Societal Security in South Tyrol: A Model to Deal with Ethnic Conflicts

2015 ◽  
Vol 12 (1) ◽  
pp. 56-93
Author(s):  
Andrea Carlà

South Tyrol has been referred to as a model to deal with ethnic diversity and resolving ethnic conflicts. This article explains the South Tyrol model’s success by blending ethnic politics with concepts from security studies: societal security and securitization. Societal security refers to threats that emerge from the fact that humans belong to communal groups that do not correspond to defined state borders. Securitization is the process by which an issue is considered as an existential threat that requires emergency measures. The article develops a framework to identify which dynamics made South Tyrol successful, analyzing factors that sparked security concerns and processes of securitization and highlighting actions and measures that tackled these dynamics. Concurrently, South Tyrol is used as an empirical case to expand our understanding of societal security and elaborate (and test) a detailed toolkit to prevent or dissolve the violent mobilization of ethnic diversity and societal security threats.

2015 ◽  
Vol 13 (3) ◽  
pp. 433-451 ◽  
Author(s):  
Aleksandra Maksimovska ◽  
Aleksandar Stojkov ◽  
Patrick Schmidt

Competing ethno-centered strategies over the local fiscal resources can seriously undermine political and economic stability of ethnically diverse societies. This study investigates the causal link between ethnic diversity and local government finances by focusing on the case of Macedonia. In particular: whether fiscal decentralization is used as a part of broader strategy for prevention and mitigation of inter-ethnic conflicts. The main argument is that low level of political culture and inter-ethnic tensions are frustrating the development of the government policy along a course of decentralization. The study confronts two emerging scenarios regarding decentralization and inter-ethnic relations. The first scenario puts the economic development at the forefront for country’s stability and treats decentralisation as a driving force to achieve this goal. Ethnic problems are expected to be solved along this path as rising economic stability reduces the inter-ethnic tensions. In the second scenario, the inter-ethnic stability is the main pillar of the country’s stability, which is expected to be accomplished through decentralisation. The paper analyses and synthesizes pros and cons of two scenarios from administrative, legal, political and economic perspectives.


2021 ◽  
pp. 1-19
Author(s):  
Andrea Carlà

Abstract Situated at the interplay between ethnic politics, migration, border, and security studies, this contribution analyzes processes of securitization of borders in South Tyrol, an Italian province bordering Austria and Switzerland with a German- and Ladin-speaking population and a past of ethnic tensions. South Tyrol is considered a model for fostering peaceful interethnic relations thanks to a complex power-sharing system. However, the arrival of migrants from foreign countries and the more recent influx of asylum seekers have revitalized debates around the borders between South Tyrol/Italy and Austria and among South Tyrolean linguistic groups. The current COVID-19 pandemic has brought further complexity to the issue. I use the concept of securitization—the process through which an issue is considered as an existential threat requiring exceptional measures—in order to understand why and how borders become exclusionary and restrictive, shaping dynamics of othering. With this framework, the article explores how South Tyrolean borders have been subjected to (de)securitizing and resecuritizing moves in discourses and practices. In this way, I shed new light on debates on the articulation of borders and interethnic relations that are occurring due to recent international migration, consolidation of nationalist agendas, and the current pandemic.


2014 ◽  
Vol 22 (1) ◽  
pp. 24-41 ◽  
Author(s):  
Deepa Mani ◽  
Kim-Kwang Raymond Choo ◽  
Sameera Mubarak

Purpose – Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia. Design/methodology/approach – The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia. Findings – There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available. Originality/value – This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.


2017 ◽  
Vol 51 (7) ◽  
pp. 831-867 ◽  
Author(s):  
Kyle L. Marquardt

The disintegration of the Soviet Union is an essential case for the study of ethnic politics and identity-based mobilization. However, analyses in this article demonstrate that commonly used measures of ethnic diversity and politically relevant group concentration show little consistent relationship with events of ethnic mobilization in Soviet regions during the period 1987-1992. In contrast, the proportion of a regional population that did not speak a metropolitan language has a consistently strong negative relationship with mobilization across these regions. In line with recent work on identity politics, I argue that a lack of proficiency in a metropolitan language marks nonspeakers as outsiders and hinders their social mobility. Regions with many of these individuals thus have a relatively high potential for identity-based mobilization. These findings provide further impetus for looking beyond ethnic groups in measuring identity-based cleavages, and indicate that language can play an important role in political outcomes aside from proxying ethnicity.


Author(s):  
Alya Geogiana Buja

This paper proposes cybersecurity features in the National e-Learning policy. Cybersecurity in the learning environment is becoming an issue that has been considered by the community.  DePAN 1.0 and DePAN 2.0 policies have not been carefully planned in any related security concerns. Amongst security domains in e-learning are authentication and accountability, access control, and non-repudiation issues. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity, and availability. Therefore, the existing policy and guidelines on e-learning have been studied thoroughly.  A very feasible study has been conducted on the existing literature and related works to e-learning and e-learning.  The security threats are also reviewed in this paper.  Based on the established e-Learning policy, therefore, the proposed security features are namely (CSF1) authentication and accountability, (CSF2) access control, (CSF3) protection of communication, and (CSF4) non-repudiation issues.  The findings from this study can be added to the implementation of e-learning in the future.


2019 ◽  
Vol 17 (4) ◽  
pp. 124-124
Author(s):  
Elena A. Erokhina

The paper presents an analysis of strategic planning documents in the field of ethnic politics of post-Soviet Russia. A case study of a legislative initiative known as the “law on the Russian nation” is considered. It is concluded that the reception of nationalism in the practice of ethnosocial management is the result of borrowing Westernized models of ethnic diversity management.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Author(s):  
Christine Agius

This chapter examines the impact of social constructivism on Security Studies as well as its critique of the assumed orthodoxy of rationalist approaches to security and the international system. In particular, it considers the manner that social constructivists address the question of how security and security threats are ‘socially constructed’. The chapter first provides an overview of definitions and key concepts relating to constructivism, such as its emphasis on the importance of ideas, identity, and interaction, along with its alternative approach to thinking about security. It then explores Alexander Wendt’s three cultures of anarchy and compares conventional constructivism with critical constructivism. Finally, it analyses rationalist and poststructuralist critiques of constructivism.


COMPASS ◽  
2017 ◽  
Vol 1 (2) ◽  
pp. 25-30
Author(s):  
Barbara L. Hilden

This paper examines some of the linguistic tools, techniques, means, and methods by which the populations of Austria and South Tyrol construct identity. In order to better situate these two communities, this paper begins with an overview of the conditions which led to the creation of each state. It then explains some of the ways in which language can be used as a tool of identity construction. Positioning theory details ways both these groups create categories of separationand belonging. Citing the use of Austrian German, dialect in literature, differing pronunciation, and lexical development, this paper examines how the population of Austria constructs a linguistic identity distancing itself from Germany. This paper also examines how, using similar linguistic tools such as pronoun use and naming techniques, the population of South Tyrol constructs its identity. In contrast to Austria, the South Tyroleans align themselves with Germany, creating closer ties with Germanic neighbours while distancing themselves from Italy. Each population positions itself in relation to Germany, either with or against, using linguistic tools to create a group identity.


Sign in / Sign up

Export Citation Format

Share Document