scholarly journals India's multi-alignment management and the Russia–India–China (RIC) triangle

2021 ◽  
Author(s):  
Frank O'Donnell ◽  
Mihaela Papa

Abstract In its Eurasian diplomacy toward Russia and China, India has preferred to engage these states bilaterally and through the Brazil–Russia–India–China–South Africa (BRICS) and Shanghai Cooperation Organization (SCO) multilateral alignments. By contrast, India views the Russia–India–China (RIC) triangle as a less effective mechanism. However, despite its ongoing militarized crisis with China in the spring/summer of 2020, India surprisingly agreed to participate in a meeting of RIC foreign ministers and initiate RIC defence ministers' engagements. India also initiated the revival of RIC summits in 2018. This article analyzes the drivers for India's recent shift toward enhancing RIC. Drawing upon Indian policy statements and alignment documents, the article firstly argues that India generates policy agenda overlaps across RIC, BRICS and SCO, which facilitate forum-shopping. Introducing the case-study of Indian counterterrorism diplomacy across the three alignments, the article secondly argues that Indian dissatisfaction with its progress in advancing a security policy agenda within one grouping leads it to refocus on building this agenda in alternative alignments. This article contributes to conceptualizing multi-alignment management, while providing new insights into Indian relations with Russia and China within multilateral institutions and diplomacy in the era of regime complexity.

2019 ◽  
Vol 10 (0) ◽  
pp. 190
Author(s):  
Helge Blakkisrud

After a period of relative neglect in the 1990s and early 2000s, the Arctic is back on the agenda of the Russian authorities. To ensure efficient coordination and implementation of its Arctic strategy, the government in 2015 established a State Commission for Arctic Development. It was to serve as a platform for coordinating the implementation of the government’s ambitious plans for the Arctic, for exchange of information among Arctic actors, and for ironing out interagency and interregional conflicts. Based on a case study of the State Commission for Arctic Development, this article has a twofold goal. First, it explores the current Russian domestic Arctic agenda, mapping key actors and priorities and examining the results achieved so far. Second, it discusses what this case study may tell us the about policy formulation and implementation in Russia today. We find that while the government’s renewed focus on the Arctic Zone has yielded some impressive results, the State Commission has been at best a mixed success. The case study demonstrates how, in the context of authoritarian modernization, the Russian government struggles to come up with effective and efficient institutions for Arctic governance. Moreover, the widespread image of a Russian governance model based on a strictly hierarchic “power vertical” must be modified. Russia’s Arctic policy agenda is characterized by infighting and bureaucratic obstructionism: even when Putin intervenes personally, achieving the desired goals can prove difficult.


2019 ◽  
Vol 23 (2) ◽  
pp. 465
Author(s):  
Max André Antonio Rodrigues ◽  
Daniela de Castro Melo

A segurança pública é um dos principais problemas sociais do Brasil e incide em todas as esferas da sociedade, inclusive nas Universidades. O objetivo desta pesquisa foi realizar um diagnóstico da segurança institucional na Universidade Federal do Triângulo Mineiro – UFTM com o intuito de desenvolver e implantar uma política de segurança na universidade. Trata-se de estudo de caso, com pesquisa bibliográfica, documental, entrevista e grupos focais. O diagnóstico evidenciou a insegurança silenciosa que a comunidade acadêmica da UFTM vive, com problemas estruturais e organizacionais.Os resultados mostraram a necessidade de desenvolver ações de intervenção relacionadas à segurança no entorno da universidade, implementação de câmeras de vigilância e de departamento de segurança institucional, termais vigilantes e melhorar o controle na entrada das unidades da universidade. Palavras-chave: Administração pública. Segurança universitária. Gestão de riscos. Segurança institucional.THE SILENT(IN) SECURITY IN UNIVERSITY CAMPS: study at Federal University of Triângulo MineiroAbstractPublic security is one of the main social problems in Brazil and affects all spheres of society, including universities. The objective of this research was to make a diagnosis of institutional security at the Federal University of Triângulo Mineiro -UFTM in order to develop and implement a security policy at the university. This is a case study, with bibliographic, documentary research, interview and focus groups. The diagnosis showed the silent insecurity that the UFTM academiccommunity lives with structural and organizational problems. The results showed the need to develop intervention actions related to security around the university, implementation of surveillance cameras and institutional security department, have more vigilantand improve control at the entrance of the university units.Keywords: Public administration. University security. Risk management. Institutional security.


2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


2016 ◽  
Vol 9 (6) ◽  
pp. 1
Author(s):  
Majid Divsalar ◽  
Ebrahim Javadi Veshki

In international system scene, interests and strategies for ensuring these interests are among key strategies of powerful countries. Therefore, super powers, organize security in different geographical areas through competition in order to challenge competitors and threaten them. Shanghai cooperation organization (SCO), as the most important security measure, has been developed by influence of competitive atmosphere in international system by help of Russian, China and some other important regional allies in response to transatlantic actions. As a result, this security measure could control peripheral threats in the region. In this regard, Islamic Republic of Iran, has considered emergence of this regional security measure as a serious threat for its national and regional interests and has acted to suppress them in the framework of its defense diplomacy. Considering this, authors try to answer this question that how Shanghai cooperation organization as security measure can influence the foreign policy behavior of Islamic Republic of Iran? By studying and analyzing how and why Shanghai cooperation organization (SOC) around Islamic Republic of Iran and determining foreign policy of super powers in establishing this organization, its effect on the foreign policy behavior of Islamic Republic of Iran is considered.


2018 ◽  
Vol 26 (1) ◽  
pp. 91-108 ◽  
Author(s):  
Khaled A. Alshare ◽  
Peggy L. Lane ◽  
Michael R. Lane

Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.


2019 ◽  
pp. 260-300
Author(s):  
Lee Miles
Keyword(s):  

2008 ◽  
pp. 1727-1740
Author(s):  
Charla Griffy-Brown ◽  
Mark W.S. Chun

This chapter demonstrates the importance of a well-formulated and articulated information security policy by integrating best practices with a case analysis of a major Japanese multinational automotive manufacturer and the security lessons it learned in the implementation of its Web-based portal. The relationship between information security and business needs and the conflict that often results between the two are highlighted. The case also explores the complexities of balancing business expedience with long-term strategic technical architecture. The chapter provides insight and offers practical tools for effectively developing and implementing information security policies and procedures in contemporary business practice.


2019 ◽  
Vol 27 (2) ◽  
pp. 128-144
Author(s):  
Sarah Bradshaw ◽  
Brian Linneker ◽  
Erin Sanders-McDonagh

This article explores how research helps construct a certain type of ‘gender’ knowledge that arises from, informs and reinforces ‘instrumentalist’ gendered policy perspectives on development of the Global South. It uses a case study of research funded under the ESRC-DFID Joint Fund for Poverty Alleviation which awarded 122 grants amounting to £66.2 million (around US$88 million) between 2005 and 2015. From a systematic review of the awards a typology of gender inclusion and exclusion was constructed that found 60% of all awards mentioned gender or included some level of gender analysis. The subsequent synthesis of the evidence suggested that in only 30% of all awards was the gendered knowledge produced central to the study and/or focused on better understanding gender roles, relations and identities. Applying a Feminist Institutionalist lens, the study highlights how institutional ideas around gender are reflected in the funding call specifications, and in turn influence how researchers ‘engendered’ their research, and the type of gendered knowledge produced. It finds much of the new gendered knowledge produced out of the Joint Fund emerged from non-gender focused research often produced by non-gender specialists. It suggests that as gender becomes mainstreamed into research, and as more researchers ‘do gender’, so research may become, conversely, less ‘gendered’. The ‘new’ gender knowledge produced may then merely evidence existing institutional policy positions rather than advance the policy agenda.


Sign in / Sign up

Export Citation Format

Share Document