The Border Effect

2019 ◽  
pp. 251-295
Author(s):  
Annette Idler

Chapter 7 argues that borderlands in vulnerable regions magnify security challenges of violence, crime, and governance that exist across the globe. It demonstrates that, in vulnerable regions, the transnationality of borderlands and their distance from state centers produce a “border effect,” the confluence of weak state governance, a low-risk/high-opportunity environment, and the propensity for impunity. The chapter explains the four ways in which the border effect influences security: as a facilitator, a deterrent, a magnet, and a stigmatized space. Overlaying a transnational borderland lens on the security dynamics of the borderlands shared by Colombia, Ecuador, and Venezuela reveals that the border effect intensifies the various forms of insecurity that arise from the interactions among armed actors. It also disguises them to state centers. The border effect holds regardless of asymmetries in border security policies and of country-specific historical and cultural contexts in the respective border zones.

2016 ◽  
Vol 6 (4) ◽  
pp. 28-40 ◽  
Author(s):  
Israel Fianyi ◽  
Tanveer Zia

The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.


2011 ◽  
pp. 1724-1732
Author(s):  
Pravin Shetty ◽  
Seng Loke

The Internet has proven to be the most convenient and demanding facility for various types of businesses and transactions for the past few years. In recent years, business information systems have expanded into networks, encompassing partners, suppliers, and customers. There has been a global availability (Anderson, 2001; BSI Global, 2003) of resources over the Internet to satisfy different needs in various fields. The availability factor has called for various security challenges in fields where information is very valuable and not meant for all. Potential threats to information and system security come from a variety of sources. These threats may result in violations to confidentiality, interruptions in information integrity, and possible disruption in the delivery of services. So it is essential to manage the flow of information over the network with the required level of security. There are many security technologies and models that have been introduced which are capable of realizing the functions and objectives of information system security. This article first gives a brief overview of what we term basic security policies of an integrated security model. Then it suggests context-based security policies for a health organization scenario using contextual graphs augmented with details about specific security actions, which relate to the security policies enumerated in the integrated security model. The plan of the article is as follows. We first overview the three concepts in detail and briefly describe the concept of contextual (meta-policy) graphs. We then develop a context-based security meta-policy for securing patient records based on the security policies overviewed and discuss related work, before concluding the paper.


2020 ◽  
Vol 38 (2) ◽  
pp. 100-105
Author(s):  
Guadalupe Correa-Cabrera

The present article analyzes the responses to US border security policies and particularly US immigration policy by activists, migrants, and progressive actors during the Trump era. It explains new forms of popular resistance in the US and south of its border, as well as their effects in national politics, policies and geopolitics. This analysis focuses on migrant caravans and related protest movements. Finally, this article provides preliminary explanations of such phenomena that include considerations of geopolitics, philanthropy, and the plausible utilization of counterinsurgency tactics.


Author(s):  
Moses Thabo Katjisa Nkhoma ◽  
Albert Tchey Agbenyegah

This study sought to explore the opportunities in forming effective partnerships between the public sector and the private space technology sector to address border security challenges in South Africa using space technology. The study focused on border security authorities and the space technology sector in South Africa. To achieve the above objective, a qualitative research methodology was used to ascertain the possibilities and opportunities of adopting Public-Private Partnerships (PPPs) to enhance border security in South Africa through the adoption of space technology. Findings indicate that there is a need for effective PPPs for the purpose of enhancing border security through the application of space technology in South Africa. The findings further highlighted the massive benefits of partnership but also highlighted the possible challenges of engaging in PPPs. This study revealed that it is reasonably expected for the South African border security authorities to collaborate with the private space technology sector for the purpose of developing and providing effective space technology for border security.


Subject Colombian hydrocarbons. Significance Colombia’s oil production has plateaued at around 870,000 barrels per day (b/d), down from just over 1 million b/d in 2013. By regional standards, production is high relative to reserves. President Ivan Duque pledged to support the sector during his 2018 election campaign; efforts to sustain and increase production look set to characterise the remainder of his term. Impacts As the world moves towards a lower carbon future, Colombia may have to diversify its exports. Colombia’s high costs, limited scale and operating challenges could see it struggle to compete in a shriking market for investment. Duque’s security policies will do little to ease the physical security challenges facing oil companies operating in Colombia.


Author(s):  
Ishmael Kwabla Hlovor

AbstractAfrican borderlands are sites where the state, borderlanders, criminal groups, and other groups compete and cooperate to achieve diverse interests. They are also zones of competing perspectives on security. However, current border security policies and practices operate within a restrictive neorealist theoretical paradigm with the state as the referent object of security thereby ignoring other perspectives on security. The vulnerabilities of borderlanders and the role of the border as a source of livelihood demand new ways of thinking about African borders in order to incorporate these major stakeholders into the bordering process. Although the adoption of the African Union's integrated border management strategy holds the potential to reconcile the needs of borderlanders with the objectives of the state, it remains within the restrictive neorealist framework. This paper argues that an emancipatory security theory provides an appropriate framework to understand African borders and borderlands. This theory holds the key for enhancing the security of African borders by reconciling the needs of borderlanders with the objectives of state security, and thereby making people and communities the referent objects of security. However, the failure of the theory to engage with the concept of power limits its usefulness.


2019 ◽  
pp. 399-412
Author(s):  
Israel Fianyi ◽  
Tanveer A Zia

The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the many ripostes that were renewed on identity management included enhanced use of biometrics to verify and authenticate travellers at various airports as well as the use of video surveillance equipped with facial recognition sensors. The growth in data and storage devices have also become a critical phenomenon in biometrics deployment, the swiftness and accuracy with which these biometrics details can be processed is a prevailing challenge. This paper provides an extensive review of literatures on prospects of biometric technologies and other interrelated technologies in the fight against terrorism. To date, there is relatively meagre academic research examining how biometric technologies enhance border security as well as individual security.


Sign in / Sign up

Export Citation Format

Share Document