EU Security Policy in North Africa and in the Middle East

2015 ◽  
Vol 11 (1) ◽  
pp. 39-69
Author(s):  
Slobodan Janković ◽  
Aleksandar Saša Gajić
2021 ◽  
pp. 1-21
Author(s):  
Andrea Ghiselli ◽  
Pippa Morgan

Abstract The nexus between China's human and economic presence abroad and its security policy is increasingly important. Within this nexus, this study statistically explores whether and to what extent Chinese contractors reduce the number of Chinese nationals they send to work in North Africa, the Middle East and the Horn of Africa when the security situation in host states worsens. We find no significant evidence that either warnings from Chinese embassies and consulates to leave host countries or expert perceptions of host stability influence the number of Chinese workers. Worker numbers appear to decrease significantly only in the aftermath of large-scale violent events. These findings suggest that Chinese companies are relatively acceptant of security risks and uncertainties, despite the decade-long regulatory efforts of the Chinese government to make them more security-conscious overseas and, thus, to reduce pressure to use diplomatically and economically expensive military means for their protection.


Author(s):  
Yassine Maleh ◽  
Mustapha Belaissaoui

This chapter aims to study the success factors of the ISO 27001 framework related to the implementation of information security in organizations, with particular emphasis on the different maturity controls of ISO 27001 in the implementation of information security policies in organizations. The purpose of this paper is to investigate what controls are commonly used and how they are selected to the implementation of information security in large public organizations in Middle East and North Africa MENA through ISO 27001, with a specific focus on practical framework for the implementation of an effective information security policy through ISO27001. The finding will help organizations to assess organizations to implement an effective information security policy.


The aim of this chapter is to study the success factors of the ISO 27002 framework related to the implementation of information security in organizations, with particular emphasis on the different maturity controls of ISO 27002 in the implementation of information security policies in organizations. The purpose of this chapter is to investigate what controls are commonly used and how they are selected to the implementation of an information security in large public organizations in Middle East and North Africa (MENA) through ISO27002, with a specific focus on practical framework for the implementation of an effective information security policy through ISO27002. The finding will help organizations to assess organizations to implement an effective information security policy.


Author(s):  
Andrea Ghiselli

This Introduction presents China’s nascent strategy to protect its overseas interests, eventually via military means, as a major change in the country’s international orientation. As is the case for other great powers in history, it is a fundamental test for the sustainability of China’s rise. In order to shed light on this issue, this chapter brings securitization theory in, introducing its origin and latest developments, in order to avoid some of the problems that the plague the literature on China’s foreign and security policy. In particular, it is explains why it is important to focus on the role of non-traditional security threats to Chinese interests in North Africa and the Middle East. Against this background, the Introduction concludes with an outline of each chapter, providing an overview of their main content and findings.


Author(s):  
Odile Moreau

This chapter explores movement and circulation across the Mediterranean and seeks to contribute to a history of proto-nationalism in the Maghrib and the Middle East at a particular moment prior to World War I. The discussion is particularly concerned with the interface of two Mediterranean spaces: the Middle East (Egypt, Ottoman Empire) and North Africa (Morocco), where the latter is viewed as a case study where resistance movements sought external allies as a way of compensating for their internal weakness. Applying methods developed by Subaltern Studies, and linking macro-historical approaches, namely of a translocal movement in the Muslim Mediterranean, it explores how the Egypt-based society, al-Ittihad al-Maghribi, through its agent, Aref Taher, used the press as an instrument for political propaganda, promoting its Pan-Islamic programme and its goal of uniting North Africa.


Sign in / Sign up

Export Citation Format

Share Document