scholarly journals Turkey’s Border Security Policy Against Non-State Actors (2016-2019)

2020 ◽  
Vol 4 (2) ◽  
pp. 179
Author(s):  
Luerdi Luerdi ◽  
Amri Hakim

This paper aims to explain Turkey's border security policy in dealing with non-state actors in Northern Syria. Turkey's policy was carried out after five years of involvement in the Syrian crisis and one month after a failed coup attempt. This study uses the theory of securitization by Buzan that explains the existence of threat and vulnerability factors faced by the state in anarchic international structures. The research method used in this study is a qualitative method with the type of causality analysis. This paper found that threats and vulnerabilities pushed Turkey to launch a series of military operations as border security policies to rid North Syria of ISIS and PKK/PYD/YPG militias to control the adverse effects caused by the presence of non-state actors such as civilian and military casualties, property damage, as well as instability and disintegration. The border security policy confirms the increasingly important role of Turkey in the region while demonstrating Turkey's consistency in pursuing national security interests even outside its territory

Author(s):  
THARISHINI KRISHNAN ◽  
SALMA YUSOF ◽  
HERLIN ANAK AMAN ◽  
KDR SUGENDERAN NAGALAN

Border security is an essential component of Malaysia’s defence and security policy. During the COVID-19 outbreak, Malaysia’s border security management was tested with the increase of illegal entry into the country. The central argument of this paper is that, whilst Movement Control Order (MCO), or lockdown as it is more commonly known, aims to restrict movement, this limited movement was exploited for illegal entries into the country, leading to the establishment of the National Task Force (NTF), which coordinated various enforcement agencies to safeguard Malaysian territory. On this ground, this paper aims to analyse the role of the NTF in responding to increasing illegal activities amidst the pandemic. The discussion is divided into: (a) identifying illegal entries during the pandemic; (b) the impact of illegal entries to border management in Malaysia; (c) examining the roles of the NTF in responding to the illegal activities; and (d) the impact of the NTF in border security management in Malaysia. As a preliminary study, this paper only uses secondary data collection in addressing the problem statement. Keywords: National task force; COVID-19 pandemic; Illegal activities; Illegal immigrants; Border security managemen


Author(s):  
A. V. Groubinko

In the article on the basis of the original chart of the theoretical conceptual system of Eurointegration's development offered by an author base principles of Great Britain's participation in common foreign and security policy (CFSP) of the European Union are examined. The country’s role in the processes of forming EU's CFSP is determined in the context of leading theories of Eurointegration. The evolution of British government's policy participation in the system of political co-operation in the European Union, character of its influence on the processes of Eurointegration in the sphere of foreign and security policies are analysed. CFSP as a specific sphere of co-operation of the EU's states fully represents conceptual dichotomy of European Union essence at level «intergovernmental - supranational». CFSP is the segment of the EU's legal reality which is historically based on intergovernmental co-operation, and in modern terms characterized by the expressed elements of funcional supranational institucialisation and insignificant strengthening of federalism. Great Britain conceptual approaches to forming EU's CFSP lie traditions of pragmatical and functional realistic approach with the elements of federalist co-operation, externalism and minimum of institucialism. For activity of British governments is inherent pistorical heredity of participating in political integration within the framework of Common Europe. It's mean a successive policy of inhibition federalist supranational tendencies, propagandas of the evolutional going to development of integration processes and it distribution on new spheres. Such approaches are correspond to the model of selective-sectoral integration or «Europe a la carte» ofThatcherist standards, which in the process of realization under influence of objective (mainly external) factors evolved to practical embodiment of such more soft models of flexible integration, as «multi-speed integration» and «Europe of variable geometries». The noted approaches to CFSP allow government on the different historical stages to have retentive or stimulant influence on the integrational processes.


Author(s):  
Ishmael Kwabla Hlovor

AbstractAfrican borderlands are sites where the state, borderlanders, criminal groups, and other groups compete and cooperate to achieve diverse interests. They are also zones of competing perspectives on security. However, current border security policies and practices operate within a restrictive neorealist theoretical paradigm with the state as the referent object of security thereby ignoring other perspectives on security. The vulnerabilities of borderlanders and the role of the border as a source of livelihood demand new ways of thinking about African borders in order to incorporate these major stakeholders into the bordering process. Although the adoption of the African Union's integrated border management strategy holds the potential to reconcile the needs of borderlanders with the objectives of the state, it remains within the restrictive neorealist framework. This paper argues that an emancipatory security theory provides an appropriate framework to understand African borders and borderlands. This theory holds the key for enhancing the security of African borders by reconciling the needs of borderlanders with the objectives of state security, and thereby making people and communities the referent objects of security. However, the failure of the theory to engage with the concept of power limits its usefulness.


2013 ◽  
Vol 3 (4) ◽  
pp. 22-31
Author(s):  
Ilona Ilvonen ◽  
Pasi Virtanen

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.


PERSPEKTIF ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 307-313
Author(s):  
Agung Priambodo ◽  
Nrangwesthi Widyaningrum ◽  
Hayatul Khairul Rahmat

The role of the Military Resort Command in disaster management is a form of implementation of the Indonesian Armed Forces’ tasks, namely the task of Military Operations Other Than War (OMSP) in accordance with the mandate of Law Number 32 of 2004 concerning the Indonesian Armed Forces (TNI). Disaster management in the regions carried out by the the Military Resort Command involvement of government agencies and other stakeholders. Between the the Military Resort Command, government agencies and stakeholders in disaster management. Related to the role of the the Military Resort Command, this research was conducted with the aim to study the the Military Resort Command 043/ Garuda Hitam’s Strategy for disaster management in Lampung Province. This research uses a qualitative method using case studies. In addition, researchers conducted interviews, observations and documentation studies to collect data and analyzed. The Military Resort Command 043/ Garuda Hitam in disaster management is by coordinating and communicating with government agencies and other stakeholders as well as facilitating Territorial Development (Binter) activities which are one of the tasks of the Military Resort Command 043/ Garuda Hitam in Lampung Province.


Author(s):  
David Morgan-Owen ◽  
Louis Halewood

This chapter explains the rationale for the volume, arguing that historical studies of economic warfare require greater nuance than has traditionally been afforded by an overreliance on conceptions developed by classical naval theorists such as Alfred Thayer Mahan. It presents an overview of the chapters in this collection, which are grouped around four key themes: neutrals and neutrality; the role of non-naval bureaucracies in conducting campaigns of economic warfare; the ways in which non-state actors have interacted with and taken advantage of episodes of economic warfare; and studies of economic warfare as an element in the broader grand strategy of states. The chapter concludes by offering suggestions for new approaches to understanding economic warfare and the sea. A more international approach which deconstructs the workings of the global economy promises rich rewards for new studies. Similarly, interrogating ideas about economic warfare, and the rhetoric surrounding its potency, may offer a better guide to understanding the reasons for its use in the past. Lastly, given that sea power matters chiefly in the ways in which it influences events on land, more must be done to excavate the link between action at sea and how it impinges on military operations on land.


Author(s):  
Deepti Parachuri ◽  
Sudeep Mallick

Security is of fundamental concern in computing systems. This chapter covers the role of security policies in Web services. First, it examines the importance of policies in web services and explains the WS-Policy standard. It also highlights the relation of WS-Policy with other WS-* specifications. Next, it covers different facets of security requirements in SOA implementations. Later, it examines the importance of security policies in web services. It also presents the basic concepts of WS-Security policy language. WS-Security policy specification specifies a standard way to define and publish security requirements in an extensible and interoperable way. A service provider makes use of security policy to publish the security measures implemented to protect the service. Security policies can also be made customizable to meet the security preferences of different consumers. Towards the end, it discusses about the governance of security polices and also future trends in security policies for web services.


2019 ◽  
Vol 20 (2) ◽  
pp. 192-204
Author(s):  
Syarifah Dinda Nuraini Alkadrie ◽  
Alderin Joisafita Tangdialla ◽  
Andi Anugrah Saputra ◽  
Oilinia Miyanda Maruhawa

The Rohingya ethnicity in Myanmar abused in 2016 reflected an act of violence against Rohingya Muslims by the Myanmar armed forces and police. To manage conflicts that extend the humanitarian crisis in Myanmar, the role of governments is important. Because of the abuse and the complex types of human rights abuses of the Rohingya ethnicity, researchers took Rohingya ethnicity into our case study in this paper. Researchers also use the theory of Liberalism and focus on the response and the actions of ASEAN countries that are a place for these Rohingya refugees. On the actions, ASEAN has taken in the context of Liberalism. These researches use the qualitative method of analysis. Due to the data analysis, security policies consider the domestic interests of each country, which Rohingya refugees are supposed to be able to get help. Keywords: ASEAN, Rohingya, Myanmar, Refugees, Liberalism.


2012 ◽  
Vol 47 (2) ◽  
pp. 271-284 ◽  
Author(s):  
Hans Lödén

This rejoinder article takes the contributions in the Special Issue of Cooperation and Conflict – Vol. 46(3) – on Neutrality and ‘Military Non-Alignment’ as point of departure for a discussion of some of the problems former neutrals face in shaping their foreign and security policies. The author argues that current and future developments regarding neutrality norms are dependent on internal factors such as national identity and public opinion, and on external factors such as the military non-aligned states’ relationships to EU, NATO and, not least, the UN. The possibility of a ‘Second Option’ of full-scale military cooperation if a preferred neutral position fails is discussed. Increased UN activism, for example, connected with the R2P concept and the tendency to outsource major UN-mandated military operations to NATO, is touched upon as well as the Libya crisis of 2011 and some of its implications for European foreign and security policy cooperation. Special attention is given to current Swedish debates on military non-alignment and NATO membership.


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Ľubomír Zvada

This Handbook maps the contours of an exciting and burgeoning interdisciplinary field concerned with the role of language and languages in situations of conflict. It explores conceptual approaches, sources of information that are available, and the institutions and actors that mediate language encounters. It examines case studies of the role that languages have played in specific conflicts, from colonial times through to the Middle East and Africa today. The contributors provide vibrant evidence to challenge the monolingual assumptions that have affected traditional views of war and conflict. They show that languages are woven into every aspect of the making of war and peace, and demonstrate how language shapes public policy and military strategy, setting frameworks and expectations. The Handbook's 22 chapters powerfully illustrate how the encounter between languages is integral to almost all conflicts, to every phase of military operations and to the lived experiences of those on the ground, who meet, work and fight with speakers of other languages. This comprehensive work will appeal to scholars from across the disciplines of linguistics, translation studies, history, and international relations; and provide fresh insights for a broad range of practitioners interested in understanding the role and implications of foreign languages in war.


Sign in / Sign up

Export Citation Format

Share Document