abscond from the police who are supposed to be watching them. How did a security policy which controls a suspect's educational future, but not their physical movements, develop? This article aims to answer this question, and in so doing present a reevaluation of the mechanisms through which the effects of securitisation manifest themselves.

Author(s):  
Kelum Jayasinghe ◽  
Tarosha Jayasinghe ◽  
Chaminda Wijethilake ◽  
Pawan Adhikari

Background: Through the extensive use of public media, the government of England was heavily involved in encouraging and instructing people on how to manage their life during COVID-19. This model of health emergency governance replicates the practice of ‘calculative technologies’ and ‘bio-politics’ embedded in population management. Previous research on COVID-19 governance both in the UK and beyond provides varied revelations on broader ‘technologies of government’ and bio-politics by numerous governments. However, rarely have any studies explicitly and distinctively highlighted the unique ‘calculative technologies" mobilised by governments within their bio-politically designed "technologies of government" to compel the populations to manage their lives under their COVID guidance. The paper therefor examines how the UK government deployed "calculative technologies", as part of its strategies of health governance and governmentality during the first wave of COVID-19 in England. Methods: This study uses document analysis as its data collection method. Its review includes documents, press releases, social media disclosures and health guidance issued by the UK government from March to December, 2020. The data are analysed employing the Foucault’s governmentality and bio-political scholarship. Results: The paper’s findings reveal the UK government’s use of integrated calculative technologies of self-governance in the form of risk calculations and metrices/statistics (e.g. death tolls, infection rates), performance management (e.g. two metre social distancing, and hand washing for twenty seconds) and discipline and control (e.g. fourteen days self-isolation), in addition to a more conventional top-down, managerial decision-making process adopted in the past. By these newly initiated "calculative technologies", the government has "bio-politically" governed the behaviours and lifestyles of vulnerable community members, health workers and general public at a distance, inculcating self-management and individualisation of responsibility. Conclusions: The newly adopted calculative technologies used by the UK government created a multi-faceted discourse of obligations, entitlements and scale of engagement, and facilitated directions about what people should do to protect themselves and others from the spread of the virus. Overall, the overtly and idiosyncratically used calculative technologies resemble a unique ‘art of government’ and produce a set of ‘bio-political’ interventions enforcing the populations to manage their own wellbeing and governing them at a distance during COVID-19.


Author(s):  
Gillian E. Metzger

This chapter examines how political control over government is exercised today in the UK, the US, and France, focusing on control of the executive branch by the legislature and control of the administrative executive by the political executive. These three jurisdictions were chosen because they are paradigmatic examples of different political regimes: parliamentarism, separation of powers presidentialism, and semi-presidentialism. In theory, these different institutional structures should affect how political control is understood and wielded. In the traditional Westminster parliamentary model, for example, the government is formed from the leadership of the majority party in Parliament and it is the government that controls policy-making. By contrast, the traditional account of a separation of powers regime posits a separate legislature and executive as institutional rivals. Semi-presidential regimes combine a popularly elected presidential-type executive with a legislatively-dependent cabinet executive.


1968 ◽  
Vol 72 (689) ◽  
pp. 423-430
Author(s):  
P. A. Norman

Summary This paper presents basic disciplines for effective management of costs for profitable operation in technologically orientated industries. The techniques outlined for strategic planning, implementation of the ensuing plan and for operational planning and control are not new, but available and proven by wide application in the USA and to a lesser extent in the UK. The adoption of these or similar disciplines in the UK aerospace industry in co-operation with the Government in defining industry objectives and strategic plans, could represent a big step towards promoting a healthy and expanding industry for the future. Application of these techniques will present difficulties in the aerospace industry, but by their very nature should yield an immense return in this environment. There would appear to be no insuperable difficulties in achieving successful application by both Government and Industry. Since the 1967 Management Studies Group Symposium showed a strong demand for information on these techniques, and because no single source document can be recommended, the preparation of this survey has been undertaken.


2021 ◽  
Vol 21 (1) ◽  
pp. 90-95
Author(s):  
Phee Kheng Cheah ◽  
Phaik Kin Cheah ◽  
Darlene Ongkili ◽  
Anne Osterrieder ◽  
Tassawan Poomchaichote ◽  
...  

COVID-19 is one of the worst global pandemics in the last 20 years caused by Severe Acute Respiratory Syndrome Coronavirus 2. To control the pandemic in Malaysia, on 18th March 2020 the government implemented the Movement Control Order (MCO), a non-pharmaceutical intervention (NPI) under Malaysia’s Prevention and Control of Infectious Diseases Act 1988. Despite a high rate of compliance to the MCO in East Malaysia, a month after its implementation, a new cluster of infections among hospital healthcare workers (HCW) had emerged. This paper reports the early findings of a multinational study involving Malaysia, Thailand, Italy, and the United Kingdom. Our early analysis seeks to understand two main situational factors in the states of Sabah and Sarawak in East Malaysia – testing rates and household composition between HCW and non-healthcare workers (non-HCW). Our results showed that there were higher testing rates and smaller-sized households among HCW when compared to non-HCW workers.


2014 ◽  
pp. 1583-1597
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


2012 ◽  
Vol 61 (3) ◽  
pp. 750-765 ◽  
Author(s):  
Christopher Michaelsen

On 17 January 2012 the European Court of Human Rights (ECtHR) handed down its judgment in Othman (Abu Qatada) v United Kingdom.1 Abu Qatada, a radical Muslim cleric once described as ‘Osama bin Laden's right-hand man in Europe’, was convicted in absentia in Jordan for various terrorist offences.2 He alleges, however, that part of the evidence against him had been obtained under torture. In 1994 he was granted refugee status and permitted to remain in the United Kingdom (UK) temporarily. Qatada later applied for indefinite leave to stay. While his application was pending, he was arrested in October 2002 and detained without charge or trial under the now-repealed Part 4 of the Anti-terrorism, Crime and Security Act 2001. In March 2005 he was released from detention and put under a ‘control order’ under the Prevention of Terrorism Act 2005. A few months later, the UK government sought to deport Qatada to his native Jordan, having first concluded a Memorandum of Understanding (MoU) with the Jordanian government that he would not be subjected to torture or ill-treatment contrary to Article 3 of the European Convention on Human Rights (ECHR). The deportation order was challenged before English courts, but ultimately upheld by the House of Lords in RB (FC) and Another v Secretary of State for the Home Department and OO v Secretary of State for the Home Department in 2009.3 In contrast, the ECtHR ruled unanimously that the UK could not lawfully deport Qatada to Jordan. The decision was criticized by Home Secretary Theresa May as ‘unacceptable’ and predictably led to several Conservative backbenchers in the House of Commons calling on the government to withdraw from the ECHR.4


2012 ◽  
Vol 2 (4) ◽  
pp. 13-27 ◽  
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


2021 ◽  
Vol 11 (02) ◽  
pp. 1480-1485
Author(s):  
Mohd Rizal Abdul Manaf ◽  
◽  
Haliza Abdul Manaf ◽  
Rozita Arifin ◽  
◽  
...  

Malaysia has been hit by COVID-19 pandemic since 2020 and this problem also affects countries around the world. This COVID-19 infection does not distinguish age, gender, educational and financial status. Homeless people are also not exempt from being infected with COVID-19, especially when the government implements the Movement Control Order, particularly these people who have no permanent home. This article describes the activities carried out by the government agencies, especially from the Ministry of Health Malaysia, Department of Social Welfare, National Anti-Drugs Agency, Immigration Department of Malaysia, as well as other non-governmental agencies in the Federal Territory of Kuala Lumpur on homeless people during movement control orders. It is hoped that this shared experience can be a guide to government agencies, non-governmental organizations, private sectors and individuals in other states to manage this underprivileged group, especially during the ongoing COVID-19 pandemic


Author(s):  
Fei HU ◽  
Kun ZHOU ◽  
Hongshi ZHOU

Governments all over the world are paying great attention to economic innovation and the development of design in modern society. They are spending more and more recourses on making rules for Industrial Design Policy and measuring its implementation. As a method to make macroeconomic regulation and control by the government, the effectiveness and importance of design policy has already been widely admitted. In a macro-background of the three turns of Chinese design policy, taking the design policy of Guangdong province as an example, this article will analyze how local/regional government should respond to the national design policy. Based on the investigation and analysis of the winners of the "Guangdong Governor Cup Industrial Design Competition", this paper discusses how industrial design competition as a part of the design policy to support the development of industrial design. After making a comparison with the design policy of the Yangtze River Delta area, this article tries to enhance and perfect the current policy path.


Sign in / Sign up

Export Citation Format

Share Document